Conference 2026

Call For Proposal

November 5th to 6th, 2026
La Marive, Yverdon-les-Bains

Learn about latest threats and mitigations!

Talk selection process

The Black Alps conference uses a structured Call for Proposals (CFP) process to select the talks and build the program.

The process ensures a curated program of high-quality talks by combining expert review with curated keynote selections.

  • First, during the Call for Proposals, speakers submit their talk proposals during an open submission period. Once the deadline passes, the CFP is closed.
  • Secondly, a Program Committee, made up of internationally recognized cybersecurity experts, reviews all submitted proposals. Each submission is evaluated based on criteria such as relevance to cybersecurity topics, technical depth, overall quality and clarity.
  • Finally, the Program Committee selects the most relevant and high-quality talks to build the official conference program.

Note they are exceptions for building the program

  • Keynotes are selected directly by the organizing committee.
  • Rump sessions (short, informal talks or interactive sessions) are typically selected separately, often during the event itself.

Call for proposal

The submission process is now open until July 31st, 2026.. We encourage the speakers to make their proposal(s) much earlier.

To submit a proposal for a talk, please fill in the form on this website:

For any questions regarding the call for proposals, please contact us at .

Program committee

The program committee is composed of international renowned experts in the field. They are responsible for building a program of quality by reviewing the proposals and selecting the most outstanding ones.

Proposal topics

We expect an event offering a wide range of topics ranging from software security to cybersecurity, data protection, technical and organizational aspects of software, hardware, networks, infrastructures, systems, and others. Topics could be:

  • Application security
  • Vulnerability research and exploits development
  • Penetration testing and red teaming
  • Cloud security
  • Security automation
  • Network security
  • Intrusion detection and monitoring
  • Cryptography