Call for Papers

Great to have you here!

First we are a community built in many years and as a community, we encourage knowledge sharing and collaboration.

We encourage all application security practitioners or security researchers to contribute to the DefCamp community by writing articles for the blog and show their work to the world or attending the conference and showcase the research on stage.

What are the benefits for speakers?

  • access to one of the largest cyber security communities from CEE
  • exposure for your security research
  • travel expenses covered by us 
  • VIP treatment (including free attendee access for one of your friends or family)

Deadlines

Our Call for Papers has three main rounds, however we select speakers based on FIFO (first-in-first-out) rule, meaning that you have more chances of being accepted now than later.

  • Deadline #1 of submissions: June 15th, 2026
  • Deadline #2 of submissions: August 30th, 2026
  • Deadline #3 of submissions: October 15th, 2026

What we are looking for?

As long as it is fascinating for the DefCamp community, we place a high emphasis on both unique content that has never been seen before as well as tried and tested content. In addition, we are excited to provide content that is at both the beginner and the advanced level. It’s possible that DefCamp has had introductory speeches before, but they’re still quite helpful for people who are just starting out. At DefCamp, not only will you widen your knowledge, but you will also deepen it.

Review process

Each entry will be evaluated based on the quality of its material as well as how well it fits within the program. We will adopt a procedure known as double blinding to eliminate any possibility of prejudice based on the writers’ color, gender, or any other characteristic. However, the event organizers reserve the right to make adjustments to the program for the event or to dismiss any proposal if they believe it would be inappropriate for the conference.

Be the next DefCamp Superstar

First, submit a preview of your paper on our online CFP platform for review. Documents may include videos and pictures, as well as a more extensive version of the research in a different download-able format. White paper and/or slides are a plus.

SUBMIT YOUR PRESENTATION
Topics of Interest

Please note that the following list is not exhaustive. We love innovation but we can’t keep up with it on this page! 

Cyber-Operations, AI & Emerging Technologies

  • AI/ML Security – LLM security, prompt injection, jailbreaks, agentic AI security, adversarial ML
  • Offensive and defensive AI – AI-assisted red teaming, AI in SOCs, AI-generated malware
  • Deepfakes, synthetic media detection, AI-enabled fraud
  • Disinformation, influence operations, election security, hybrid warfare
  • Post-Quantum Cryptography (PQC) migration, quantum-safe protocols, “harvest now, decrypt later”
  • Applied cryptography, including PQC and confidential computing
  • Blockchain, Web3, smart contract security, DeFi exploits, crypto forensics
  • 0-day research, vulnerability discovery, and coordinated disclosure
  • Next-gen exploits, mitigation bypasses, EDR/XDR evasion, modern OS internals
  • Case studies of cybersecurity incidents and breaches

Governance, Compliance, and Business Strategy

  • Legal & regulatory landscape – NIS2, DORA, CRA, AI Act, GDPR, eIDAS 2
  • Business, Management & Innovation in cybersecurity
  • Digital Transformation & Security Awareness
  • Cyber insurance, risk quantification, board-level cyber governance
  • Sovereign tech, EU cybersecurity strategy and funding instruments

Web, Software, and Infrastructure Security

  • Web Application & API Security
  • Secure Software Development Lifecycle (SSDLC) & DevSecOps
  • Cloud, Container & Kubernetes Security; serverless and multi-cloud
  • Critical Infrastructure Security – SCADA/ICS, OT, energy grids, satellite, automotive, GSM/5G, rail
  • Mobile Security – Android, iOS, app reverse engineering
  • Software supply chain security and dependency-confusion class attacks
  • Identity, IAM, and Zero Trust architectures

Hardware, Forensics, and Reverse Engineering

  • Hardware hacking, fault injection, side-channel attacks, defeating “secure” hardware
  • IoT and embedded device security, firmware reverse engineering and emulation
  • Forensics – memory, disk (incl. SSD), network, cloud, and mobile forensics
  • Malware analysis and reverse engineering
  • Automotive and aerospace reverse engineering

Wireless, Communication, and Physical Security

  • Radio security – NFC, WLAN, GPS/GNSS, HAM, Satellite, RFID, Bluetooth, LoRa, Zigbee, 5G
  • SDR research and signal exploitation
  • Drone hacking & counter-drone – UAV protocols (MAVLink), GPS spoofing, FPV systems
  • Robotics security – industrial robots, autonomous systems, ROS exploitation
  • Physical security – lock-picking, physical access control bypass, badging

 

Flight Ticket Reimbursement Conditions for Speakers
  1. Pre-Approval Required
    All flights must be approved in writing by the organizing team before booking. Unauthorized bookings will not be reimbursed.

  2. Travel Class
    Reimbursement is limited to economy class. Upgrades (e.g., business, premium) are not covered.

  3. Maximum Reimbursement Cap

    • Intra-EU Flights: up to €500

    • Intercontinental Flights: up to €1,250

    • Exceptions only with prior written approval.

  4. Booking Window
    Flights must be booked in maximum 45 days after the presentation has been accepted, unless approved otherwise. Late bookings may be reimbursed at the average market fare.

  5. Direct or Reasonable Routes Only
    Only direct or shortest reasonable routes are reimbursed. Stopovers or detours for personal reasons are not covered.

  6. Submission Deadline
    Reimbursement requests must be submitted within 30 days after the event, with:

    • Invoice/receipt

    • Boarding passes

    • Proof of payment

  7. No-Show or Cancellation
    If the speaker cancels attendance after ticket purchase we reserve the right not to reimburse the ticket.

  8. Sustainability Consideration
    For regional speakers, train or alternative transport is preferred and should be used if more sustainable and cost-effective.

  9. Cost-Conscious Travel
    Since DefCamp is organised by an NGO, we kindly ask speakers to seek the most economical and sustainable travel options available

Here’s what happened in 2025