Get Ready for  BlueHat IL 2026!

We’re back in Tel Aviv for our ninth year - and this time, we’re stepping off the usual path.
The world is changing fast: AI, new threats, bold ideas. Everyone is finding their own way through it. Will you explore the deep woods of research? The peaks of innovation? Or the wild unknown of AI?
Wherever you are on your cyber security journey, at BlueHat IL you’ll find people ready to walk beside you.
So take a pause. Pack your backpack. Meet others who are exploring and experimenting with curiosity leading the way.

See you on the trail!

Our Tracks
Lightning Talks

Deliver a 10-minutes spark
on our side stage



Main Hall

Take center stage with a 30-40 minutes
talk to share your story

Important Dates
Call for papers closes
Jan 7, 2026
Notification to authors
By Jan 19, 2026

Topics of Interest

Turning AI into a Weapon: Weaponization of
AI/AI-Powered Vulnerability discovery.

Who let the AI into Prod? Agentic and digital workers risks: Monitoring, infra headaches, and work environments.

Putting AI on Security Duty: Using machine learning to boost threat hunting, defense, and incident response (with real-world examples).

Hackers’ Greatest Hits: Latest exploits, wild mitigations, and “wait, that’s possible?” vulnerabilities and defense research.

Securing the Web: Identity, authentication, and advanced strategies.

Infra Dungeons: Virtualization, OS, boot and low-level security.

Cloud Patrol: Cloud, network, and protocol security.

Edge Security: IoT, mobile and everything in between.

How bad are we owned? War stories, attack recaps.

Internet Apocalypse: Anything that could break the web or the world as we know it.

Submission Requirements

01

Main hall - Session length – 30 or 40 minutes format.

02

Lighting talks - Session length – 10 min format.

03

Your submission should clearly detail the concepts, ideas, findings, and solutions you or your speaking team plan to present.

04

Individuals may submit more than one proposal; however, each proposal must be submitted via a separate submission form.

05

Each submission should acknowledge prior work in the space, distinguishing or highlighting how your presentation is different.

06

Each submission must be completed in its entirety. Incomplete submissions will be disqualified.

07

No more than 3 speakers are permitted to present on the main hall stage.

08

Only one speaker is permitted to present on the lighting talk stage.

09

Each submission must include detailed biographies of the proposed speaking team.

10

Submissions must be entered by researchers / speakers (NO submissions from PR / marketing representatives).

11

BlueHat IL does not accept product or vendor-related pitches.

12

More info on how to submit and speaker travel info can be found in the CFP guidelines PDF.

13

If you have any questions regarding your submission, please write us at bluehati@microsoft.com

Review Board

Chi En (Ashley) Shen  Profile Picture Chi En (Ashley) Shen  Profile Picture
VIEW

Chi En (Ashley) Shen

Security Research Engineering Technical Leader, Cisco Talos

Ohad Jassin  Profile Picture Ohad Jassin  Profile Picture
VIEW

Ohad Jassin

Vice President GM- Microsoft Specialized Clouds, Microsoftt

Diane Dubois  Profile Picture Diane Dubois  Profile Picture
VIEW

Diane Dubois

Tech Lead Manager, Google

Daniel Goldberg  Profile Picture Daniel Goldberg  Profile Picture
VIEW

Daniel Goldberg

Security Lead, Tenzai

Itai Grady  Profile Picture Itai Grady  Profile Picture
VIEW

Itai Grady

Principal Threat Intelligence Manager, Microsoft

Benjamin Delpy 'gentilkiwi'  Profile Picture Benjamin Delpy 'gentilkiwi'  Profile Picture
VIEW

Benjamin Delpy 'gentilkiwi'

Head of CyberSecurity Services, Banque de France

Sherrod DeGrippo  Profile Picture Sherrod DeGrippo  Profile Picture
VIEW

Sherrod DeGrippo

Director of Threat Intelligence Strategy, Microsoft

Stav Shulman  Profile Picture Stav Shulman  Profile Picture
VIEW

Stav Shulman

Threat Research Team Lead, Google

Tal Be'ery   Profile Picture Tal Be'ery   Profile Picture
VIEW

Tal Be'ery

ZenGo’s Co-Founder and CTO

Tomer Teller   Profile Picture Tomer Teller   Profile Picture
VIEW

Tomer Teller

Partner Director (Product Management), Microsoft Security

Orel Siso   Profile Picture Orel Siso   Profile Picture
VIEW

Orel Siso

Senior Threat Intelligence Analyst, Microsoft

Sagi Tzadik  Profile Picture Sagi Tzadik  Profile Picture
VIEW

Sagi Tzadik

Security Researcher, Wiz

Sofia Belikovetsky   Profile Picture Sofia Belikovetsky   Profile Picture
VIEW

Sofia Belikovetsky

Principal Architect, Microsoft

Yair Netzer
  Profile Picture Yair Netzer
  Profile Picture
VIEW

Yair Netzer

Principal Security Research Manager, Microsoft

Or Yair   Profile Picture Or Yair   Profile Picture
VIEW

Or Yair

Security Research Team Lead, SafeBreach

Review Process

01

Submissions that highlight original and innovative research, tools, vulnerabilities, etc. will be given priority.

02

We recommend submitting as early as possible as slots are very limited.

03

Authors will be contacted directly if review board members have any questions about a submission.

04

Once the review process is complete, all authors will receive a confirmation of acceptance or rejection (by Jan 19, 2026).

05

Don’t be bummed if your talk is rejected! We have year-round BlueHat events and may contact you with other options.

06

Regardless of the outcome – we truly appreciate your contribution to BlueHat IL and the security community.

;;

The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.