CFP Directory Logo

CFP Directory

The Complete CFP Platform

Submit to CFPs as a speaker. Manage submissions as an organizer. Or run your own instance with our open source platform.

Simple & Effective Process

How It Works

Get started in minutes with our streamlined process designed for both speakers and organizers.

For Speakers

1

Create Your Profile

Sign up and build your speaker profile with your expertise and experience.

2

Discover Events

Browse CFPs that match your interests and expertise areas.

3

Submit Proposals

Submit your talk proposals directly through our platform.

4

Get Selected

Track your submissions and get notified when you're accepted.

For Event Organizers

1

Create Your Event

Set up your event details and customize your CFP requirements.

2

Receive Submissions

Speakers submit their proposals directly to your event.

3

Review Together

Collaborate with your team to review and score submissions.

4

Select Speakers

Choose the best talks and notify speakers of their acceptance.

NEW: Open Source Release

Self-Hosted Option

Now available! Run CFP Directory on your own infrastructure. Apache 2.0 licensed, open source, with optional federation to our speaker network.

1

Deploy the Platform

Clone the repo and run with Docker. Your infrastructure, your data.

2

Configure Your Instance

Set up your database, email, and branding. Full customization.

3

Enable Federation

Optional: Connect to our speaker network for one-click submissions.

4

Run Your CFPs

Complete CFP management with enterprise security on your terms.

New Community Members

Speakers Who Have Joined Us

A warm welcome to our newest speakers to the community!

TS

Tri S

Founder at NOZ Berkarya Indonesia

indonesia

A Telco Security Researcher and Embedded System Developer with over 10 years of experience in telecommunication protocol analysis, embedded system design, and cybersecurity research. Founder and principal researcher at NOZ Berkarya Indonesia, focusing on emerging network security, OpenBTS/Osmocom stack integration, and SIEM for Telco networks. Specialized in combining radio frequency analysis, reverse engineering, and real network behavior modeling to improve detection, response, and resilience in telecom infrastructures (2G–5G). Committed to advancing Sustainable Development Goal (SDG) 9: Industry, Innovation, and Infrastructure, by fostering innovation and resilient digital infrastructure through open-source research and secure communication technologies.These are some of the results of my research that I have published.1. 2 Januari 2015 - Publication of research result at Infosec Institute with title “Introduction to RFID Security” At this research we do Reverse Engineering at ticket commuter line and make a attack scenario RFID 2. Januari 2015 - Research RFID – Berdikari Standalone RFID Reader dan Emulator At this research we do a design PCB use ATmega328P to be Reader and Emulator to do cloning RFID Tag. • Deep learning microcontroller • Emulate RFID Tag • RFID cloning more than 3 tags in 1 Device 3. 12 Februari 2015 - Publication of research result at Infosec Institute with title “Introduction to Smartcard Security”At this research we learn about communication of protocol used on Smartcard EMV Debit Card and 4G Provider BOLT and implement several attack • Deep learning about SIM Card • Smartcard Architecture • simulated attack identification ◦ Physical attack: Reverse engineering, Smartcard cloning ◦ Remote attack: IMSI catcher, OTA 4. 19 Maret 2015 - Publication of research result at Infosec Institute with title “Introduction to GSM security” At this research we learn about communication of protocol used on Handphone and BTS (base transceiver station). We do analysis using radio (Universal Software Radio Peripheral) to know type of encription used and tracking handphone location used LAC and Cell ID. • Analisys 2G GSM Protocol • Tracking IMSI in your area 5. 9 Juni 2015 - Publication of research result at Infosec Institute with title “Reverse Engineering of Embedded Devices”At this research we learn about how to work “broadcasters livestream” with identify all CHIP used and learning about protocol communication used, we do Reverse Engineering using Bus Pirate and Saleae Logic Analyzer. • Device disassembly and PCB design analysis. • Debugging Communication Protocol 1-Wire, UART, I2C, SPI, JTAG. • Analyze the logic signals, capture sampling and decode protocol. • extracting the firmware. • Mapping the component Device and protocol used 6. Maret 2016 - Publication Mini Course of INFOSEC INSTITUTE with title “Advanced Pentesting Techniques with Metasploit” • AUXILIARY — Scanners (Intermediate → Advanced). Mastery of additional modules for discovery, fingerprinting, and brute force against services • AUXILIARY — Fuzzers (Intermediate). Find crashes/vulnerabilities in services through Metasploit's built-in fuzzing • Credential Harvesting & Social-Engineering (Intermediate → Advanced). Technique to retrieve credentials from endpoints via post-exploit modules. • Post-Exploitation — Privilege Escalation (Advanced). • Post-Exploitation — Lateral Movement & Persistence (Advanced). • IE Proxy PAC / Proxy Abuse (Attack on Browsing Infrastructure) (Advanced). • Misc: NOP generator & Encoders (Exploit robustness / Evasion) (Advanced). • Advanced module/payload configuration & custom Metasploit modules (Expert) 7. Desember 2018 - Research and manufacture of post-disaster telecomunication equipment. Post-disaster telecommunications equipment (portable BTS / emergency comms kit) aims to provide emergency voice/data services when commercial infrastructure is damaged. This solution involves the design of radio equipment (small/portable BTS), a standalone power system, backhaul options (satellite / microwave / cellular fallback), antenna and RF tuning, signal security, and field operations and logistics procedures.8. 24 Agustus 2019 - Publication of research result at Infosec Institute with title “Mobile Phone Tracking”At the research we learning about protocol communication between Mobile Phone and BTS (base transceiver station) working, with identification LAC , Cell ID and Timing advance (TA) we could to know where the signaling come from. 9. September 2025 – SIEM Telco Research at the research we make a idea inovasion combination of OpenBTS , Osmocom Stack , and ella-core to build a telco-aware SIEM pipeline, benefit for analysis behavior endpoint and cell realtime for detection response, low level kernel analysis behavior realtime detection response, fraud detection realtime.

Telecom SecurityCyber SecurityEdge Computing Security
AC

Ailín Castellucci

CEO & Founder at Hecate Security

BuenosAires, Argentina

Ailin Castellucci’s speaking experience spans key cybersecurity communities and public forums across Latin America, where she delivers both technical workshops and high-level talks focused on practical, real-world security.She has been part of conference lineups such as NotPinkCon, where she presented “Cyber-Operation,” exploring cybersecurity and cyber conflict concepts in an accessible, audience-friendly way.At Congreso AGETIC 2023 (Bolivia), she led a hands-on workshop, “Threat Modeling in a Nutshell,” designed to help teams apply threat modeling methodologies in practice—covering strengths, real-life use, and the human challenges organizations face when implementing these practices. In the same event, she was also listed as a keynote speaker with “Avengers, assemble! – Seguridad colaborativa,” reinforcing her emphasis on collaborative security approaches.She has also spoken at the “Cibercrisis” conference series by Sombreros Blancos, where she presented a talk titled “Roses are red, violets are blue… there’s a spy in your net and she’s behind you!”, bringing an engaging, story-driven angle to security awareness and adversarial thinking.Beyond large events, Ailin frequently speaks in community and online formats—such as Discord sessions—on topics like “Seguridad Colaborativa,” aiming to bridge the gap between security best practices and what teams can realistically implement.Overall, her speaking style blends practitioner experience (offensive security, bug bounty, and security teams) with clear frameworks and actionable guidance, making her talks useful for both newcomers and experienced professionals.

Cyber SecurityApplication SecurityWeb Application Security

Swipe to see more speakers →

Join thousands of speakers and organizers

Ready to Transform YourConference Experience?

Whether you're a speaker looking for your next opportunity or an organizer seeking the perfect lineup, CFP Directory has everything you need to succeed.

No credit card required • Free to get started • Open source available