Submission Guidelines

All submissions should include a title, a brief abstract of the proposed topic, and the speaker’s bio. Please define the target audience (i.e. CISOs, security directors, IT auditors), and the level of intended audience knowledge: Introductory or Advanced, and Technical or Non-Technical. Please identify the specific summit where you are interested in presenting and any date preferences or scheduling restrictions.

Selection Criteria

Submissions will be selected based upon the relevance and timeliness of the topic, the depth and organization of the abstract, and the qualifications of the speaker and the crowd at the summit.

Conference Structure

Conference sessions are divided into three information tracks on the conference days. Sessions are scheduled to maximize the breadth of options available to attendees and to avoid overlapping topics.

Speaker Benefits

Speakers receive a Speaker Conference Pass, which provides access to all standard sessions, keynotes, panels, and complimentary lunch and a free ticket at the speaker table at the Gala Award ceremony and the CEO networking cocktail party. Additionally, speakers will receive extensive exposure in the CyberHub Summit program and on the CyberHub Summit website. Speaking at CyberHub Summit creates an excellent opportunity to meet and network with fellow presenters, colleagues, and peers. Speakers are not provided a speaking fee nor reimbursed for travel costs.