Rules & Conduct

Speakers will be required to agree to each commitment below during the submission form process in order to be considered for inclusion in the conference agenda:

  • Presenters grant the Arab Security Conference ‘s team permission to reproduce and distribute any materials provided by the presenter for use in the proposed presentation in online conference proceedings.
  • Presenter warrants and represents that he/she has all rights and permissions necessary for any material included in his/her presentation and fully indemnifies Arab Security Conference ‘s team for any costs, fees, or judgments, including reasonable attorney fees, resulting from a claim by a third party that materials provided by presenter violate such third party’s rights.
  • Presenters grant Arab Security Conference ‘s team permission to edit biographies, session titles, and abstracts to ensure consistency in program and promotional materials.
  • Presenters grant permission to Arab Security Conference ‘s team, or anyone acting on their behalf, permission to photograph, film, or otherwise record and use their name, likeness, image, voice, and comments and to publish, reproduce, exhibit, distribute, broadcast, edit, or digitize the resulting images and materials in publications, advertising materials, or in any other form, in any media now existing or hereinafter invented, and for any purpose worldwide without compensation.
  • Starting date to join on 19 March 2025
  • Submission Deadline on 17 June 2025
  • Notification of Acceptance on 10 July 2025

Which topic you can give a speech in ?

 

- Cyber Crime

- Cyber Warfare and Defense.

- Cyber Resilience

- Digital Economy

- IOT & Big Data Security

- Blockchain Technology

- Critical Infrastructure Security & Compliance

- Physical Security & Environmental Controls

- Cyber Security for Energy Delivery Systems (CEDS)

- Artificial Intelligence & Machine Learning In Cyber Security

- Telecommunication Security

- Aviation Cyber Security

- Satellite Cyber Security

- Cloud Security

- AI-powered malware

- AI in cybersecurity

- The future of cybersecurity

- Quantum Cybersecurity

- Zero Trust Security

- AI and Big data analysis in Cybersecurity

- DevSecOps

- Large Language Model (LLM) Security & Guardrails

Briefings: 30 minutes for managerial presentations, and up to 2 hours for technical workshop presentations.

Conference Technical Domains

  • Submissions may only be entered by researchers/speakers (no submissions from PR firms/marketing representatives).
  • Arab Security Conference does not accept product or vendor-related pitches. Arab Security Conference disqualifies any product or vendor pitch.
  • Arab Security Conference will disqualify incomplete submissions; complete your submission in its entirety.
  • Your submission should clearly detail the concepts, ideas, findings, and solutions a researcher or speaking team plans to present.
  • Submissions that highlight new research, tools, vulnerabilities, etc. will be given priority.
  • Submissions that include White Papers will also be given priority.
  • Individuals may submit more than one proposal but each proposal must be submitted via a separate submission form.
  • Each submission must include a detailed biography of the proposed speaker.
  • Submitters will be contacted directly if CFP Review Committee has any questions about a submission.
  • If you have any questions regarding your submission, please email them to speakers@arabsecurityconference.com .

Important Dates

Starting Date

  • 19 March 2025

Submission deadline

  • 17 June 2025

Notification of acceptance

  • 10 July 2025

Registeration For The Speakers

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

Chief Security Officer at Thndr

Sherif Shaltout

Regional Manager - MENA at Liquid C2 MENA

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

Chief Security Officer at Thndr

Eng. Hassan Mourad

Director, Cybersecurity Tower Lead at PwC ETIC

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

CISO at Thundr

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

Chief Security Engineer at CyShield

Eng. Hassan Mourad

Egypt Security Services Leader at IBM

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

Chief Security Engineer at CyShield

Eng. Hassan Mourad

Security Technical Leader, Cisco

Dr. Sherif El-Kassas

Professor in the department of computer science and engineering at the American University in Cairo

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Eng. Ahmed Saafan

Chief Security Engineer at CyShield

Eng. Hassan Mourad

Security Technical Leader, Cisco

Dr. Ashraf Abdelwahab

Digital Transformation Director, Public Sector, SAP, Egypt

Dr. Emadeldin Helmy Khalil

Cyber Security Resilience Exec Director

Dr. Fathy Helail

Professor in Mathematical department in German University in Cairo (GUC).

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Dr. Sherif El-Kassas

Professor in the department of computer science and engineering at the american university in cairo

Dr. Aboul Ella Hassanien

Chair at Scientific Research Group in Egypt (SRGE)

Dr. Gamal Darwish

Head of computer science and information systems sector at supreme council of universities

Dr. Nashwa Abdelbaki

Director, Information Security Program, School of Communication and Information Technology Nile University

Dr. Sherif Hashem

Vice president for cyber security at the national telecom regulatory authority (NTRA), Egypt

Dr. Sherif El-Kassas

Professor in the department of computer science and engineering at the american university in cairo

Sherif El-Kassas is currently a professor in the Department of Computer Science and Engineering at The American University in Cairo. His research interests are focused on security management, the application of formal methods in software engineering and computer security, and open source technologies. El-Kassas received his PhD from the Eindhoven University of Technology in the Netherlands.

Conference Speaker Agreement

This Agreement defines the obligations of you, (“Speaker”) and Arab Security Conference’s team with respect to the Conference (collectively “Parties”).

SPEAKER COMMITMENTS:

Speakers will be required to agree to each commitment below during the submission form process in order to be considered for inclusion in the conference agenda:

  • Presenters grant the Arab Security Conference ‘s team permission to reproduce and distribute any materials provided by the presenter for use in the proposed presentation in online conference proceedings.
  • Presenter warrants and represents that he/she has all rights and permissions necessary for any material included in his/her presentation and fully indemnifies Arab Security Conference ‘s team for any costs, fees, or judgments, including reasonable attorney fees, resulting from a claim by a third party that materials provided by presenter violate such third party’s rights.
  • Presenters grant Arab Security Conference ‘s team permission to edit biographies, session titles, and abstracts to ensure consistency in program and promotional materials.
  • Presenters grant permission to Arab Security Conference ‘s team, or anyone acting on their behalf, permission to photograph, film, or otherwise record and use their name, likeness, image, voice, and comments and to publish, reproduce, exhibit, distribute, broadcast, edit, or digitize the resulting images and materials in publications, advertising materials, or in any other form, in any media now existing or hereinafter invented, and for any purpose worldwide without compensation.

PRESENTATION INFORMATION:

The format PowerPoint template to be utilized for all presentations will be available upon acceptance to all speakers. The speaker agrees to transfer the presentation to the conference template. The speaker’s PowerPoint presentation must be submitted in .ppt format only and be editable. In addition, all materials (i.e. PowerPoint slides and/or any handouts) must be submitted for electronic review by the CFP Review Committee by 11 August 2024. Speakers who do not submit by this deadline may be replaced at the sole discretion of the Arab Security Conference‘s team. All materials and any questions should be sent to speakers@arabsecurityconference.com.

SPEAKING TIMES
Track assignments and final session times will be finalized in August. Speakers concerned about their speaking time can expect to hear from the Arab Security Conference’s team on 18 July 2024. As a reminder, registration for the event is required so that speakers participate in the one-week event.

Arab Security Conference’s team reserves the right to terminate this agreement if materials violating the intellectual property rights of any other party are used or submitted for use as part of the presentation, or if presentation materials are not submitted in a timely and complete manner; or if Speaker fails to appear at the Event; or if the Event is canceled for any reason. You agree to notify by writing to speakers@arabsecurityconference.com  immediately if an emergency keeps you from meeting the requirements of this Agreement.

By submitting the information below, I hereby understand and agree to the above conditions as listed.

TOP