Get Ready for  BlueHat IL 2025!

The countdown has begun for BlueHat IL 2025, and we’re thrilled to welcome you all back!

Now in its eighth edition, Microsoft’s renowned cyber conference returns to the vibrant and dynamic city of Tel Aviv, Israel.
This year’s event promises to be an exceptional gathering, where our community will come together to exchange knowledge, explore emerging trends, and address the pressing challenges of the cybersecurity world.
Whether you’re a seasoned researcher, a forward-thinking innovator, or simply someone passionate about cybersecurity, there’s a place for you in this limitless classroom of ideas and opportunities.
So, let’s all sharpen our pencils (or keyboards!), and get ready to explore the ever-evolving world of cybersecurity. Together, we’ll continue charting the future as a united and collaborative community.

We’re looking forward to seeing you there

Our Tracks
Lightning Talks

Deliver a 10-minute spark
on our side stage – new this year!



Main Hall

Take center stage with a 30-40 minutes
talk to share your story.

Important Dates
Call for papers closes
Feb 6, 2025
Notification to authors
By Feb 17, 2025

Topics of Interest

Adversarial Attacks on AI Systems (Defending and Attacking AI Implementations)

Any innovative research in vulnerabilities, exploits, mitigations, and defense.

Weaponization of AI/AI-Powered Vulnerability discovery

Leveraging AI and machine learning techniques to enhance cybersecurity-related job roles, including incident response, cyber defense, and vulnerability assessment.

AI in Social Engineering Attacks (How AI is used to enhance phishing, impersonation, ordisinformation campaigns)

How bad are we owned, attacks and war stories.

Virtualization, OS, boot, and low-level security.

Hardware security, CPU bugs, side channels, backdoors, front doors.

Advanced web security, identity vulns, authentication.

Cloud, networking, or protocol security.

Mobile, IoT, or critical infrastructure security.

Modern cryptography and attacks.

Anything that breaks the internet, or the world as we know it.

Submission Requirements

01

Submissions must be entered by researchers / speakers (NO submissions from PR / marketing representatives).

02

BlueHat IL does not accept product or vendor-related pitches.

03

Lighting talks - Session length – 10 min format.

04

Main hall - Session length – 30- or 40-min format.

05

No more than 3 speakers are permitted to present on the main hall stage.

06

Only one speaker is permitted to present on the lighting talk stage.

07

Each submission must be completed in its entirety. Incomplete submissions will be disqualified.

08

Your submission should clearly detail the concepts, ideas, findings, and solutions you or your speaking team plan to present.

09

Individuals may submit more than one proposal; however, each proposal must be submitted via a separate submission form.

10

Each submission must include detailed biographies of the proposed speaking team.

11

Each submission should acknowledge prior work in the space, distinguishing or highlighting how your presentation is different.

12

More info on how to submit and speaker travel info can be found in the CFP guidelines PDF.

13

If you have any questions regarding your submission, please write us at bluehati@microsoft.com

Review Board

Benjamin Delpy `gentilkiwi`  Profile Picture Benjamin Delpy `gentilkiwi`  Profile Picture
VIEW

Benjamin Delpy `gentilkiwi`

Head of CyberSecurity Services, Banque de France

David Weston  Profile Picture David Weston  Profile Picture
VIEW

David Weston

Vice President of enterprise and OS security, Microsoft

Diane Dubois  Profile Picture Diane Dubois  Profile Picture
VIEW

Diane Dubois

Tech Lead Manager, Google

Itai Grady  Profile Picture Itai Grady  Profile Picture
VIEW

Itai Grady

Principal Threat Intelligence Manager, Microsoft

Sherrod DeGrippo  Profile Picture Sherrod DeGrippo  Profile Picture
VIEW

Sherrod DeGrippo

Director of Threat Intelligence Strategy, Microsoft

Stav Shulman  Profile Picture Stav Shulman  Profile Picture
VIEW

Stav Shulman

Staff Security Researcher, Google

Tal Be'ery   Profile Picture Tal Be'ery   Profile Picture
VIEW

Tal Be'ery

ZenGo’s Co-Founder and CTO

Vishal Chauhan  Profile Picture Vishal Chauhan  Profile Picture
VIEW

Vishal Chauhan

Principal Security Research Manager, Microsoft

Valentina Palmiotti Profile Picture Valentina Palmiotti Profile Picture
VIEW

Valentina Palmiotti

Head of X-Force Offensive Research (XOR), IBM X-Force

Ophir Harpaz  Profile Picture Ophir Harpaz  Profile Picture
VIEW

Ophir Harpaz

Vulnerability researcher at IR Labs

Ohad Jassin  Profile Picture Ohad Jassin  Profile Picture
VIEW

Ohad Jassin

Partner GM, Microsoft

Jonathan Jacobi  Profile Picture Jonathan Jacobi  Profile Picture
VIEW

Jonathan Jacobi

CTO Office, Dazz

Emily Liu  Profile Picture Emily Liu  Profile Picture
VIEW

Emily Liu

Senior Technical Program Manager, Microsoft

Aleksandra Doniec  Profile Picture Aleksandra Doniec  Profile Picture
VIEW

Aleksandra Doniec

Security Researcher, Check Point Research

Review Process

01

Submissions that highlight original and innovative research, tools, vulnerabilities, etc. will be given priority.

02

We recommend submitting as early as possible as slots are very limited.

03

Authors will be contacted directly if review board members have any questions about a submission.

04

Once the review process is complete, all authors will receive a confirmation of acceptance or rejection (by Feb17, 2025).

05

Don’t be bummed if your talk is rejected! We have year-round BlueHat events and may contact you with other options.

06

Regardless of the outcome – we truly appreciate your contribution to BlueHat IL and the security community.

;;