TECH TALKS: CALL FOR PAPERS_
Returning to Glasgow for its 10-year anniversary, the NCSC’s flagship event, CYBERUK 2026, will take place on 21-23 April at the SEC, Glasgow. Facilitating a national conversation to increase understanding, challenge thinking, create debate and combining forces on cyber security to address the 2026 theme is:
THE NEXT DECADE: ACCELERATING OUR CYBER DEFENCE_
For the last 10 years we've run Technical Masterclasses to connect the CYBERUK audience with the latest technical innovations and developments. For 2026 we are expanding and redefining our Technical Masterclasses as "Tech Talks" - offering two days of expert technical insights within a fitting, 600-seat auditorium. Each Tech Talk is a rare opportunity to take the stage in front of a well-informed audience convened from across the UK Cyber sector. They are the technical core of the CYBERUK26 agenda, and we anticipate competition to be steep.
Each twenty-minute talk will take the form of an advanced briefing on innovation, future technology or a piece of research followed by five minutes for audience questions. These sessions are a space to share the latest cyber knowledge and should aim to illuminate research and provide detailed analysis and actionable conclusions.

The NCSC will be selecting papers from across three broad topics that align to the CYBERUK 2026 theme – The Next Decade: Accelerating Our Cyber Defence. Papers will be selected under each topic according to quality and relevance.
Please read on for details of the topics, and instructions on how to submit your paper for review.
For any enquiries regarding the programme or your submission, please contact: cyberuk-papers@brayleinoevents.com.

AI has the potential to be a game-changer for cyber security. Improving the detection and remediation of threats and vulnerabilities at a never-before seen scale. It could also be highly disruptive for the cyber security sector. This is the opportunity to share your AI insights and innovations with the CyberUK audience.

Our collective cyber security best-practices are, for the most part, based on the sector’s learned successes and failures, and the application of analysis that is often part logic, part experience and part intuition. Despite being a subject rooted in technology, cyber security practices are rarely backed by robust data or scientific evidence. This is your chance to share ideas to correct this.

Every year the adversary threat evolves, shifting their focus onto new technologies, and exhibiting new tactics and techniques when exploiting our systems. The NCSC welcomes talks which genuinely move our collective understanding of these threats.
SUBMISSION TIMELINE
Summary
AI has the potential to be a game-changer for cyber security. Improvide the detection and remediation of threats and vulnerabilities a never-before seen scale. It could also be highly disruptive for the cyber security sector. This is the opportunity to share your AI insights and innovations with the CYBERUK audience.
NCSC would welcome technical talks describing AI supporting threat analysis and risk assessment, pen-testing (red team), threat detection and remediation (blue team), vulnerability detection, etc.
We take a broad view of AI technology, including all aspects of Machine Learning and not solely LLMs and their associated technologies.
Criteria
We are looking for talks that deliver insight into one or more of the following areas:
• Overview of the applications of AI to cyber
• Details of practical application of AI/ML to improve the cyber security of a real-world system or test-bed
• Use of AI/ML to create step-change reductions in the effectiveness or cost of cyber defence
• Use of AI/ML to reason about the cyber security of networks, systems or architectures
• Successful application of AI/ML to find vulnerabilities in systems or products
• Automation of cyber actions or analysis
Tech Talk call for papers criteria for Topic B - What Works: Approaches that reduce cyber harm
Summary
Our collective cyber security best-practices are, for the most part, based on the sector's learned successes and failures, and the application of analysis that is often part logic, part experience and part intuition.
Despite being a subject rooted in technology, cyber security practices are rarely backed by robust data or scientific evidence. This is your chance to share ideas to correct this.
The NCSC would welcome technical talks that seek to analyse what makes some cyber defenders more effective than others. Whether that be causes of compromise, remediation or recovery.
We don't expect speakers to have fully solved this great challenge, but would welcome those in Government, industry and academia who have taken a scientific approach to cyber.
Criteria
We are looking for talks that deliver insight into one or more of the following areas:
• Approaches to taking a scientific approach to cyber security
• Statistical analysis of cyber incidents and common features
• Empirical evidence for the real-world efficacy of cyber security controls
• Studies and analysis into the features of successful to unsuccessful cyber defenders, and evidence for approaches which reduce the cost of cyber incidents
• Technology that is proven to inhibit adversary strategies. Identification of mitigations which reduce cyber harm to the greatest degree.
• The effect of mitigations and deterrents on cyber adversaries
Summary
Every year the adversary threat evolves, shifting their focus onto new technologies, and exhibiting new tactics and techniques when exploiting our systems.
The NCSC welcomes talks which genuinely move our collective understanding of the adversary forward or prepare defenders to protext their systems from their evolved adversary in the future.
Criteria
We are looking for talks that deliver insight into one or more of the following areas:
• Studies into threat actor data, including threat actor structures and motivations
• Analysis of incident data, and the tactics employed by adversaries during those incidents
• Data describing shifts in adversary behaviour or focus
• Evidence of the use of automation and AI by adversaries
PLEASE READ: IMPORTANT INFORMATION
-
Marking Criteria
-
Submission process
-
Equality, Diversity & Inclusion
-
Interactivity
-
Supporting Documents
-
Media
-
Speaker Passes
All applications will be scored in an open and honest way, based on the below criteria being met, by an NCSC panel:
- Alignment with the topics of interest above
- Impact for the CYBERUK audience, particularly CISOs and Cyber leads within Government and industry
- Technical quality / depth
- Breadth of voices - our intent is that the programme should represent the wide breadth of cyber research, from a range of organisations, locations and backgrounds.
You will be allocated one complimentary speaker pass to attend CYBERUK 2026, registration link will be shared in January 2026. CYBERUK provides a powerful platform from speakers it is seen as a real privilege to be asked by the NCSC to contribute to the event. Therefore, travel and expenses will not be covered by the CYBERUK event organisers.
Paper summaries must be submitted using the CYBERUK 2026 submission form, this can be accessed via the button above and here: https://forms.office.com/e/68CPXQFCbK?origin=lprLink
The submission process has been spilt into stages. You will firstly be asked to provide information about your organisation, alignment with the CYBERUK 2026 theme, and lastly you will be able to insert your abstract for the Tech Talk you wish to apply for into the content box provided in the submission form.
We strongly encourage candidates of all different background and identities to apply.
When developing the content, there is a desire for the delegates to play an active role in the event and so look to encourage interactivity. In previous years, this has included different formats from demonstrations, live hacks, live acted scenarios, animations etc.
Sli.do has been successfully used at previous CYBERUK events and is planned for use again at CYBERUK 2026. Sli.do is accessible through the user’s web browser and can be used anonymously. It allows the Speaker / Moderator to pose questions to the audience through polls and also engage with audience Q&A. Further details will be provided to successful submissions.
Where supporting documents are relevant (though not required), to help explain/visualise your ideas (maximum 2 documents). The files can be technical papers, graphs, tables, photos, illustrations, or anything else that will help the reader understand your submission.
CYBERUK 2026 welcome original content, however high-quality talks that have been presented at other events over the last year will also be accepted.
For CYBERUK 2026 the initial proposal is that all Tech Talks are closed to the press and media. However, you will still be able to specify whether filming/photography is permitted.
SUPPORT
All applications will be scored in an open and honest way by an NCSC panel, based on the marking criteria being met. The NCSC reserves the right not to accept papers or to suggest alternatives.
For any enquiries regarding the programme or your submission, please contact: cyberuk-papers@brayleinoevents.com.
