Here We Go Again! BlueHat IL 2024!

Honored cyber community & friends: 
As always - and especially this year - anticipation is building for the upcoming BlueHat IL conference. BlueHat IL 2024 marks the seventh installment of Microsoft's famous cyber conference, held in the vibrant city of Tel Aviv, Israel.

This year's event is guaranteed to be a unique gathering for the cybersecurity community to share insights, discuss trends, and collaborate on the latest cyber challenges. Whether you're a seasoned cyber-tech researcher, innovator, or enthusiast, your presence is welcomed and valued.

Let's come together once again to explore the evolving landscape of cybersecurity and chart the path forward as a united community!

Important Dates
Call for papers closes
Apr 1, 2024
Notification to authors
By Apr 11, 2024

Topics of Interest

Any innovative research in vulnerabilities, exploits, mitigations and defense

How bad are we owned, attacks and war stories

Adversarial attacks and defenses for AI systems

Virtualization, OS, boot, and low level security

Hardware security, CPU bugs, side channels, backdoors, front doors

Advanced web security, identity vulns, authentication

Cloud, networking, or protocol security

Mobile, IoT, or critical infrastructure security

Modern cryptography and attacks

AI-based threat detection and preventions

Anything that breaks the internet, or the world as we know it.

Submission Requirements

01

Submissions must be entered by researchers / speakers (NO submissions from PR / marketing representatives).

02

BlueHat IL does not accept product or vendor-related pitches.

03

Session length – 30 or 40 min format.

04

No more than 3 speakers permitted to present on stage.

05

Each submission must be completed in its entirety. Incomplete submissions will be disqualified.

06

Your submission should clearly detail the concepts, ideas, findings and solutions you or your speaking team plan to present.

07

Individuals may submit more than one proposal; however, each proposal must be submitted via a separate submission form.

08

Each submission must include detailed biographies of the proposed speaking team.

09

Each submission should acknowledge prior work in the space, distinguishing or highlighting how your presentation is different.

10

Individuals submitting a proposal will receive an email within 48-72 hours of submission confirming their proposal has been received for review.

11

More info on how to submit and speaker travel info can be found in the CFP guidelines PDF.

12

If you have any questions regarding your submission, please write us at bluehati@microsoft.com

Review Board

Benjamin Delpy `gentilkiwi` Profile Picture Benjamin Delpy `gentilkiwi` Profile Picture
VIEW

Benjamin Delpy `gentilkiwi`

Head of CyberSecurity Services, Banque de France

Diane Dubois Profile Picture Diane Dubois Profile Picture
VIEW

Diane Dubois

Senior Security Engineer, Google

Itai Grady Profile Picture Itai Grady Profile Picture
VIEW

Itai Grady

Principal Threat Intelligence Manager, Microsoft

Tomer Schwartz Profile Picture Tomer Schwartz Profile Picture
VIEW

Tomer Schwartz

Co-founder & CTO, Dazz

Sherrod DeGrippo Profile Picture Sherrod DeGrippo Profile Picture
VIEW

Sherrod DeGrippo

Director of Threat Intelligence Strategy, Microsoft

Stav Shulman Profile Picture Stav Shulman Profile Picture
VIEW

Stav Shulman

Senior Cyber Security Researcher, Google

Tal Be'ery Profile Picture Tal Be'ery Profile Picture
VIEW

Tal Be'ery

ZenGo’s Co-Founder and CTO

Vishal Chauhan Profile Picture Vishal Chauhan Profile Picture
VIEW

Vishal Chauhan

Principal Security Research Manager, Microsoft

David Weston Profile Picture David Weston Profile Picture
VIEW

David Weston

Vice President of enterprise and OS security, Microsoft

Review Process

01

Submissions that highlight original and innovative research, tools, vulnerabilities, etc. will be given priority.

02

We recommend submitting as early as possible as slots are very limited.

03

Authors will be contacted directly if review board members have any questions about a submission.

04

Once the review process is complete, all authors will receive a confirmation of acceptance or rejection (by Apr 11, 2024).

05

Don’t be bummed if your talk is rejected! We have year-round BlueHat events and may contact you with other options.

06

Regardless of the outcome – we truly appreciate your contribution to BlueHat IL and the security community.