Rules & Conduct

Speakers will be required to agree to each commitment below during the submission form process in order to be considered for inclusion in the conference agenda:

  • Presenters grant the Arab Security Conference ‘s team permission to reproduce and distribute any materials provided by the presenter for use in the proposed presentation in online conference proceedings.
  • Presenter warrants and represents that he/she has all rights and permissions necessary for any material included in his/her presentation and fully indemnifies Arab Security Conference ‘s team for any costs, fees, or judgments, including reasonable attorney fees, resulting from a claim by a third party that materials provided by presenter violate such third party’s rights.
  • Presenters grant Arab Security Conference ‘s team permission to edit biographies, session titles, and abstracts to ensure consistency in program and promotional materials.
  • Presenters grant permission to Arab Security Conference ‘s team, or anyone acting on their behalf, permission to photograph, film, or otherwise record and use their name, likeness, image, voice, and comments and to publish, reproduce, exhibit, distribute, broadcast, edit, or digitize the resulting images and materials in publications, advertising materials, or in any other form, in any media now existing or hereinafter invented, and for any purpose worldwide without compensation.
  • Starting date to join on 24 March 2024
  • Submission Deadline on 20 June 2024
  • Notification of Acceptance on 18 July 2024
  • Starting date to join on 24 March 2024
  • Submission Deadline on 20 June 2024
  • Notification of Acceptance on 18 July 2024

Topics of interest include, but are not limited to the following:

  • Cloud Security
  • File System Security
  • SS7/GSM/VoIP Security
  • 3G/4G/WIMAX Security
  • Security of Medical Devices
  • Smartphone / Mobile Security
  • Critical Infrastructure Security
  • Smart Card and Physical Security
  • Network Protocols, Analysis, and Attacks
  • Applications of Cryptographic Techniques
  • Side Channel Analysis of Hardware Devices
  • Analysis of Malicious Code / Viruses / Malware
  • Hardware-based attacks and reverse engineering
  • Data Recovery, Forensics, and Incident Response
  • Artificial Intelligence / Machine Learning for Security
  • Windows / Linux / OS X / *NIX Security Vulnerabilities
  • Next Generation Exploit and Exploit Mitigation Techniques
  • NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security

 

Briefings: 30 minutes for managerial presentations, and up to 2 hours for technical workshop presentations.

Conference Technical Domains

  • Submissions may only be entered by researchers/speakers (no submissions from PR firms/marketing representatives).
  • Arab Security Conference does not accept product or vendor-related pitches. Arab Security Conference disqualifies any product or vendor pitch.
  • Arab Security Conference will disqualify incomplete submissions; complete your submission in its entirety.
  • Your submission should clearly detail the concepts, ideas, findings, and solutions a researcher or speaking team plans to present.
  • Submissions that highlight new research, tools, vulnerabilities, etc. will be given priority.
  • Submissions that include White Papers will also be given priority.
  • Individuals may submit more than one proposal but each proposal must be submitted via a separate submission form.
  • Each submission must include a detailed biography of the proposed speaker.
  • Submitters will be contacted directly if CFP Review Committee has any questions about a submission.
  • If you have any questions regarding your submission, please email them to speakers@arabsecurityconference.com .

Important Dates

Submission deadline

  • 20 June 2024

Notification of acceptance

  • 18 July 2024

REGISTRATION CLOSED

Call For Speakers 2024

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

Chief Security Officer at Thndr

Eng. Hassan Mourad

Director, Cybersecurity Tower Lead at PwC ETIC

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

CISO at Thundr

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

Chief Security Engineer at CyShield

Eng. Hassan Mourad

Egypt Security Services Leader at IBM

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

Chief Security Engineer at CyShield

Eng. Hassan Mourad

Security Technical Leader, Cisco

Dr. Sherif El-Kassas

Professor in the department of computer science and engineering at the American University in Cairo

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

Chief Security Engineer at CyShield

Eng. Hassan Mourad

Security Technical Leader, Cisco

Dr. Ashraf Abdelwahab

Digital Transformation Director, Public Sector, SAP, Egypt

Dr. Emadeldin Helmy Khalil

Cyber Security Resilience Exec Director

Dr. Fathy Helail

Professor in Mathematical department in German University in Cairo (GUC).

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Dr. Sherif El-Kassas

Professor in the department of computer science and engineering at the american university in cairo

Dr. Aboul Ella Hassanien

Chair at Scientific Research Group in Egypt (SRGE)

Dr. Gamal Darwish

Head of computer science and information systems sector at supreme council of universities

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Dr. Sherif Hashem

Vice president for cyber security at the national telecom regulatory authority (NTRA), Egypt

Dr. Sherif El-Kassas

Professor in the department of computer science and engineering at the american university in cairo

Sherif El-Kassas is currently a professor in the Department of Computer Science and Engineering at The American University in Cairo. His research interests are focused on security management, the application of formal methods in software engineering and computer security, and open source technologies. El-Kassas received his PhD from the Eindhoven University of Technology in the Netherlands.

Conference Speaker Agreement

This Agreement defines the obligations of you, (“Speaker”) and Arab Security Conference’s team with respect to the Conference (collectively “Parties”).

SPEAKER COMMITMENTS:

Speakers will be required to agree to each commitment below during the submission form process in order to be considered for inclusion in the conference agenda:

  • Presenters grant the Arab Security Conference ‘s team permission to reproduce and distribute any materials provided by the presenter for use in the proposed presentation in online conference proceedings.
  • Presenter warrants and represents that he/she has all rights and permissions necessary for any material included in his/her presentation and fully indemnifies Arab Security Conference ‘s team for any costs, fees, or judgments, including reasonable attorney fees, resulting from a claim by a third party that materials provided by presenter violate such third party’s rights.
  • Presenters grant Arab Security Conference ‘s team permission to edit biographies, session titles, and abstracts to ensure consistency in program and promotional materials.
  • Presenters grant permission to Arab Security Conference ‘s team, or anyone acting on their behalf, permission to photograph, film, or otherwise record and use their name, likeness, image, voice, and comments and to publish, reproduce, exhibit, distribute, broadcast, edit, or digitize the resulting images and materials in publications, advertising materials, or in any other form, in any media now existing or hereinafter invented, and for any purpose worldwide without compensation.

PRESENTATION INFORMATION:

The format PowerPoint template to be utilized for all presentations will be available upon acceptance to all speakers. The speaker agrees to transfer the presentation to the conference template. The speaker’s PowerPoint presentation must be submitted in .ppt format only and be editable. In addition, all materials (i.e. PowerPoint slides and/or any handouts) must be submitted for electronic review by the CFP Review Committee by 11 August 2024. Speakers who do not submit by this deadline may be replaced at the sole discretion of the Arab Security Conference‘s team. All materials and any questions should be sent to speakers@arabsecurityconference.com.

SPEAKING TIMES
Track assignments and final session times will be finalized in August. Speakers concerned about their speaking time can expect to hear from the Arab Security Conference’s team on 18 July 2024. As a reminder, registration for the event is required so that speakers participate in the one-week event.

Arab Security Conference’s team reserves the right to terminate this agreement if materials violating the intellectual property rights of any other party are used or submitted for use as part of the presentation, or if presentation materials are not submitted in a timely and complete manner; or if Speaker fails to appear at the Event; or if the Event is canceled for any reason. You agree to notify by writing to speakers@arabsecurityconference.com  immediately if an emergency keeps you from meeting the requirements of this Agreement.

By submitting the information below, I hereby understand and agree to the above conditions as listed.

TOP