Advancing Offensive Security, Cyber Defense, and Real-World Threat Research.
ยซ The CIA Conference 2026 invites researchers, practitioners, red teamers, defenders and security innovators to submit original work advancing the field of cybersecurity for offensive operations, threat intelligence, and resilient defense engineering. ยป
CIA Conference
Practitioner-driven cybersecurity event
CIA Conference is a practitioner-driven cybersecurity event focused on bridging real-world attack research and defensive strategy. We welcome cutting-edge technical research that demonstrate practical impact in adversarial environments.
Adversarial machine learning, LLM exploitation, AI-powered attack tooling, and defending against AI-driven threats.
Attacking and defending cloud-native environments, container escapes, Kubernetes security, and multi-cloud risk.
Real-world attack chains, adversary simulation, evasion tactics, and full-scope engagement methodologies.
SCADA/ICS vulnerabilities, OT network defense, industrial protocol exploitation, and resilience engineering.
Proactive threat hunting, detection engineering, SOC innovation, and advanced incident response techniques.
Firmware analysis, hardware hacking, supply chain compromise detection, and embedded device exploitation.
Modern web vulnerabilities, API security, browser exploitation, and advanced injection techniques.
Behavioral anomaly detection, insider threat modeling, UEBA platforms, and privilege abuse identification.
Ransomware campaigns against industrial environments, nation-state TTPs targeting critical infrastructure, and OT-specific defensive strategies.
Firmware extraction and reverse engineering, hardware vulnerability research, embedded system exploitation, and supply chain attacks on connected devices.
Adversarial examples, model poisoning, prompt injection, data exfiltration via LLMs, and defenses against AI/ML system manipulation.
Adversarial machine learning, LLM exploitation, AI-powered attack tooling, and defending against AI-driven threats.
If your topic is strong but doesn't fit the tracks โ submit it anyway.
All submissions undergo a blind peer-review by the CIA Conference review board. We follow a merit-driven selection process. Every submission is reviewed for originality, technical depth, clarity, and factual accuracy before final decisions are made. During review, board members may reach out to speakers for additional context or clarification, especially around the novelty of the work, validation of results, or the strength of supporting evidence.
Fill in your details to submit a paper for CIACON 2026