BSides Security Conference 2026. Join one of Eastern India’s biggest cybersecurity events and share your research, tools, and real-world experiences with practitioners, engineers, and hackers from across the country.
The Call for Speakers is open to both new and experienced speakers who have practical, technical, and impactful content to share.
Important Dates
Topics of interest
We welcome original, technically strong, and practical talks on (but not limited to) the following categories.
| No | Generalized Category | Mapped Topics |
|---|---|---|
| 1 | Network & Infrastructure Security | Networks, SDN, WLAN & Bluetooth Security, Firewall Evasion, Telecom, Radio/RF Security/Hacking, Satellites/Space Hacking, Smart Cities, ATM Security/Hacking |
| 2 | Web, API & Browser Security | Web, Web Application Hacking, Browser Security, Bug Bounty, New Vulnerabilities & Exploits |
| 3 | Cloud, Virtualization & Distributed Systems Security | Cloud, Cloud Security, Web3/Web3.0, Blockchain, Blockchain Hacking, Metaverse |
| 4 | Mobile & Wireless Device Security | Mobile, Mobile Application Security/Hacking, Android Security/Hacking, iOS Security/Hacking |
| 5 | IoT, Embedded, Hardware & Industrial Security | IoT, Hardware, Embedded, ICS/SCADA, Hardware/IoT/ICS/SCADA Security, Car Hacking |
| 6 | Malware, Reverse Engineering & Exploit Development | Malware Analysis, Reverse Engineering, New Exploits |
| 7 | AI, ML & Emerging Tech Security | AI, AI Hacking/Security |
| 8 | Digital Forensics & Incident Response | Forensics |
| 9 | Human-centric Security | Social Engineering, Physical Security |
| 10 | Tools, Research & Offensive Security Operations | Red Teaming, Open Source Tool Release/Demo, Cryptography |
If your talk does not fit neatly into these topics but is clearly security-focused and practical, you are still encouraged to submit.
Who should submit
You do not need prior speaking experience; clear ideas, real impact, and honest technical depth matter more.
Submission guidelines
A strong proposal should be:
Each submission must include:
Product pitches, vendor sales talks, and purely promotional content will be rejected.
Review process
All submissions will be reviewed by a technical review panel and the core conference team.
Talks are evaluated on originality, technical depth, clarity, and relevance to the community.
Preference may be given to:
Due to limited slots, some good talks may still be declined; this is often due to overlap with already accepted topics or schedule limits, not just quality.
Speaker benefits
For accepted speakers (primary speaker per talk):
In case of multiple speakers for a talk, only one speaker will be eligible for travel reimbursement; accommodation may be provided on a shared basis.
Terms and conditions
How to submit and contact
Speakers are also encouraged to follow the event’s social media handles for updates, reminders, and tips about the CFP window and final program announcements.