Skip to main content

Call for Papers

Rebellion is not looking for polished presentations.

Submit if you're building, breaking, or learning the hard way.

What We're Looking For

  • • War stories
  • • Failed experiments
  • • Hard-earned lessons
  • • Edge-case research
  • • Systems thinking
  • • Operator perspectives

If it challenges assumptions, breaks models, or exposes uncomfortable truths—we want it.

Formats We Value

  • • AI Tools / Prompts / Automations
  • • Deep technical walkthroughs
  • • 0-Days
  • • Research
  • • Innovative Panels & Debates
Never
  • ✗ No sales pitches
  • ✗ No buzzwords
  • ✗ No repeats

Talk Formats

Standard Session (45–55 minutes)
Main format for technical presentations

The core format for technical talks, research presentations, and in-depth demonstrations. Includes time for Q&A.

Best for:

  • Technical deep dives
  • Research findings
  • Attack methodology walkthroughs
  • Case studies with analysis

Submission Guidelines

Your Submission Should Include
  • Title: Clear and descriptive
  • Abstract: 2-3 paragraphs explaining what you'll cover and why it matters
  • Outline: Bullet points of your major sections
  • Takeaways: 3-5 specific things attendees will learn
  • About you: Tell us about yourself and/or your presenters (2-3 sentences)
  • Previous talks (optional): Links to recordings or slides if available
  • LinkedIn (optional): Link to your professional profile(s)
  • Track selection: AI, Offensive Security & Hacking, 0-Days & Tools, Underground, Defense & Detection, The Human Factor, or Other
  • Special requests (optional): Accessibility needs, stage requirements, or unique requests

Evaluation Criteria:

Technical depth
Novelty
Practical value
Clear structure
Speaker experience
First-time release

Speaker Benefits

  • ✓ Free conference pass for all speakers
  • ✓ Professional recording of your talk
  • ✓ Your slides and recording published (if you consent)
  • ✓ Access to speaker dinner and networking events
  • ✓ Promotion across our social media and newsletter
  • ✓ Exclusive speaker swag

Speaker Tracks

AI

AI security, adversarial ML, prompt injection, model security, AI-powered attacks and defenses

Offensive

Red teaming, penetration testing, offensive security techniques, attack methodologies

Builders & Tools

Security tooling, automation, custom solutions, open source projects

Underground

Uncomfortable conversations - breaches, ransomware, adversaries, war stories

0Days & Exploits

Vulnerability research, exploit development, zero-day discoveries

Defense & Detection

Blue team tactics, detection engineering, incident response, threat hunting

Selection Process

We review all submissions blind initially (reviewers don't see names or affiliations). Final selection considers technical merit, schedule balance, and speaker experience.

You'll receive notification within 2 weeks of the CFP close date. If accepted, we'll work with you on title refinement, abstract editing, and scheduling.

Policies & Terms

Recording & Distribution Rights: By submitting, you agree that Rebellion may record, publish, and distribute your presentation. You retain ownership of your content but grant us a perpetual, royalty-free license to share it.

Code of Conduct: All speakers must adhere to our Code of Conduct. We expect professionalism, respect, and technically focused content. Harassment, discrimination, or unprofessional behavior will not be tolerated.

No Sales Pitches: Talks focused on selling products, services, or promoting commercial offerings will be rejected or removed from the schedule. Brief mentions of tools you've built are acceptable if they're central to the talk.

Original Work & AI Use: Your talk must be your original work. If you use AI tools for preparation, you're responsible for accuracy and quality. Plagiarism or misrepresentation will result in immediate removal from the program.

Prior & Parallel Submissions: We prefer new content, but understand research gets presented multiple times. Disclose if your talk has been given elsewhere or is submitted to other conferences. Repeat content may be deprioritized.

Vulnerability & 0-Day Disclosure: For vulnerability disclosures, follow responsible disclosure practices. Coordinate with affected vendors and allow reasonable remediation time. We'll work with you on timing and disclosure strategy.

Speaker Responsibility: You're responsible for your slides, demos, and content accuracy. Test your demos. Have backups. Arrive early for tech check. We provide A/V support but you own the execution.

Review & Selection: Not all submissions will be accepted. Decisions are final. We may suggest format changes or combine related talks. Acceptance is contingent on final abstract approval and speaker confirmation.

Changes & Updates: Rebellion reserves the right to update policies, adjust schedules, or modify speaker agreements as needed. We'll communicate changes promptly and work with you on any required adjustments.

Questions about the CFP process? Email info@rbln.com