TeamT5 Threat Analyst Summit (TAS) brings together leading cybersecurity experts to discuss groundbreaking developments, share best practices, and present innovative approaches to combat cyber threats in the APAC region. With the rapid evolution of ICT, TeamT5 encourages pioneering research that addresses not only technical challenges but also the legal, policy, economic, psychological, and societal aspects of cybersecurity.

TeamT5 Threat Analyst Summit (TAS) brings together leading cybersecurity experts to discuss groundbreaking developments, share best practices, and present innovative approaches to combat cyber threats in the APAC region. With the rapid evolution of ICT, TeamT5 encourages pioneering research that addresses not only technical challenges but also the legal, policy, economic, psychological, and societal aspects of cybersecurity.

TIME AND LOCATION

TIME AND LOCATION

Date
December 11 - December 12, 2024

Venue
ILLUME TAIPEI (茹曦酒店)

Address
No. 100, DunHua N Rd, Songshan District, Taipei City, Taiwan (台北市松山區敦化北路100號)

Date
December 11 - December 12, 2024

Venue
ILLUME TAIPEI (茹曦酒店)

Address
No. 100, DunHua N Rd, Songshan District, Taipei City, Taiwan (台北市松山區敦化北路100號)

SUBMISSION DETAILS

SUBMISSION DETAILS

Final Deadline for Submissions
August 15, 2024, 22:00 UTC+8 (14:00 UTC+0)

Submission Period
June 30, 22:00 UTC+8 (14:00 UTC+0) to August 15, 22:00 UTC+8 (14:00 UTC+0)

CFP Submission Email
cfp_tas@teamt5.org

Final Deadline for Submissions
August 15, 2024, 22:00 UTC+8 (14:00 UTC+0)

Submission Period
June 30, 22:00 UTC+8 (14:00 UTC+0) to August 15, 22:00 UTC+8 (14:00 UTC+0)

CFP Submission Email
cfp_tas@teamt5.org

SUBMISSION CATEGORIES

SUBMISSION CATEGORIES

TeamT5’s TAS welcomes diverse research focused on cyber threats, particularly those affecting the APAC region. Please select the most relevant category:

TeamT5’s TAS welcomes diverse research focused on cyber threats, particularly those affecting the APAC region. Please select the most relevant category:

[A] State-nexus Espionage
In-depth analysis of state-affiliated cyber espionage.

[B] Information Warfare
Exploration of the digital cyberspace as a modern battleground.

[C] Vulnerability Research
Advanced methodologies for uncovering and exploiting software vulnerabilities.

[D] Cybercrime
Effective strategies for addressing profit-driven cybercrime.

[E] Incident Response
Case studies of incident investigations, incident response cases, and attack techniques.

[A] State-nexus Espionage
In-depth analysis of state-affiliated cyber espionage.

[B] Information Warfare
Exploration of the digital cyberspace as a modern battleground.

[C] Vulnerability Research
Advanced methodologies for uncovering and exploiting software vulnerabilities.

[D] Cybercrime
Effective strategies for addressing profit-driven cybercrime.

[E] Incident Response
Case studies of incident investigations, incident response cases, and attack techniques.

LANGUAGE AND FORMAT

LANGUAGE AND FORMAT

Presentation Language
Only submissions in English will be accepted.

Presentation Duration
40 minutes.

Presentation Language
Only submissions in English will be accepted.

Presentation Duration
40 minutes.

WHAT MAKES A GOOD SUBMISSION?

WHAT MAKES A GOOD SUBMISSION?

Submissions should thoroughly articulate the topic, provide clear solutions, and explain necessary specialized knowledge. They should be unique, attributable to the presenter, and offer clear benefits to the audience in the APAC region.

Submissions should thoroughly articulate the topic, provide clear solutions, and explain necessary specialized knowledge. They should be unique, attributable to the presenter, and offer clear benefits to the audience in the APAC region.

IMPORTANT POLICIES

IMPORTANT POLICIES

  • Commercial Content: Sales pitches or vendor-specific talks are not permitted. Submissions must be directly from researchers or speakers. Entries from PR firms or marketing representatives will be disqualified. Submissions must fully detail the concepts, ideas, findings, and solutions intended for presentation. Priority will be given to new research, tools, vulnerabilities, and submissions including white papers.

  • Authorship: All presentations must be the original work of the submitters. Incomplete entries will be disqualified. Researchers may submit multiple proposals, but each must be submitted separately and include all speakers’ biographies. The review board may request additional details on submissions.

  • Commercial Content: Sales pitches or vendor-specific talks are not permitted. Submissions must be directly from researchers or speakers. Entries from PR firms or marketing representatives will be disqualified. Submissions must fully detail the concepts, ideas, findings, and solutions intended for presentation. Priority will be given to new research, tools, vulnerabilities, and submissions including white papers.

  • Authorship: All presentations must be the original work of the submitters. Incomplete entries will be disqualified. Researchers may submit multiple proposals, but each must be submitted separately and include all speakers’ biographies. The review board may request additional details on submissions.

SPEAKER BENEFITS

SPEAKER BENEFITS

For Taiwan Speaker

  • Each selected track receives TWD 9,000 for selected session.

For International Speaker

  • Each selected track receives USD 500 for selected session.

  • Each selected track receives accommodation for one room with three nights’ accommodation at ILLUME TAIPEI (茹曦酒店).

For Taiwan Speaker

  • Each selected track receives TWD 9,000 for selected session.

For International Speaker

  • Each selected track receives USD 500 for selected session.

  • Each selected track receives accommodation for one room with three nights’ accommodation at ILLUME TAIPEI (茹曦酒店).

AFTER ACCEPTANCE

AFTER ACCEPTANCE

Required Submissions
Include an abstract, bio, and photo for the conference program.

Final Slide Submission
Due by December 1, 2024.

Pre-recorded Presentations
Recommended for speakers unable to attend in person.

Required Submissions
Include an abstract, bio, and photo for the conference program.

Final Slide Submission
Due by December 1, 2024.

Pre-recorded Presentations
Recommended for speakers unable to attend in person.

HOW TO SUBMIT

HOW TO SUBMIT

Submission Process:

Submission Process:

  1. Email Format Guideline

  1. Email Format Guideline

  • Email Title: [CFP]+[/“Presentation Title”]

  • Email Content:

    1. Presentation Title

    2. Presentation Summary (within 300 words)

    3. Outline of Presentation

    4. Attach any relevant presentation materials or references if available.

      • If there is existing research comparable to your CFP, please include it as reference information.

    e. Select the field closest to your presentation content from the listed five topics:

    [A] State-nexus Espionage

    [B] Information Warfare

    [C] Vulnerability Research

    [D] Cybercrime

    [E] Incident Response

  • Email Title: [CFP]+[/“Presentation Title”]

  • Email Content:

    1. Presentation Title

    2. Presentation Summary (within 300 words)

    3. Outline of Presentation

    4. Attach any relevant presentation materials or references if available.

      • If there is existing research comparable to your CFP, please include it as reference information.

    e. Select the field closest to your presentation content from the listed five topics:

    [A] State-nexus Espionage

    [B] Information Warfare

    [C] Vulnerability Research

    [D] Cybercrime

    [E] Incident Response

f. Indicate whether the content is already published or planned to be published prior to the conference.

g. If already published, include updates from the existing presentation.

h. Indicate whether information useful for incident investigations, such as tools or IoCs, will be shared (provide specifics if applicable).

  1. List three key points you wish to convey to the audience through your presentation.

j. Presenter’s Name

k. Presenter’s Affiliation

l. Presenter’s Biography

m. Contact Email Address

f. Indicate whether the content is already published or planned to be published prior to the conference.

g. If already published, include updates from the existing presentation.

h. Indicate whether information useful for incident investigations, such as tools or IoCs, will be shared (provide specifics if applicable).

  1. List three key points you wish to convey to the audience through your presentation.

j. Presenter’s Name

k. Presenter’s Affiliation

l. Presenter’s Biography

m. Contact Email Address

  1. Send the CFP Email

  1. Send the CFP Email

Please send the CFP email to cfp_tas@teamt5.org following the above guidelines.

Please send the CFP email to cfp_tas@teamt5.org following the above guidelines.

REVIEW PROCESS

REVIEW PROCESS

The TAS Review Board, composed of esteemed security professionals, assesses each submission for its uniqueness, societal impact, and novelty. Detailed, well-articulated submissions are more likely to be accepted.

The TAS Review Board, composed of esteemed security professionals, assesses each submission for its uniqueness, societal impact, and novelty. Detailed, well-articulated submissions are more likely to be accepted.

TERMS OF ENGAGEMENT

TERMS OF ENGAGEMENT

By submitting through TAS’s CFP, speakers consent to TeamT5 recording, reproducing, and showcasing their presentations. All submissions are confidential, reviewed under strict guidelines. Reviews are conducted on a rolling basis. Plagiarized or commercial content will lead to disqualification. TeamT5 may adjust presentation schedules as necessary and reserves the right to withdraw acceptance.

By submitting through TAS’s CFP, speakers consent to TeamT5 recording, reproducing, and showcasing their presentations. All submissions are confidential, reviewed under strict guidelines. Reviews are conducted on a rolling basis. Plagiarized or commercial content will lead to disqualification. TeamT5 may adjust presentation schedules as necessary and reserves the right to withdraw acceptance.

ADDITIONAL INFORMATION

ADDITIONAL INFORMATION

Visit our official site for more details on past conferences and updates on TAS. Terms and conditions are subject to changes, which will be updated on our site. For inquiries, contact cfp_tas@teamt5.org

We look forward to your innovative contributions to the cybersecurity field and thank you for your interest in TeamT5’s Threat Analyst Summit.

Visit our official site for more details on past conferences and updates on TAS. Terms and conditions are subject to changes, which will be updated on our site. For inquiries, contact cfp_tas@teamt5.org

We look forward to your innovative contributions to the cybersecurity field and thank you for your interest in TeamT5’s Threat Analyst Summit.

Organizer

Co-Organizer

Organizer

Co-Organizer

Organizer

Co-Organizer