If you like the website, feel free to: Buy Me a Coffee at ko-fi.com

Info! CFPTime is a non-profit organization, community-based. Using CFP Time data (through the site and/or API) is allowed but can't be used for commercial purposes.

Texas Cyber Summit

City San Antonio
Province TX
Country US
Twitter @texas_cyber
Website https://www.TexasCyberSummit.org
Code of Conduct Not populated yet
CFP Deadline

June 25, 2018, 10 p.m.   

Conference Date

Oct. 12, 2018, 8 a.m.   


Currently we have five tracks:
1. Cyber 101 - Learning the basics of protecting your online persona, Speakers from DHS, FBI, Infraguard
2. RED TEAM - Red Team Tools and Tactics, penetration testing, exploit writing, tools and tips
3. BLUE TEAM - Defenders of the Realm, Defensive Art's , Threat hunting Reverse Engineering, tools, tips
4. Breaking Cyber - Risk, Policy, incidents, Health, Finance, DevSecOps and Politics
5. Scada/Critical Infrastructure - Scada, ICS, DCS, Threat hunting, Case Management, exploit/config

This CFP for TCS2018 will have three acceptance phases. This way if you get your talk submitted early, You wont have to wait until the end to be notified. Also, If you don’t make the first cut. Your talk will still be considered and in the running for the next two rounds. We will run each phase for 45 days. The first CFP phase will run April 25 - June 25. The second will run June 25 - July 25. And the third will run July 25- Sept 25

All presentations must be submitted by the original authors.
We currently only accept submissions by original authors of the presentations. PR firms, speaking relation firms, and all other parties who are not direct authors of submitted presentations ARE NOT ALLOWED to submit materials on behalf of speakers or presenters.

We require direct contact with presenters to expedite questions from the reviewers and to fulfill Speaker Obligations as detailed on the Call for Papers Terms and Conditions.
The following time slots are available and it is expected that the presenters will budget time for audience participation and Q&A within this time frame:
Normal presentations: 60 minutes
Short presentations: 30 minutes

“Talks that are more technical or reveal new vulnerabilities are of more interest than a review of material covered many times before. We are striving to create a high-end technical conference and any talk that helps reach this goal will be given extra attention. “Submissions with detailed bibliographies acknowledging prior work in the space, distinguishing or highlighting how your presentation is different. We believe this is important to help move the security community to a more professional and respected position.

We welcome attendees, speakers and trainers from all over the world. Speaking at this premier event "Texas Cyber Summit" is/will be an amazing accomplishment. A special rate has been negotiated with the hotel is passed on to attendees and speakers - However TCS will not be paying for travel or expenses for any speaker, we pass on the savings in the form of our low price of our tickets for attendees. Please consider this when you


Speaker benefits

Not populated yet