Technical presentations highlight innovations, research & development projects, internships/co-ops experiences, service-learning and outreach projects, or other interesting experience related to cybersecurity. This is an opportunity to share that experience with others and perhaps inspire them to pursue similar opportunities. Technical Presentations are 45 minutes long, including time for Q&A.




Workshops are free hands-on sessions (technical/professional development) on any topic related to cybersecurity. Hands-on workshops in any cybersecurity area are welcome. The audience is can be students, educators, professionals and researchers (in any combination or by category). Workshops are 2 hours long.



Birds-of-a-Feather (BOAF) Sessions

Birds of a Feather are informal discussion sessions on just about any topic related to cybersecurity, that elicit participant discussions. Presenters lead the discussion from audeince. These sessions can be a great way to share ideas and be introduced to current issues or trends in this area. BoaF sessions are 45 minutes long.



Lightning Talks

Lightning talks highlight fresh ideas, unique perspectives, valuable experiences, and emerging trends in cybersecurity. Lightning Talks are five-minute presentations (with or without formal presentations) that aim to jump-start discussions and collaborations while soliciting feedback from the community.




Panels provide opportunities to discuss a current relevant topic in cybersecurity. Panel organizers are responsible for selecting appropriate panelists to participate. In addition to the moderator, there can be up to 4 panelists, and each panel is 45 minutes long. Submit all names and their affiliation info along with the abstract.




Poster Proposals for Student Research Poster Submission Dec. 1, 2018-Jan. 1, 2019

Students, have you worked on an interesting research project related to cybersecurity at school? It’s easy to create a poster. Share your ideas and experiences with others. You may win a travel award to attend a security conference of your choice. Student posters will be judged in THREE categories: Community College, Undergraduate, Graduate. Winners in all categories will be awarded a student travel grant for a future security conference and Runners Up will be awarded a Tech Gadget. 

To submit your application, click here.

Submission Instructions

The deadline to submit applications to participate in the WiCyS 2019 Program was November 1. The information below is for reference only.

WiCyS welcomes submissions of all types and from a wide range of presenters! Due to Conference time constraints, we greatly regret that not all submissions make it into the final program - however, please note: the WiCyS organization is collecting bios and photos of qualified member presenters for the new WiCyS Speakers Bureau, so watch for announcements!

All submissions are reviewed by the WiCyS 2019 Program Committee.

  1. FIRST, create or log in to an existing Easy Chair account - all submissions must be provided through Easy Chair.

  2. Submit a one-page Abstract with a few paragraphs explaining your ideas for participation in the Conference. You may submit multiple proposals in different categories and tracks.

  3. Identify the Type of activity or session in which you are applying to participate (i.e., Lightning Talk, Technical Presentation, Birds of a Feather, Workshop or Panel). See Session Formats for more detail.

  4. Identify the Topic Category (i.e., Today’s Technology, Looking ahead, Best practices, Career development). See Program Focus for more detail.

  5. Submissions can be related to career, graduate school, research, or education in the field of cybersecurity. WiCyS encourages you to consider the many issues, challenges and learnings that the community of cybersecurity students, industry professionals, academics and researchers experience every day. Students will want to hear about how others in the field have succeeded, what paths their careers have taken, and technological advancements and security issues. Students also love to receive in-depth technical training in the workshops. Career professionals with some years of experience are not only seeking guidance about issues of diversity, but also training and understanding about global cybersecurity trends as well as technical training. And everyone enjoys sharing ideas and knowledge in an interactive format.

  6. Accepted submissions must be presented by at least one of the submission authors.

  7. Check out examples of past accepted submissions at to see the programs from the last five years.


  1. Submissions are peer reviewed.

  2. All accepted proposals are notified by December 1, 2018.

  3. Accepted proposals receive ONE complimentary registration per submission, along with free lodging for two nights at the Conference Hotel (the Wyndham Grand in Pittsburgh, PA).

  4. Abstracts will be published in the Conference Program.

Send any questions to