;
skip to main content; 
                        Deliver a 10-minute spark 
on our side stage – new this year!
Take center stage with a 30-40 minutes 
talk to share your story.
Adversarial Attacks on AI Systems (Defending and Attacking AI Implementations)
Any innovative research in vulnerabilities, exploits, mitigations, and defense.
Weaponization of AI/AI-Powered Vulnerability discovery
Leveraging AI and machine learning techniques to enhance cybersecurity-related job roles, including incident response, cyber defense, and vulnerability assessment.
AI in Social Engineering Attacks (How AI is used to enhance phishing, impersonation, ordisinformation campaigns)
How bad are we owned, attacks and war stories.
Virtualization, OS, boot, and low-level security.
Hardware security, CPU bugs, side channels, backdoors, front doors.
Advanced web security, identity vulns, authentication.
Cloud, networking, or protocol security.
Mobile, IoT, or critical infrastructure security.
Modern cryptography and attacks.
Anything that breaks the internet, or the world as we know it.
Submissions must be entered by researchers / speakers (NO submissions from PR / marketing representatives).
BlueHat IL does not accept product or vendor-related pitches.
Lighting talks - Session length – 10 min format.
Main hall - Session length – 30- or 40-min format.
No more than 3 speakers are permitted to present on the main hall stage.
Only one speaker is permitted to present on the lighting talk stage.
Each submission must be completed in its entirety. Incomplete submissions will be disqualified.
Your submission should clearly detail the concepts, ideas, findings, and solutions you or your speaking team plan to present.
Individuals may submit more than one proposal; however, each proposal must be submitted via a separate submission form.
Each submission must include detailed biographies of the proposed speaking team.
Each submission should acknowledge prior work in the space, distinguishing or highlighting how your presentation is different.
More info on how to submit and speaker travel info can be found in the CFP guidelines PDF.
If you have any questions regarding your submission, please write us at bluehati@microsoft.com
 
                                             
                                            Benjamin Delpy `gentilkiwi`
Head of CyberSecurity Services, Banque de France
 
                                             
                                            David Weston
Vice President of enterprise and OS security, Microsoft
 
                                             
                                            Diane Dubois
Tech Lead Manager, Google
 
                                             
                                            Itai Grady
Principal Threat Intelligence Manager, Microsoft
 
                                             
                                            Sherrod DeGrippo
Director of Threat Intelligence Strategy, Microsoft
 
                                             
                                            Stav Shulman
Staff Security Researcher, Google
 
                                             
                                            Tal Be'ery
ZenGo’s Co-Founder and CTO
 
                                             
                                            Vishal Chauhan
Principal Security Research Manager, Microsoft
 
                                             
                                            Valentina Palmiotti
Head of X-Force Offensive Research (XOR), IBM X-Force
 
                                             
                                            Ophir Harpaz
Vulnerability researcher at IR Labs
 
                                             
                                            Ohad Jassin
Partner GM, Microsoft
 
                                             
                                            Jonathan Jacobi
CTO Office, Dazz
 
                                             
                                            Emily Liu
Senior Technical Program Manager, Microsoft
 
                                             
                                            Aleksandra Doniec
Security Researcher, Check Point Research
Submissions that highlight original and innovative research, tools, vulnerabilities, etc. will be given priority.
We recommend submitting as early as possible as slots are very limited.
Authors will be contacted directly if review board members have any questions about a submission.
Once the review process is complete, all authors will receive a confirmation of acceptance or rejection (by Feb17, 2025).
Don’t be bummed if your talk is rejected! We have year-round BlueHat events and may contact you with other options.
Regardless of the outcome – we truly appreciate your contribution to BlueHat IL and the security community.
The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.