We’re back! BlueHat IL 2022

It's been a wild year to say the least. But we are finally back! And this time, we are going bigger and crazier than ever before. If you’re a cyber-research revolutionary, game changer, innovator or thought leader – we want you! Yes, you!
Announcing BlueHat IL – a special edition of Microsoft’s leading cybersecurity conference, to be held for the 5th time in Tel Aviv, Israel. Over the last decade, BlueHat conferences have drawn the brightest minds in security to examine the industry’s key challenges. And now, BlueHat IL is taking it to the next level.

Important Dates
Call for papers closes
Jan 9, 2022
Notification to authors
By Jan 16, 2022
BlueHat IL
Mar 2-3, 2022

Topics of Interest

Any innovative research in vulnerabilities, exploits, mitigations and defense

How bad are we owned, attacks and war stories

Virtualization, OS, boot, and low level security

Hardware security, CPU bugs, side channels, backdoors, front doors

Advanced web security, identity vulns, authentication

Cloud, networking, or protocol security

Mobile, IoT, or critical infrastructure security

Modern cryptography and attacks

Anything that breaks the internet or the world as we know it

Submission Requirements

01

Submissions may only be entered by researchers / speakers (NO submissions from PR / marketing representatives).

02

BlueHat IL does not accept product or vendor-related pitches.

03

Session length – 30 or 45 min format.

04

No more than 3 speakers permitted to present on stage.

05

Each submission must be completed in its entirety. Incomplete submissions will be disqualified.

06

Your submission should clearly detail the concepts, ideas, findings and solutions you or your speaking team plan to present.

07

Individuals may submit more than one proposal but each proposal must be submitted via a separate submission form.

08

Each submission must include detailed biographies of the proposed speaking team.

09

Each submission should acknowledge prior work in the space, distinguishing or highlighting how your presentation is different.

10

Individuals submitting a proposal will receive an email within 48-72 hours of submission confirming their proposal has been received for review.

11

More info on how to submit and speaker travel info can be found in the CFP guidelines PDF.

12

If you have any questions regarding your submission, please write us at bluehati@microsoft.com

Review Board

Michal Braverman Blumenstyk Profile Picture Michal Braverman Blumenstyk Profile Picture
VIEW

Michal Braverman Blumenstyk

Could & AI Security
CTO, Microsoft

Aanchal Gupta Profile Picture Aanchal Gupta Profile Picture
VIEW

Aanchal Gupta

VP, Azure Security
Microsoft

Matt Miller Profile Picture Matt Miller Profile Picture
VIEW

Matt Miller

Partner Security Software
Engineer, Microsoft

Tomer Teller Profile Picture Tomer Teller Profile Picture
VIEW

Tomer Teller

Principle Group Program Manager, Microsoft

Ophir Harpaz Profile Picture Ophir Harpaz Profile Picture
VIEW

Ophir Harpaz

Security Research Team Lead, Akamai (Guardicore)

Matt Suiche Profile Picture Matt Suiche Profile Picture
VIEW

Matt Suiche

Founder @ Comae

Review Process

1 icon

Submissions that highlight original and innovative research, tools, vulnerabilities, etc. will be given priority.

2 icon

We recommend submitting as early as possible as slots are super limited.

3 icon

Authors will be contacted directly if review board members have any questions about a submission.

4 icon

Once the review process is complete, all authors will receive a confirmation of acceptance or rejection (by Dec 12, 2019).

5 icon

Don’t be bummed if your talk is rejected! We have year-round BlueHat events and may contact you with other options.

6 icon

Regardless of the outcome – we truly appreciate your contribution to BlueHat IL and the security community.