Callย For
Papers

Advancing Offensive Security, Cyber Defense, and Real-World Threat Research.

Call for Papers โ€”
CIA Conference 2026

ยซ The CIA Conference 2026 invites researchers, practitioners, red teamers, defenders and security innovators to submit original work advancing the field of cybersecurity for offensive operations, threat intelligence, and resilient defense engineering. ยป

CIA Conference

Practitioner-driven cybersecurity event

CIAย Conference
Briefings

CIA Conference is a practitioner-driven cybersecurity event focused on bridging real-world attack research and defensive strategy. We welcome cutting-edge technical research that demonstrate practical impact in adversarial environments.

Topics of Interest

AI & Security Risks

Adversarial machine learning, LLM exploitation, AI-powered attack tooling, and defending against AI-driven threats.

Cloud Security & Container Threats

Attacking and defending cloud-native environments, container escapes, Kubernetes security, and multi-cloud risk.

Red Teaming & Attack Simulations

Real-world attack chains, adversary simulation, evasion tactics, and full-scope engagement methodologies.

Critical Infrastructure & ICS Security

SCADA/ICS vulnerabilities, OT network defense, industrial protocol exploitation, and resilience engineering.

Threat Hunting & Incident Detection

Proactive threat hunting, detection engineering, SOC innovation, and advanced incident response techniques.

Supply Chain & Hardware Security

Firmware analysis, hardware hacking, supply chain compromise detection, and embedded device exploitation.

Web Application Security

Modern web vulnerabilities, API security, browser exploitation, and advanced injection techniques.

User Behavior Analytics & Insider Threat Detection

Behavioral anomaly detection, insider threat modeling, UEBA platforms, and privilege abuse identification.

Ransomware & Nation-State Threats Targeting SCADA/ICS

Ransomware campaigns against industrial environments, nation-state TTPs targeting critical infrastructure, and OT-specific defensive strategies.

IoT Firmware Exploitation & Hardware-Level Attacks

Firmware extraction and reverse engineering, hardware vulnerability research, embedded system exploitation, and supply chain attacks on connected devices.

Adversarial AI & Model Manipulation Attacks

Adversarial examples, model poisoning, prompt injection, data exfiltration via LLMs, and defenses against AI/ML system manipulation.

AI & Security Risks

Adversarial machine learning, LLM exploitation, AI-powered attack tooling, and defending against AI-driven threats.

If your topic is strong but doesn't fit the tracks โ€” submit it anyway.

The deadline for submissions is yet to be announced.

Submission Format

  • Create a submission attachment in PDF or TXT format only.
  • Submissions must be written in English.
  • Maximum file size: 10MB.

Content Requirements

  • All submissions must be original, unpublished work not under review elsewhere.
  • Papers should include a clear abstract (150โ€“300 words), methodology, results, and references.
  • Proof-of-concept code, demos, or tooling releases are highly encouraged.
  • Responsible disclosure must be followed โ€” do not submit active zero-days without prior coordination.

Review Process

All submissions undergo a blind peer-review by the CIA Conference review board. We follow a merit-driven selection process. Every submission is reviewed for originality, technical depth, clarity, and factual accuracy before final decisions are made. During review, board members may reach out to speakers for additional context or clarification, especially around the novelty of the work, validation of results, or the strength of supporting evidence.

๐Ÿ“„Sample Submissions

Submit Your Paper

Fill in your details to submit a paper for CIACON 2026

Presenter Information

0 / 150โ€“300 words

Paper / Presentation Upload

Drag & drop your file here, or browse

Accepted: .docx, .pptx, .ppt, .pdf (max 10MB)

Files are validated for type integrity, magic bytes, and size. Executable and script files are blocked.

Identity & Privacy Preferences

References