;
skip to main content;
We’re back in Tel Aviv for our ninth year - and this time, we’re stepping off the usual path.
The world is changing fast: AI, new threats, bold ideas. Everyone is finding their own way through it. Will you explore the deep woods of research? The peaks of innovation? Or the wild unknown of AI?
Wherever you are on your cyber security journey, at BlueHat IL you’ll find people ready to walk beside you.
So take a pause. Pack your backpack. Meet others who are exploring and experimenting with curiosity leading the way.
See you on the trail!
Deliver a 10-minutes spark
on our side stage
Take center stage with a 30-40 minutes
talk to share your story
Turning AI into a Weapon: Weaponization of
AI/AI-Powered Vulnerability discovery.
Who let the AI into Prod? Agentic and digital workers risks: Monitoring, infra headaches, and work environments.
Putting AI on Security Duty: Using machine learning to boost threat hunting, defense, and incident response (with real-world examples).
Hackers’ Greatest Hits: Latest exploits, wild mitigations, and “wait, that’s possible?” vulnerabilities and defense research.
Securing the Web: Identity, authentication, and advanced strategies.
Infra Dungeons: Virtualization, OS, boot and low-level security.
Cloud Patrol: Cloud, network, and protocol security.
Edge Security: IoT, mobile and everything in between.
How bad are we owned? War stories, attack recaps.
Internet Apocalypse: Anything that could break the web or the world as we know it.
Main hall - Session length – 30 or 40 minutes format.
Lighting talks - Session length – 10 min format.
Your submission should clearly detail the concepts, ideas, findings, and solutions you or your speaking team plan to present.
Individuals may submit more than one proposal; however, each proposal must be submitted via a separate submission form.
Each submission should acknowledge prior work in the space, distinguishing or highlighting how your presentation is different.
Each submission must be completed in its entirety. Incomplete submissions will be disqualified.
No more than 3 speakers are permitted to present on the main hall stage.
Only one speaker is permitted to present on the lighting talk stage.
Each submission must include detailed biographies of the proposed speaking team.
Submissions must be entered by researchers / speakers (NO submissions from PR / marketing representatives).
BlueHat IL does not accept product or vendor-related pitches.
More info on how to submit and speaker travel info can be found in the CFP guidelines PDF.
If you have any questions regarding your submission, please write us at bluehati@microsoft.com
Chi En (Ashley) Shen
Security Research Engineering Technical Leader, Cisco Talos
Ohad Jassin
Vice President GM- Microsoft Specialized Clouds, Microsoftt
Diane Dubois
Tech Lead Manager, Google
Daniel Goldberg
Security Lead, Tenzai
Itai Grady
Principal Threat Intelligence Manager, Microsoft
Benjamin Delpy 'gentilkiwi'
Head of CyberSecurity Services, Banque de France
Sherrod DeGrippo
Director of Threat Intelligence Strategy, Microsoft
Stav Shulman
Threat Research Team Lead, Google
Tal Be'ery
ZenGo’s Co-Founder and CTO
Tomer Teller
Partner Director (Product Management), Microsoft Security
Orel Siso
Senior Threat Intelligence Analyst, Microsoft
Sagi Tzadik
Security Researcher, Wiz
Sofia Belikovetsky
Principal Architect, Microsoft
Yair Netzer
Principal Security Research Manager, Microsoft
Or Yair
Security Research Team Lead, SafeBreach
Submissions that highlight original and innovative research, tools, vulnerabilities, etc. will be given priority.
We recommend submitting as early as possible as slots are very limited.
Authors will be contacted directly if review board members have any questions about a submission.
Once the review process is complete, all authors will receive a confirmation of acceptance or rejection (by Jan 19, 2026).
Don’t be bummed if your talk is rejected! We have year-round BlueHat events and may contact you with other options.
Regardless of the outcome – we truly appreciate your contribution to BlueHat IL and the security community.
The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.