Advance your Career with Cyber Security Training at SANS Norfolk 2019. Save $350 thru 1/23.

Speak at a Summit

Current Calls for Presentations (CFPs)

SANS Security Awareness
Summit 2019

Learn More

Security Operations Summit

Deadline for Submission:
Friday, February 4th at noon CST

Learn More

Digital Forensics & Incident Response (DFIR) Summit

Deadline for Submission:
Monday, March 4 at 5 pm CST

Learn More

"The best speakers use the fewest words. Having a lot to say does not make you a great speaker. Being able to say a lot in a few words does. This, of course, requires preparation and meditation." - Seth Misenar, Fellow, SANS Institute

Who Should Submit:

Diversity of thought is critical to any organization's success, and SANS Summits encourage participation by everyone regardless of age, culture, ethnicity, sexual orientation, or gender identification. Whatever your background, whoever you are, we encourage you to respond to a CFP. We welcome people who are newer to the field or who have not yet done any public speaking, and we can provide mentoring and guidance to help you develop an impactful presentation.

Practical Advice for Submitting a Talk

Giving presentations at conferences is a great way to share your expertise, expand your professional network, and bolster your personal brand. But how do you submit a proposal that sets you apart from the crowd? Britta Glade, Director of Content for RSA Conference, and Dawn Cappelli, CISO of Rockwell Automation and program committee member for RSA Conference, have reviewed literally thousands of proposals, and share their tips for getting yours noticed and selected.

Advice for Building an Effective Security Presentation

Summit Presentation

Scott Roberts has spoken at several SANS Summits and his talks are consistently among the top rated at our events. In this blog post, Scott outlines his process for developing and delivering an impactful presentation.

Blog Post: Building Better Security Presentations

Here are some examples of outstanding Summit talks:

Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework

Information Anarchy: A Survival Guide for the Misinformation Age

How Threats Are Slipping In the Back Door