Call for Speakers

in 43 days

AI Security Summit - Paris

event date

7 Jul 2026

location

Pavillon Vendôme Paris, France


The AI Security Summit is coming to Paris, and we're looking for the leaders who've made the hard calls.

AISS Paris runs alongside RAISE Summit (July 8-9) at the Pavillon Vendôme — a 10-minute walk from the Louvre. It's an executive-focused event for the people deciding how their organizations build, buy, and defend AI systems. Same room as the RAISE crowd: CISOs, CTOs, VPs of Security, and Heads of AI.

This is the Leadership Track. Not a stage for product pitches or slide decks about "the AI threat landscape." We want the working session — the room where leaders who are actually deploying these systems share what's working, what isn't, and what they'd do differently. Real decisions, real trade-offs, real numbers. The audience already knows what an LLM is; get to the interesting part.

We're specifically looking for: CISOs and security leaders who've stood up AI governance programs and can show what survived contact with reality. Leaders who've negotiated vendor and model risk at the executive level and have a framework that's been battle-tested. Builders who've staffed a security org for threats that didn't exist two years ago. And the rare leader willing to walk through a real incident post-mortem with the decisions, the trade-offs, and what they got wrong.

Our bar is high and our acceptance rate is low. We'd rather have 5 incredible talks than 40 forgettable ones. The audience is senior, technical, and operational — they're here to take something back to their org on Monday, not to be sold to.

Show us what you've built, decided, or rebuilt. Submit your proposal below.

open, 23 days left
Call for Speakers
Call opens at 12:00 AM

12 May 2026

Call closes at 11:59 PM

16 Jun 2026

Call closes in Romance Daylight Time (UTC+02:00) timezone.
Closing time in your timezone () is .

This is the Leadership Track. We accept 35-minute talks, lightning talks, and workshops — no panels, no fireside chats, no "state of the industry" keynotes. The format is the wrapper; the talk has to deliver.

Every accepted talk must include original work. For the Leadership Track, that means a real decision framework, a post-mortem with the trade-offs left in, original data from a program you've run, or a strategic approach that's been pressure-tested in production. If your talk could be delivered by someone who read the same articles as you, it won't make the cut.

Topics

We're interested in talks that advance the practice of AI security leadership. Priority areas include, but aren't limited to:

  • AI governance and org design: building (or rebuilding) the program — structure, ownership, headcount, where it lives, how it reports
  • Board-level risk communication: how you frame AI risk for the board, what works, what doesn't, and the slides you actually use
  • Model and vendor due diligence: how you evaluate providers, what you require contractually, where exposure hides, and what you've stopped accepting
  • Staffing for the new threat surface: roles that didn't exist two years ago, where you're sourcing talent, and how you're evolving existing teams
  • Regulatory and compliance strategy: navigating the EU AI Act, sector-specific frameworks, and how to make compliance operational rather than performative
  • Real incident reviews: what happened, what you decided in the room, what the trade-offs were, and what you'd do differently
  • The hard calls: the decisions you didn't have a playbook for — build vs. buy, internal vs. third-party models, what you've shut down, what you've doubled down on

If you're working on a problem at the leadership level that doesn't fit neatly into these categories, submit anyway. We leave room for the unexpected.

What we don't want

  • Product pitches or vendor demos disguised as leadership talks
  • High-level overviews of the AI threat landscape (the audience already knows)
  • Talks without original thinking, real data, or a battle-tested decision framework
  • Content that has already been presented at other conferences without significant new material
  • Speculative talks about theoretical risks without concrete, operational substance

Formats

  • 35-minute talk: the main format. Deep enough to walk through a real program, framework, or post-mortem.
  • Lightning talk: 10 minutes. One idea, one decision, one finding — sharp and specific.
  • Workshop: hands-on, interactive, small-group. For frameworks the audience can actually leave with and apply.

Level of expertise

Talks should target a senior, technically literate audience. Assume attendees run security, AI, or risk functions at scale and have working knowledge of machine learning, software security, and current AI deployment patterns. You don't need to explain what an LLM is or what prompt injection means.

Target audience

The Leadership Track audience includes: CISOs, CTOs, VPs of Security, Heads of AI, Heads of Risk, and security leaders accountable for AI risk at the executive level. These are people who set budgets, choose vendors, and answer to the board when something goes wrong. They're here to take something back to their org on Monday.

Selection criteria

Proposals are evaluated on:

  • Originality: Is this a new approach, new data, or a new framework — or just a retelling of the consensus?
  • Operational depth: Does the talk go past the principle and into the program?
  • Specificity: Can you point to a concrete decision, framework, or outcome?
  • Practical value: Will an attendee leave with something they can take to their team?
  • Clarity: Is the proposal specific about what the audience will learn and why it matters now?

We reject more proposals than we accept. A strong proposal is specific: it tells us exactly what decision or framework you'll walk through, what the audience will leave with, and why it matters now.


event fee

free for speakers

Login with your preferred account


If you haven't logged in before, you'll be able to register.

Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.