Learn How to Thwart Cyber Attackers with Training in New Orleans. Save $350 thru 3/27.

Speak at a Summit


Current Calls for Presentations (CFPs)


DFIR Europe
Summit (Prague)


Deadline for Submission:
Friday 29th March 2019 at 17:00 GMT

Learn More


Supply Chain
Cybersecurity Summit


Deadline for Submission:
Monday, April 1 at 9 am CDT

Learn More


"The best speakers use the fewest words. Having a lot to say does not make you a great speaker. Being able to say a lot in a few words does. This, of course, requires preparation and meditation." - Seth Misenar, Fellow, SANS Institute

Who Should Submit:

Diversity of thought is critical to any organization's success, and SANS Summits encourage participation by everyone regardless of age, culture, religious affiliation, ethnicity, sexual orientation, or gender identification. Whatever your background, whoever you are, we encourage you to respond to a CFP. We welcome people who are newer to the field or who have not yet done any public speaking, and we can provide mentoring and guidance to help you develop an impactful presentation.


Practical Advice for Submitting a Talk



Giving presentations at conferences is a great way to share your expertise, expand your professional network, and bolster your personal brand. But how do you submit a proposal that sets you apart from the crowd? Britta Glade, Director of Content for RSA Conference, and Dawn Cappelli, CISO of Rockwell Automation and program committee member for RSA Conference, have reviewed literally thousands of proposals, and share their tips for getting yours noticed and selected.


Advice for Building an Effective Security Presentation

Summit Presentation

Scott Roberts has spoken at several SANS Summits and his talks are consistently among the top rated at our events. In this blog post, Scott outlines his process for developing and delivering an impactful presentation.

Blog Post: Building Better Security Presentations


Here are some examples of outstanding Summit talks:

Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework

Information Anarchy: A Survival Guide for the Misinformation Age



How Threats Are Slipping In the Back Door