Call for Papers
Great to have you here!
First we are a community built in many years and as a community, we encourage knowledge sharing and collaboration.
We encourage all application security practitioners or security researchers to contribute to the DefCamp community by writing articles for the blog and show their work to the world or attending the conference and showcase the research on stage.
What are the benefits for speakers?
- access to one of the largest cyber security communities from CEE
- exposure for your security research
- travel expenses covered by us
- VIP treatment (including free attendee access for one of your friends or family)
Deadlines
Our Call for Papers has three main rounds, however we select speakers based on FIFO (first-in-first-out) rule, meaning that you have more chances of being accepted now than later.
- Deadline #1 of submissions: June 15th, 2026
- Deadline #2 of submissions: August 30th, 2026
- Deadline #3 of submissions: October 15th, 2026
What we are looking for?
As long as it is fascinating for the DefCamp community, we place a high emphasis on both unique content that has never been seen before as well as tried and tested content. In addition, we are excited to provide content that is at both the beginner and the advanced level. It’s possible that DefCamp has had introductory speeches before, but they’re still quite helpful for people who are just starting out. At DefCamp, not only will you widen your knowledge, but you will also deepen it.
Review process
Each entry will be evaluated based on the quality of its material as well as how well it fits within the program. We will adopt a procedure known as double blinding to eliminate any possibility of prejudice based on the writers’ color, gender, or any other characteristic. However, the event organizers reserve the right to make adjustments to the program for the event or to dismiss any proposal if they believe it would be inappropriate for the conference.
Be the next DefCamp Superstar
First, submit a preview of your paper on our online CFP platform for review. Documents may include videos and pictures, as well as a more extensive version of the research in a different download-able format. White paper and/or slides are a plus.
SUBMIT YOUR PRESENTATIONTechnical presentations are very appreciated
We encourage you to apply with your findings and research! Check out the topics of interest below and if you still have second thoughts on the subject, drop us a line.
Cybersecurity has become vital for businesses
We’ve included this category of articles to offer the DefCamp audience information on trends and statistics from the market as well as good practices, guides and methodologies.
Topics of Interest
Please note that the following list is not exhaustive. We love innovation but we can’t keep up with it on this page!
Cyber-Operations, AI & Emerging Technologies
- AI/ML Security – LLM security, prompt injection, jailbreaks, agentic AI security, adversarial ML
- Offensive and defensive AI – AI-assisted red teaming, AI in SOCs, AI-generated malware
- Deepfakes, synthetic media detection, AI-enabled fraud
- Disinformation, influence operations, election security, hybrid warfare
- Post-Quantum Cryptography (PQC) migration, quantum-safe protocols, “harvest now, decrypt later”
- Applied cryptography, including PQC and confidential computing
- Blockchain, Web3, smart contract security, DeFi exploits, crypto forensics
- 0-day research, vulnerability discovery, and coordinated disclosure
- Next-gen exploits, mitigation bypasses, EDR/XDR evasion, modern OS internals
- Case studies of cybersecurity incidents and breaches
Governance, Compliance, and Business Strategy
- Legal & regulatory landscape – NIS2, DORA, CRA, AI Act, GDPR, eIDAS 2
- Business, Management & Innovation in cybersecurity
- Digital Transformation & Security Awareness
- Cyber insurance, risk quantification, board-level cyber governance
- Sovereign tech, EU cybersecurity strategy and funding instruments
Web, Software, and Infrastructure Security
- Web Application & API Security
- Secure Software Development Lifecycle (SSDLC) & DevSecOps
- Cloud, Container & Kubernetes Security; serverless and multi-cloud
- Critical Infrastructure Security – SCADA/ICS, OT, energy grids, satellite, automotive, GSM/5G, rail
- Mobile Security – Android, iOS, app reverse engineering
- Software supply chain security and dependency-confusion class attacks
- Identity, IAM, and Zero Trust architectures
Hardware, Forensics, and Reverse Engineering
- Hardware hacking, fault injection, side-channel attacks, defeating “secure” hardware
- IoT and embedded device security, firmware reverse engineering and emulation
- Forensics – memory, disk (incl. SSD), network, cloud, and mobile forensics
- Malware analysis and reverse engineering
- Automotive and aerospace reverse engineering
Wireless, Communication, and Physical Security
- Radio security – NFC, WLAN, GPS/GNSS, HAM, Satellite, RFID, Bluetooth, LoRa, Zigbee, 5G
- SDR research and signal exploitation
- Drone hacking & counter-drone – UAV protocols (MAVLink), GPS spoofing, FPV systems
- Robotics security – industrial robots, autonomous systems, ROS exploitation
- Physical security – lock-picking, physical access control bypass, badging
Flight Ticket Reimbursement Conditions for Speakers
Pre-Approval Required
All flights must be approved in writing by the organizing team before booking. Unauthorized bookings will not be reimbursed.Travel Class
Reimbursement is limited to economy class. Upgrades (e.g., business, premium) are not covered.Maximum Reimbursement Cap
Intra-EU Flights: up to €500
Intercontinental Flights: up to €1,250
Exceptions only with prior written approval.
Booking Window
Flights must be booked in maximum 45 days after the presentation has been accepted, unless approved otherwise. Late bookings may be reimbursed at the average market fare.Direct or Reasonable Routes Only
Only direct or shortest reasonable routes are reimbursed. Stopovers or detours for personal reasons are not covered.Submission Deadline
Reimbursement requests must be submitted within 30 days after the event, with:Invoice/receipt
Boarding passes
Proof of payment
No-Show or Cancellation
If the speaker cancels attendance after ticket purchase we reserve the right not to reimburse the ticket.Sustainability Consideration
For regional speakers, train or alternative transport is preferred and should be used if more sustainable and cost-effective.- Cost-Conscious Travel
Since DefCamp is organised by an NGO, we kindly ask speakers to seek the most economical and sustainable travel options available