TW

Call for Presentations (CFP) for
TeamT5’s Threat Analyst Summit 2025

Call for Presentations (CFP) for TeamT5’s Threat Analyst Summit 2025

TeamT5 威脅分析師高峰會 (TAS) 期望匯集頂尖資訊安全專家,討論突破性發展、分享最佳實踐並提出打擊亞太地區網路威脅的創新方法。隨著資訊技術的快速發展,TeamT5 鼓勵開創性研究,不僅解決技術挑戰,更解決網路安全的法律、政策、經濟、心理和社會方面的問題。

TIME AND LOCATION

TIME AND LOCATION

Date:

Date:

December 3 - December 4, 2025

December 3 - December 4, 2025

Venue:

Venue:

ILLUME TAIPEI (茹曦酒店)

ILLUME TAIPEI (茹曦酒店)

Address:

Address:

No. 100, DunHua N Rd, Songshan District, Taipei City, Taiwan (台北市松山區敦化北路 100 號) Google Map

No. 100, DunHua N Rd, Songshan District, Taipei City, Taiwan (台北市松山區敦化北路 100 號) Google Map

SUBMISSION DETAILS

SUBMISSION DETAILS

Deadline for Submissions: July 15, 2025, 22:00 UTC+8 (14:00 UTC+0)

Deadline for Submissions: July 15, 2025, 22:00 UTC+8 (14:00 UTC+0)

Submission Period:

Submission Period:

May 12, 22:00 UTC+8 (14:00 UTC+0) to July 15, 22:00 UTC+8 (14:00 UTC+0)

May 12, 22:00 UTC+8 (14:00 UTC+0) to July 15, 22:00 UTC+8 (14:00 UTC+0)

Final Deadline for Submissions:

Final Deadline for Submissions:

July 15, 2025, 22:00 UTC+8 (14:00 UTC+0)

July 15, 2025, 22:00 UTC+8 (14:00 UTC+0)

Submission Email:

Submission Email:

SUBMISSION CATEGORIES

SUBMISSION CATEGORIES

TeamT5’s TAS welcomes diverse research focused on cyber threats, particularly those affecting the APAC region. Please select the most relevant category:

【A】

【A】

State-nexus Espionage: In-depth analysis of state-affiliated cyber espionage.

State-nexus Espionage: In-depth analysis of state-affiliated cyber espionage.

【B】

【B】

Information Warfare: Exploration of the digital cyberspace as a modern battleground.

Information Warfare: Exploration of the digital cyberspace as a modern battleground.

【C】

【C】

Vulnerability Research: Advanced methodologies for uncovering and exploiting software vulnerabilities.

Vulnerability Research: Advanced methodologies for uncovering and exploiting software vulnerabilities.

【D】

【D】

Cybercrime: Effective strategies for addressing profit-driven cybercrime.

Cybercrime: Effective strategies for addressing profit-driven cybercrime.

【E】

【E】

Incident Response: Case studies of incident investigations, incident response cases, and attack techniques.

Incident Response: Case studies of incident investigations, incident response cases, and attack techniques.

LANGUAGE AND FORMAT

LANGUAGE AND FORMAT

Presentation Language:

Presentation Language:

Only submissions in English will be accepted.

Only submissions in English will be accepted.

Presentation Duration:

Presentation Duration:

35 minutes

35 minutes

IMPORTANT POLICIES

IMPORTANT POLICIES

Commercial Content:

Commercial Content:

Sales pitches or vendor-specific talks are not permitted. Submissions must be directly from researchers or speakers. Entries from PR firms or marketing representatives will be disqualified. Submissions must fully detail the concepts, ideas, findings, and solutions intended for presentation. Priority will be given to new research, tools, vulnerabilities, and submissions including white papers.

Sales pitches or vendor-specific talks are not permitted. Submissions must be directly from researchers or speakers. Entries from PR firms or marketing representatives will be disqualified. Submissions must fully detail the concepts, ideas, findings, and solutions intended for presentation. Priority will be given to new research, tools, vulnerabilities, and submissions including white papers.

Authorship:

Authorship:

All presentations must be the original work of the submitters. Incomplete entries will be disqualified. Researchers may submit multiple proposals, but each must be submitted separately and include all speakers’ biographies. The review board may request additional details on submissions.

All presentations must be the original work of the submitters. Incomplete entries will be disqualified. Researchers may submit multiple proposals, but each must be submitted separately and include all speakers’ biographies. The review board may request additional details on submissions.

SPEAKER BENEFITS

SPEAKER BENEFITS

For Taiwan Speaker:

For Taiwan Speaker:

Each selected track receives TWD 9,000 for selected session.

Each selected track receives TWD 9,000 for selected session.

For International Speaker:

For International Speaker:

Each selected track receives USD 500 for selected session.

Each selected track receives one room with three nights’ accommodation at ILLUME TAIPEI (茹曦酒店).

Each selected track receives USD 500 for selected session.

Each selected track receives one room with three nights’ accommodation at ILLUME TAIPEI (茹曦酒店).

AFTER ACCEPTANCE

AFTER ACCEPTANCE

Required Submissions:

Required Submissions:

Include an abstract, bio, and photo for the conference program.

Include an abstract, bio, and photo for the conference program.

Final Slide Submission:

Final Slide Submission:

Due by November 22, 2025.

Due by November 22, 2025.

Pre-recorded Presentations:

Pre-recorded Presentations:

Recommended for speakers unable to attend in person.

Recommended for speakers unable to attend in person.

HOW TO SUBMIT

HOW TO SUBMIT

Submission Process:

Submission Process:

1. Email Format Guideline

1. Email Format Guideline

Email Title:

Email Title:

[CFP]+[/“Presentation Title”]

[CFP]+[/“Presentation Title”]

Email Content:

Email Content:

  1. Presentation Title

  2. Presentation Summary (within 300 words)

  3. Outline of Presentation

  4. Attach any relevant presentation materials or references if available.

    • If there is existing research comparable to your CFP, please include it as reference information.

  5. Select the field closest to your presentation content from the listed five topics:

    • [A] State-nexus Espionage

    • [B] Information Warfare

    • [C] Vulnerability Research

    • [D] Cybercrime

    • [E] Incident Response

  6. Indicate whether the content is already published or planned to be published prior to the conference.

  7. If already published, include updates from the existing presentation.

  8. Indicate whether information useful for incident investigations, such as tools or IoCs, will be shared (provide specifics if applicable).

  9. List three key points you wish to convey to the audience through your presentation.

  10. Presenter’s Name

  11. Presenter’s Affiliation

  12. Presenter’s Biography

  13. Contact Email Address

  1. Presentation Title

  2. Presentation Summary (within 300 words)

  3. Outline of Presentation

  4. Attach any relevant presentation materials or references if available.

    • If there is existing research comparable to your CFP, please include it as reference information.

  5. Select the field closest to your presentation content from the listed five topics:

    • [A] State-nexus Espionage

    • [B] Information Warfare

    • [C] Vulnerability Research

    • [D] Cybercrime

    • [E] Incident Response

  6. Indicate whether the content is already published or planned to be published prior to the conference.

  7. If already published, include updates from the existing presentation.

  8. Indicate whether information useful for incident investigations, such as tools or IoCs, will be shared (provide specifics if applicable).

  9. List three key points you wish to convey to the audience through your presentation.

  10. Presenter’s Name

  11. Presenter’s Affiliation

  12. Presenter’s Biography

  13. Contact Email Address

2. Send the CFP Email

2. Send the CFP Email

Please send the CFP email to “cfp_tas@teamt5.org” following the above guidelines.

Please send the CFP email to “cfp_tas@teamt5.org” following the above guidelines.

REVIEW PROCESS

REVIEW PROCESS

The TAS Review Board, composed of esteemed security professionals, assesses each submission for its uniqueness, societal impact, and novelty. Detailed, well-articulated submissions are more likely to be accepted. Reseult will be send to all participatants before August 15.

The TAS Review Board, composed of esteemed security professionals, assesses each submission for its uniqueness, societal impact, and novelty. Detailed, well-articulated submissions are more likely to be accepted. Reseult will be send to all participatants before August 15.

TERMS OF ENGAGEMENT

TERMS OF ENGAGEMENT

By submitting through TAS’s CFP, speakers consent to TeamT5 recording, reproducing, and showcasing their presentations. All submissions are confidential, reviewed under strict guidelines. Reviews are conducted on a rolling basis. Plagiarized or commercial content will lead to disqualification. TeamT5 may adjust presentation schedules as necessary and reserves the right to withdraw acceptance.

By submitting through TAS’s CFP, speakers consent to TeamT5 recording, reproducing, and showcasing their presentations. All submissions are confidential, reviewed under strict guidelines. Reviews are conducted on a rolling basis. Plagiarized or commercial content will lead to disqualification. TeamT5 may adjust presentation schedules as necessary and reserves the right to withdraw acceptance.

WHAT MAKES A GOOD SUBMISSION?

WHAT MAKES A GOOD SUBMISSION?

Submissions should thoroughly articulate the topic, provide clear solutions, and explain necessary specialized knowledge. They should be unique, attributable to the presenter, and offer clear benefits to the audience in the APAC region.

Submissions should thoroughly articulate the topic, provide clear solutions, and explain necessary specialized knowledge. They should be unique, attributable to the presenter, and offer clear benefits to the audience in the APAC region.

ADDITIONAL INFORMATION

ADDITIONAL INFORMATION

The organizer reserves the right to amend any part of the event format or call for paper details if necessary at any time.

Visit our official site for more details on past conferences and updates on TAS. Terms and conditions are subject to changes, which will be updated on our site. For inquiries, contact: t5tas@teamt5.org

We look forward to your innovative contributions to the cybersecurity field and thank you for your interest in TeamT5’s Threat Analyst Summit.

The organizer reserves the right to amend any part of the event format or call for paper details if necessary at any time.

Visit our official site for more details on past conferences and updates on TAS. Terms and conditions are subject to changes, which will be updated on our site. For inquiries, contact: t5tas@teamt5.org

We look forward to your innovative contributions to the cybersecurity field and thank you for your interest in TeamT5’s Threat Analyst Summit.