Call for Speakers

in 2 months

Supply Chain Security and Third-Party Risk Summit | 2026

event date

18 Mar 2026

location

Online


The global software supply chain has become the soft underbelly of modern enterprise, with attacks on vendors and open-source components creating cascading crises.

Share your insights at SecurityWeek's Supply Chain & Third-Party Risk Summit as we guide enterprises in building a truly resilient supply chain, moving beyond legacy third-party risk management to a proactive security strategy.

Submit your speaking proposal to be part of the discussion as we explore the latest government mandates, the role of AI in securing the CI/CD pipeline, and the operational reality of leveraging Software Bills of Materials (SBOMs) and unified platforms to defend against increasingly sophisticated threats that exploit the weakest link.

open, 7 days left
Call for Speakers
Call opens at 12:00 AM

02 Dec 2025

Call closes at 11:59 PM

16 Jan 2026

Call closes in Eastern Standard Time (UTC-05:00) timezone.
Closing time in your timezone () is .

The Call for Presentations/speakers) (CFP)for SecurityWeek's 2026 Supply Chain Security & Third-Party Risk Summit is open through January 16, 2026. (Submit early for increased chances of acceptance!)

This online event is expected to attract more than 1,500 attendee registrations from around the world.

Key topics of interest include, but don't need to be limited to:

  • Evolving Adversaries Targeting Software Supply Chain: Understanding how sophisticated nation-state actors and cybercriminals are exploiting software supply chains, from code repositories to hardware and firmware.
  • Proactive Third-Party Risk: Building a continuous vendor risk management program that goes beyond questionnaires to include rigorous technical validation of products and services.
  • Secure by Design: The shift-left movement and integrating automated security tools into the CI/CD pipeline to prevent vulnerabilities from reaching production.
  • Software Transparency: Preparing for new government regulations, including the EU's Cyber Resilience Act, by operationalizing Software Bills of Materials (SBOMs).
  • Threat Intelligence & Vulnerability Monitoring: Leveraging curated threat intelligence feeds and vulnerability exploitability exchange (VEX) to proactively monitor for risks within your supply chain.


Tips for Acceptance:

Present Virtually – Presenters must be available to present virtually and have access to high-speed internet and a computer with high quality camera and microphone.

End Users Preferred - SecurityWeek events aim to have strong representation from cybersecurity end users (practitioners) (sponsorships are available for interested vendors)

Be Original – Proposed talks should be original and not have been presented at other events. We are looking for new, innovative talks that have not been seen elsewhere.

Submit Early – By submitting early, you will have a better chance of being accepted, as submissions will be reviewed on an ongoing basis.

Not a Sales Pitch – Sessions should be educational and NOT be a masked sales pitch. When attendees smell the faintest scent of a sales pitch, they immediately put up their guard and speakers lose creditability. Show you understand a problem or technical challenge, and help people learn. You’ll earn credibility and people will notice who you are and what you do.

Most sessions will be a mix of 30 and 45-minute talks including time for Q&A.

Submissions will be reviewed on an ongoing basis so early submission is highly encouraged.

Submissions must include proposed presentation title, an informative session abstract, including learning objectives for attendees if relevant; and contact information, headshot and bio for the proposed speaker.

All speakers must adhere to the 100% vendor neutral / no commercial policy of the conference. If speakers cannot respect this policy, they should not submit a proposal.


event fee

free for speakers

Login with your preferred account


If you haven't logged in before, you'll be able to register.

Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.