Pre-Enrollment

3rd October 2026

Final Paper Submission

8th October 2026

Registration Deadline

18th October`2026

Conference Date

2nd Nov - 3rd Nov 2026

Conference Session Tracks

SDG Wheel

Aligned with

UN Sustainable Development Goals

This conference contributes to global sustainability by aligning its research discussions and academic sessions with key United Nations Sustainable Development Goals. It fosters knowledge exchange, innovation, and collaborative engagement.

SDG 8
SDG 8 Decent Work and Economic Growth
SDG 9
SDG 9 Industry, Innovation and Infrastructure
SDG 16
SDG 16 Peace, Justice and Strong Institutions
TRACK 01

Advancements in Cybersecurity Architecture

This track focuses on the latest innovations in cybersecurity architecture, emphasizing frameworks that enhance system resilience. Participants will explore methodologies that integrate security into the design and implementation of IT systems.

TRACK 02

Artificial Intelligence in Cybersecurity

This session delves into the application of artificial intelligence techniques in identifying and mitigating cybersecurity threats. Researchers will present novel approaches that leverage machine learning and data analytics for proactive defense mechanisms.

TRACK 03

Secure Software Development Practices

This track examines best practices and methodologies for developing secure software throughout its lifecycle. Discussions will include risk assessment, compliance, and the integration of security measures during the design phase.

TRACK 04

Risk Management in IT Systems Engineering

This session addresses the critical aspects of risk management within IT systems engineering. Participants will share frameworks and tools that assist organizations in identifying, assessing, and mitigating risks associated with cybersecurity.

TRACK 05

Compliance and Governance in Cybersecurity

This track focuses on the regulatory landscape and governance frameworks that guide cybersecurity practices. Experts will discuss compliance challenges and strategies for aligning organizational policies with legal requirements.

TRACK 06

Encryption Techniques for Data Protection

This session explores advanced encryption methods and their role in safeguarding sensitive information. Researchers will present findings on the effectiveness of various encryption algorithms in different contexts.

TRACK 07

Vulnerability Assessment and Management

This track emphasizes the importance of vulnerability assessment in maintaining system integrity. Participants will discuss tools and methodologies for identifying, prioritizing, and remediating vulnerabilities in IT systems.

TRACK 08

Incident Response Strategies

This session focuses on the development and implementation of effective incident response strategies. Experts will share case studies and best practices for minimizing the impact of cybersecurity incidents.

TRACK 09

Threat Detection and Intelligence

This track investigates the latest advancements in threat detection technologies and intelligence gathering. Participants will explore how organizations can enhance their situational awareness and response capabilities.

TRACK 10

Automation in Cybersecurity Operations

This session examines the role of automation in streamlining cybersecurity operations. Discussions will highlight tools and techniques that improve efficiency and effectiveness in threat detection and response.

TRACK 11

Cloud Computing Security Challenges

This track addresses the unique security challenges posed by cloud computing environments. Participants will discuss strategies for securing cloud infrastructures and ensuring data privacy in multi-tenant architectures.