If you like the website, feel free to: Buy Me a Coffee at ko-fi.com

Info! CFPTime is a non-profit organization, community-based. Using CFP Time data (through the site and/or API) is allowed but can't be used for commercial purposes.


City Lagos
Province Lagos
Country NG
Twitter naijaseccon
Website http://www.naijaseccon.com
Code of Conduct Not populated yet
CFP Deadline

March 3, 2019, 11:55 p.m.   

Conference Date

May 3, 2019, 9 a.m.   


The official Call for Papers (speakers) for NaijaSecCon 2019, being held May 3rd – 4th, 2019 in Lagos, Nigeria is open from 11th February 2019 through 16th March 2019.

NaijaSecCon is Nigeria’s first of its kind 100% technical Cyber-Security Conference that uniquely merges information about relevant threats from a Nigerian context with live technical demonstrations and hands-on workshops. The 2017 maiden edition of the Nigeria Cybersecurity Conference (NaijaSecCon17) was one of the first ever gatherings of information security practitioners, enthusiasts, evangelists, penetration testers, crypto-crackers, reverse-engineers, digital forensics analysts, and of course 3lit3 h4ck3r5.

NaijaSecCon 2018 is expected to attract more than 300 professionals from various industries including Financial Services, Insurance firms, Telcos, Oil and Gas, Conglomerates, Privately-held organizations, Military, State and Federal Government.

Through the Call for Papers, our distinguished committee will accept speaker submissions for possible inclusion in the program at the 2018 NaijaSecCon.


Call For Paper Opens: February 11 2019

Call For Paper Closes: March 16, 2019

Notification to Authors: End of March/Early April

Terms are subject to change


This is a strictly technical conference with slots also for GRC related presentations. Demo-based presentations will require live demo during the conference.
Submissions that highlight new research, tools, vulnerabilities, etc – with demos will be given priority.
Submissions that include White Papers will also be given priority.
Submissions may only be entered by researchers/speakers (no submissions from PR firms/marketing representatives).
NaijaSecCon will disqualify incomplete submissions; complete your submission in its entirety.
Your submission should clearly detail the concepts, ideas, findings, and solutions a researcher or speaking team plans to present.
Individuals may submit more than one proposal but each proposal must be submitted via a separate submission form.
Each submission must include detailed biographies of the proposed speaking team.
Submitters will be contacted directly if Review Board members have any questions about a submission.
If you have any questions regarding your submission, please email them to [email protected]


Submissions with incomplete application forms.
Submissions without an abstract, detailed outline, bio.
Submissions that have sent in only attached slides, papers, or point to a URL.
Submissions that have withheld details, or have knowingly falsified details.


Reverse Engineering
Exploitation (Offensive & Defensive)
Big Data Techniques in Cyber Security
Forensic Analysis of Cyber Crimes
Curbing insider threats
Spam Protection
Advance Persistent Threat
Security in Mobile Networks
Hardware Security
Cloud Security
Network Security
The adoption and use of information security technologies and precautions
Compliance with security policies and mandates
The development of an information security culture
Improving security awareness
Individual motivators and inhibitors of employee (insider) computer crime
Legal, societal, cross-cultural and ethical issues related to information security
Human aspects of information security
Usability of Security Software, or Usability of Security Features of Other Software
Mitigating hardware and software vulnerabilities (incl. moving target defence, zero days)
Critical infrastructure protection and resilience (incl. ICS/SCADA, industrial platforms and protocols, undersea cables and smart grids)
The Internet of Things and cyber-physical systems
Mobile, cloud and big data security
Digital trust and authentication
State-sponsored cyber operations (incl. Advanced Persistent Threats, use of proxy actors)
Attribution and digital forensics
Personal data protection, surveillance and privacy
Governance of cyberspace

Speaker benefits

Not populated yet