If you like the website, feel free to: Buy Me a Coffee at ko-fi.com

Info! CFPTime is a non-profit organization, community-based. Using CFP Time data (through the site and/or API) is allowed but can't be used for commercial purposes.

Bsides Cairo

City Cairo
Province Cairo Governorate
Country EG
Twitter @BSidesCairo
Website https://www.bsidescairo.com/
Code of Conduct Not populated yet
CFP Deadline

Sept. 20, 2018, 11:55 p.m.   

Conference Date

Feb. 2, 2019, 8 a.m.   


Bsides Cairo is an information security conference which will host information security professionals, security researchers, academics, undergrads, graduate students, corporations and any person who wants to share knowledge and learn from others.
We look forward to bring together experts, researchers and students to share their thoughts, projects, experiences to face together the current information security challenges of our days and to come up with new ideas and collaborations.

Our mission is to create a more knowledge-based event regardless of age, academic title or industrial position, and to provide the egyptian community with an alternative event by removing the current common industrial and marketing-driven conferences barriers and providing a more technical approach regarding all the organization aspects of an information security conference, from the speakers, to the target audience.

Important Dates:
+ Talks submissions due: Thursday, September 20, 2018, 11:59 p.m. EET
+ Early feedback notification: Saturday, October 20, 2018
+ Author responses due: Saturday, October 27, 2018
+ Final program due: Tuesday, January 1, 2019
+ Conference: Saturday, February 2, 2019

Your hacker talk can be as one of the following formats:
+ Short talk: 20 min + (5 to 10 min) for Q&As
+ Long talk: 40 min + (5 to 10 min) for Q&As
You can surely propose a different format if you think that would help you in spreading the knowledge… ;)

Side discussions:
We loved the event format of BSides Zurich, where, after each talks session, speakers move to separate rooms where attendees who are interested in their talks can join them and engage in active discussions along with snacks and coffee.
So, we have setted up some side-discussion tables where speakers and attendees can continue chatting about the talk’s topic in a more easy way.

Topics of interest are (of course not limited to):
+ Binary exploitation
+ Vulnerability hunting
+ Reverse engineering
+ Hardware security
+ Network security
+ Web security
+ Mobile security
+ Digital forensics
+ Applied cryptography
+ Secure coding
+ Fuzzing
+ Social engineering
+ Malware analysis
+ Defensive and offensive strategies
+ Wireless security
+ Lockpicking
+ Phishing
+ Privacy

Review Process:
After the CfT deadline, our review board have 1 month to look over all submissions and give a score to each proposal. A rejection and an acceptance lists will be built based on the given scores.
The proposals with the highest score will move to the first batch of acceptance notice and strong rejections will be immediately sent out too.
The board allows 1 week for the accepted proposals' speakers to respond. If the accepted speaker doesn't respond, doesn't want to or can't attend anymore, the board will move on with the next highest scored proposals in the acceptance list.
Once the conference program is full, the board starts to provide feedback for the remaining submissions. We hope to manage notifying all the confirmed speakers at least 2 months before the conference date.
The final agenda and talks abstracts will be out by January 1, 2019!!!

If you have any doubt or question about the CfT, please reach out to us via email or Twitter

Speaker benefits

Not populated yet