Call for Speakers

in 51 days

Threat Detection and Incident Response Summit

event date

21 May 2025

location

Online


As cyber threats evolve at an unprecedented pace, security teams must constantly refine their threat detection and incident response strategies. SecurityWeek's Threat Detection & Incident Response Summit dives into cutting-edge threat hunting tools, frameworks, and the ever-growing role of threat intelligence in modern defense ecosystems.


SecurityWeek is seeking expert speakers and practitioners to share cutting-edge insights, case studies, and hands-on techniques at the Threat Detection and Incident Response virtual Summit. 

We invite proposals that offer practical, actionable insights, real-world case studies, and forward-looking strategies for improving threat detection, investigation, and response.

Topics of Interest Include (but are not limited to):
  • AI & LLMs in Incident Response: Automating detection, response, and triage with AI-powered tools.
  • Threat Hunting Strategies: Innovative methodologies, frameworks, and success stories from real-world investigations.
  • Beyond EDR/XDR: How detection and response capabilities are expanding into networks, cloud, and OT environments.
  • Threat Intelligence & Information Sharing: Evaluating the value of commercial threat feeds, open-source intelligence, and government-led initiatives.
  • Log Everything vs. Smart Logging: Finding the right balance between comprehensive visibility and manageable data overload.
  • APT Case Studies & Cybercrime Evolution: Lessons learned from sophisticated attack campaigns and the intersection of APT tactics with cybercriminal operations.
  • Post-Incident Forensics & Response Maturity: Effective investigation techniques, forensic artifacts, and lessons from high-profile breaches.
  • Red Team vs. Blue Team Tactics: How offensive and defensive strategies are evolving in modern security programs.

open, 12 days left
Call for Speakers
Call opens at 12:00 AM

18 Feb 2025

Call closes at 11:59 PM

11 Apr 2025

Call closes in Eastern Daylight Time (UTC-04:00) timezone.
Closing time in your timezone () is .

Most sessions will be 30-minutes, so submitters should keep this in mind.

Tips for Acceptance:

  • Present Virtually – Presenters must be available to present virtually and have access to high-speed internet and a quality webcam and microphone.
  • Be Original – Proposed talks should be original and not have been presented at other events. We are looking for new, innovative talks that have not been seen elsewhere.
  • Submit Early — We receive many submissions, and by submitting early, you will have a better chance of being accepted, as submissions will be reviewed on an ongoing basis.
  • Not a Sales Pitch – Sessions should be educational and NOT be masked sales pitch. Must be 100% vendor neutral. Show you understand a problem or technical challenge, and help people learn. You’ll earn credibility and people will notice who you are and what you do.

Who Should Submit?

We welcome submissions from practitioners, researchers, security leaders, incident responders, and industry experts willing to share their knowledge and expertise with a highly engaged audience. Presentations should focus on practical insights, real-world case studies, and actionable recommendations.

Submissions must include:

  • Presentation title
  • Abstract
  • Speaker bio and credentials
  • Key takeaways for attendees
  • No sales pitches: Sessions should be educational, insightful, and vendor-neutral.

Login with your preferred account


If you haven't logged in before, you'll be able to register.

Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.