Cybersecurity & Ransomware Live! VirtCon will bring together some of the best content and speakers on Cybersecurity worldwide to help guide attendees in Architecture/Design, Deployment, Operationalization, and Certification. This conference provides attendees with the knowledge they need to succeed with: cloud-native security, how to defend against modern threats, how to communicate imminent security threats with executive teams, how to design and deploy applications in hardened environments, Ransomware, Backup and Recovery Strategies, and so much more.
The Call for Presentations for Cybersecurity & Ransomware Live! VirtCon 2025 is now OPEN.
Proposals are due: Friday, October 25th, 2024 11:59 PM PST
Cybersecurity & Ransomware Live! VirtCon
May 13-15, 2025
Virtual Conference
Cybersecurity & Ransomware Live! VirtCon will bring together some of the best content and speakers on Cybersecurity worldwide to help guide attendees in Architecture/Design, Deployment, Operationalization, and Certification. This conference provides attendees with the knowledge they need to succeed with: cloud-native security, how to defend against modern threats, how to communicate imminent security threats with executive teams, how to design and deploy applications in hardened environments, Ransomware, Backup and Recovery Strategies, and so much more.
Cybersecurity & Ransomware Live! VirtCon will offer a combination of in-depth and interactive sessions including workshops, hands-on labs, 75-minute breakouts, and 20-minute fast focuses. We invite you to submit sessions in any and all of these categories, and you may also submit across multiple topic areas.
To help you in creating successful submissions, we want to share some of the considerations that go into our process of selecting our speakers and sessions for this event. First, each speaker will typically be selected to deliver two presentations. That means that it is in your best interest to submit at least three breakout sessions in addition to any Fast Focus topics you may be submitting. This ensures that the conference chairs have more than two options per speaker, particularly if the topic you are submitting is popular and is being submitted by a number of people for the same conference. Next, please make sure that your title is clear and appropriate to the track you are submitting it to, and that your description includes enough detail to understand what audience members will walk away from your sessions having learned. Again, many speakers often provide submissions on the same topics, meaning it comes down to a meaningful title and a quality abstract.
Wanting to dig in even deeper and offer hands on experience and learning? We are also looking for speakers willing to deliver two-day workshops and two-day hands-on labs that will be offered as part of the 2025 Virtual Seminar Training Course series.
Session, workshop, and hands-on lab proposals are welcome in the following topic areas:
Ransomware Industry
Ransomware is a complicated industry with attackers ranging from individuals to highly organized syndicates. Some operators have Service Desks with better SLA than us. We might face standard opportunistic criminals or nation level threats. The industry runs with affiliate programs and credential harvesting auctions. This track is dedicated to the higher-level descriptive sessions on how the industry works.
Security Operations Center
Cyberattacks don’t happen during office hours but mostly during nighttime. 24/7 surveillance is mandatory for companies. A Security Operations Center tries to detect and isolate threats before they escalate to incidents. There are different kinds of, different levels, different sized, and different priced SOCs.
Incident Response
When an incident happens it’s the IR-teams job to jump in, identify the threat and restoring operations. IR-teams gather evidence, expel the enemy, fixes vulnerabilities, and restores company operations.
Blue Team
Blue Team is the proactive defensive side of security operations. They aim to prevent breaches or at least slow down the enemy. Red Teaming is very popular, especially for young people, as it gives you the permission to attack someone. People should remember that for every one Red Team job offering, there are six offerings in the Blue Team side. Red Teams find vulnerabilities – Blue Team blocks/fixes them.
Red Team
Red Team is the offensive side of security operations. Red Team uses tools and techniques that aim to find vulnerabilities and bypass the defenses companies have in place.
Purple Team
Purple Teams that perform both Blue and Red Team duties. They might be an external provider that analyses and audits the whole environment, both identifying vulnerabilities and fixing or mitigating them.
OT & IoT Security
Operational networks, like in factories, are usually operated very different from Office networks. They might not have Internet access so Cloud Services are not usable. Defenses have to designed accordingly. Internet of Things, smart devices connected to and managed by Cloud Services, are an increasing attack vector to networks. Almost every home appliance now has a version with Wifi. Identifying, inventorying and protecting these new smart devices is vital.
Security in Education Institutions
Not only are education institutions prime targets for cyberattacks, but they also face a unique combination of security challenges: lack of resources (budgetary and personnel), strict privacy regulations, sensitive research data, a culture of open access to information, impermanent user roles, and a complex decision-making structure, to name just a few. This track will provide practical instruction on a wide range of security topics specifically for K-20 education IT professionals.
If you haven't logged in before, you'll be able to register.
Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.