Call for Papers
Open April 20 – June 22
- Call for Papers Opened: April 20, 2023 (12:00 AM EDT)
- Call for Papers Closes: June 22, 2023 (11:59 PM EDT)
- Notification to Submitters: mid-August 2023
- Briefings Dates/Location: October 25-26, 2023 – Metro Toronto Convention Centre, Toronto, Canada
Black Hat Europe
Open May 30 – August 2
- Call for Papers Opens: May 30, 2023 (12:00 AM BST)
- Call for Papers Closes: August 2, 2023 (11:59 PM BST)
- Notification to Submitters: late-September 2023
- Briefings Dates/Location: December 6-7, 2023, London
Black Hat USA
Open February 8 - April 12
- Call for Papers Opened: February 8, 2023 (12:00 AM Pacific Time)
- Call for Papers Closed: April 12, 2023 (11:59 PM Pacific Time)
- Notification to Submitters: mid-June 2023
- Briefings Dates/Location: August 9-10, 2023 - Mandalay Bay Convention Center, Las Vegas, NV
The deadline has passed. Call for papers is now closed. If you have an account or submitted a proposal, you can still sign in.
Terms & Dates are subject to change.
Sign up here to receive more information on future Calls for Papers for Black Hat Conferences.
Feel free to reach out to email@example.com if you have any questions.
What are the Black Hat Briefings?
Since their inception, Black Hat Briefings continue to provide security professionals with a place to learn the very latest in information security risks, research and trends. Leading security researchers from around the world take the stage each year to share their latest work and exploits in a friendly, vendor-neutral environment. Attendees will experience groundbreaking research on topics ranging from vulnerabilities within popular consumer devices, to critical international infrastructure threats, and everything in between.
- Events are live and in-person with on-demand recordings of Briefings available after the event.
Determine which track(s) your submission falls under. A complete list of track descriptions can be found below.
Optional resources to help you create your proposal.
View samples of accepted submissions that received positive reviews:
View Samples (PDF)
- Submissions may only be entered by researchers/speakers (no submissions from PR firms/marketing representatives).
- Black Hat/SecTor does not accept product or vendor-related pitches. Black Hat/SecTor will disqualify any product or vendor pitch.
- Submissions must clearly detail the concepts, ideas, findings, and solutions a researcher or speaking team plans to present.
- Submissions that highlight new research, tools, vulnerabilities, etc. will be given priority.
- Submissions that include White Papers are highly encouraged and will also be given priority.
- Black Hat/SecTor will disqualify incomplete submissions; complete your submission in its entirety.
- Individuals may submit more than one proposal, but each proposal must be submitted via a separate submission form.
- Each submission must include biographies of the proposed speaking team.
- Submitters will be contacted directly if Review Board/Advisory Committee members have any questions about a submission.
- Submissions that include text generated entirely from a large-scale language model (LLM) such as ChatGPT, Google Bard, etc. are prohibited. Submitters may use LLM tools for editing or polishing author-written text ONLY.
- Selected speakers are expected to present in-person, however we may make exceptions on a case-by-case basis for those unable to travel.
Black Hat/SecTor strongly supports and encourages coordinated disclosure. To this end, Black Hat/SecTor has a strong partnership with the Electronic Frontier Foundation (EFF) to provide pro-bono legal consultations to security researchers on the legality of any research or data they plan to present at the event.
If you have questions about the legal implications of your security research or presentation, contact Electronic Frontier Foundation at firstname.lastname@example.org.
Review Board & Content Selection
The Black Hat and SecTor Review Boards are comprised of the industry's most credible and distinguished security professionals and thought leaders throughout various areas of the information security community. The Review Boards advise Black Hat/SecTor on reviewing and programming conference content and providing unparalleled insight into the research community.
Black Hat/SecTor strives to deliver one of the most empirical content selection processes in the industry. All submissions are vetted thoroughly by the Review Boards. Each submission is reviewed for uniqueness, overall content expertise, and accuracy before any selections are made. Through the course of this dynamic review process, Review Board members will frequently ask researchers for clarity on any areas of question in their submission(s) – whether it be about the uniqueness or audacity of claims made. The best submissions come with academic-grade papers, proof-of-concept code, and/or video demonstrations of the work done. Of note, Black Hat/SecTor does not support pay-for-play Briefings. The Briefings are, and always have been, independently selected based on quality of content and area of expertise rather than sponsorship.
Student Scholarship Nominations:
- As a way to introduce the next generation of security professionals to the Black Hat/SecTor community, each speaking team may nominate up to 2 students to receive a complimentary Briefings pass.
- One complimentary Briefings pass per Speaker(s)
- Varies by Event – From $500 CAD to $1,000 USD for one Speaker per team
- Varies by Event – From $1,000 CAD - $1,300 USD for one Speaker per team. (Economy-class, round-trip airfare. Receipt must be provided. Not available for local speakers)
- Varies by Event – From one hotel room for 2 – 3 nights for one Speaker per team. (Room will be booked and paid for by Black Hat/SecTor. Not available for local speakers.)
By submitting a proposal via the Black Hat/SecTor Call for Papers system, submitters selected to speak understand and agree to the Terms as detailed in this section.
- By speaking at a Black Hat/SecTor conference, Speakers grant Black Hat/SecTor permission to record, reproduce, distribute, advertise, and show a Speaker's presentation including but not limited to blackhat.com, conference proceedings and materials, audio, video, printed and/or electronic ads, fliers, mailers, etc.
- The Black Hat/SecTor Review Boards will have access to all submissions and materials.
- Review Board access to submissions is provisioned under MOU with Black Hat/SecTor and Informa. The MOU outlines the rules of confidentiality, conduct, standards, and policies that guide the Black Hat/SecTor review process as well as the expectations and responsibilities required to be on a Black Hat Review Board.
- Prospective Speakers should not directly contact any Black Hat/SecTor Review Board member regarding the status of submission(s) or feedback.
- Reviews, acceptances and/or declines are conducted on a rolling basis.
- All correspondence and queries should be sent to:
- Researchers and research teams should be aware of the following guidelines regarding the number of researchers permitted to present.
- Up to 2 speakers (Additional contributors who are not able to present due to the speaker limit will still receive recognition on the Black Hat/SecTor website as long as they are listed on the original Call for Papers submission.)
- Conference passes are non-transferable.
- Co-workers, PR representatives, etc. must register and pay the appropriate fees to attend the Briefings.
- If the presentation is deemed to be a work of plagiarism or a blatant vendor pitch, Black Hat/SecTor may revoke the Speaker's honorarium and the Speaker will not be considered for future speaking opportunities.
- Black Hat/SecTor reserves the right to change scheduled speaking times as necessary. While every effort will be made to honor assigned times, Speakers may be called upon to present at any time during the conference.
- Black Hat/SecTor reserves the right to rescind an accepted submission without reason.
- Black Hat/SecTor believes the InfoSec community should be truly open for everyone. As such, Black Hat/SecTor is committed to providing a friendly, safe and welcoming environment for all, regardless of gender, sexual orientation, disability, ethnicity, or religion. Speakers are required to follow the Black Hat Code of Conduct.
Additional Event Information
Please visit blackhat.com for previous conference archives, information, and talks. Updated announcements about Black Hat/SecTor will be posted to newsgroups, security mailing lists, and the Black Hat website when available.
We reserve the right to change or modify our Terms, dates and/or content of this page at any time without prior notice.
Again, feel free to reach out to email@example.com if you have any questions.
We look forward to receiving your submission!
Back to top
The Black Hat Team