NCyTE Center
Home MenuCyAD Call for Proposals
New this year—two exciting ways to get involved!
Keynote Speaker Nominations
Submission Deadline: January 30, 2026
Nominate an inspiring keynote or plenary speaker for the 2026 CyAD Summit, June 23–25, 2026. Note: Speaker fees and honoraria are not available.
Submit a Nomination
Call for Proposals
Submission Deadline: January 30, 2026
Submit a Proposal
We invite you to submit a proposal to present at the 2026 Cybersecurity Across Disciplines (CyAD) Summit, held at Moraine Valley Community College on June 23-25, 2026. All sessions will be in person. We look forward to reviewing your innovative ideas and contributions. Details for submitting your proposal are below.
Summit Core Themes
AI and Emerging Technologies:
In alignment with the America’s AI Action Plan (White House, July 2025), the 2026 CyAD Summit will spotlight the intersection of AI and cybersecurity. Sessions may explore equipping technicians to secure AI and cyber threats to emerging technologies, harnessing AI for cybersecurity innovation, and applying key risk mitigation strategies across one or more of the 16 nationally prioritized critical infrastructure sectors (e.g., agriculture, communications, energy, financial, healthcare, technology, manufacturing, transportation, water) and throughout the entire product and system development life cycles.
Interdisciplinary Collaboration and Learning Communities
Fostering innovative, cross-disciplinary partnerships that unite academia, industry, and government. Exploring models for co-designed curricula, joint projects, and interdisciplinary teaching and research that strengthen cyber resilience and promote sustained collaboration across sectors.
Academics and Workforce Development:
Designing strategies, curricula, and hands-on activities that embed cybersecurity into diverse programs of study. Emphasizing academic–industry collaboration to prepare students for evolving cybersecurity roles and foster cross-disciplinary skills.
Proposal Guidelines:
Proposals should clearly demonstrate alignment with the Summit Core Themes and include collaboration across disciplines and sectors. Sales-oriented presentations will not be accepted.
Proposals should include either:
- Joint proposals between faculty and industry professionals within a specific discipline
- Joint proposals between faculty and industry professionals from connecting or overlapping disciplines
- Faculty from at least two different fields (e.g., Cybersecurity and Automotive)
Sector Categories:
Presentations should address the critical need for cybersecurity awareness and skills across the following six sector categories based on the 16 Critical Infrastructure (CI) sectors defined by CISA.
Choose a primary and secondary sector category that best align with your proposed presentation.
- Energy and Utilities
Critical resources related to energy production, water management, and other utility services necessary for the functioning of modern society.- CI Sector: Dams, Energy, Water and Wastewater Systems, Nuclear Reactors, Materials, and Waste
-
ATE Areas: Agricultural and Environmental Technologies, Bio and Chemical Technologies, Engineering Technologies, General Advanced Technological Education, and others.
- Transportation, Manufacturing, and Supply Chain
Systems supporting the movement of goods and people, industrial manufacturing, and defense—all vital to national security and economic stability.- CI Sector: Transportation Systems, Critical Manufacturing, Defense Industrial Base
-
ATE Areas: Advanced Manufacturing Technologies, Agricultural and Environmental Technologies, Bio and Chemical Technologies, Engineering Technologies, Micro and Nanotechnologies, Geospatial Technologies, General Advanced Technological Education, and others.
- Communication and Technology
Information sharing, telecommunications, and the digital systems forming the backbone of connected industries.- CI Sector: Communications, Information Technology
-
ATE Areas: Advanced Manufacturing Technologies, Engineering Technologies, Information and Security Technologies, Geospatial Technologies, Micro and Nanotechnologies, General Advanced Technological Education, and others.
- Healthcare, and Public and Emergency Services
Focus on the well-being of the public and include both healthcare systems and the emergency response infrastructure.- CI Sector: Healthcare and Public Health, Emergency Services, Government Services & Facilities
-
ATE Areas: Agricultural and Environmental Technologies, Bio and Chemical Technologies, Information and Security Technologies, Geospatial Technologies, General Advanced Technological Education, and others.
- Finance and Commercial
Financial systems and commercial spaces that are central to economic activities and the functioning of markets.- CI Sector: Financial Services, Commercial Facilities
-
ATE Areas: Information and Security Technologies, General Advanced Technological Education, and others.
- Food and Agriculture
Food production and safety systems, with the chemical sector playing a key role in both agriculture and manufacturing processes.- CI Sector: Food and Agriculture, Chemical
-
ATE Areas: Advanced Manufacturing Technologies, Agricultural and Environmental Technologies, Bio and Chemical Technologies, Engineering Technologies, Geospatial Technologies, General Advanced Technological Education, and others.
Example topics include, but not limited to:
- Share case studies, success stories, and lessons learned from presenter’s own experiences teaching cybersecurity and/or teaching topics in the above areas.
- Innovations in applying cybersecurity concepts to other disciplines such as:
- Teaching wireless technology to automotive students for securing in-car communication systems.
- Primary sector: Transportation, Manufacturing, and Supply Chain
- Secondary sector: Communication and Technology
- Incorporating cybersecurity principles into medical programs for securing medical devices and protecting patient data.
- Primary sector: Healthcare, and Public and Emergency Services
- Secondary sector: Communication and Technology
- Teaching basic security measures to students in PLC/SCADA courses to safeguard industrial control systems.
- Primary sector: Transportation, Manufacturing, and Supply Chain
- Secondary sector: Energy and Utilities
- Collaborating with business programs to teach the significance of personally identifiable information (PII) protection and regulatory compliance.
- Primary sector: Finance and Commercial
- Teaching wireless technology to automotive students for securing in-car communication systems.
Program Tracks:
All tracks should align with the Summit’s Core Themes.
Select a primary and secondary track that best reflects your proposed presentation’s focus.
- Threats to AI and Emerging Technologies: Highlighting advances in technology, such as AI, Internet of Everything, and quantum computing, and their interdisciplinary applications. Sessions may explore equipping technicians to secure AI and cyber threats to emerging technologies (e.g., agentic cyber attacks and defense, deep fake and synthetic cyber attacks, and quantum security, and cyber warfare), harnessing AI for cybersecurity innovation, and applying key risk mitigation strategies across the 16 nationally prioritized critical infrastructure sectors (e.g., agriculture, communications, energy, financial, healthcare, technology, manufacturing, transportation, water) and throughout the entire product and system development life cycles.
- Cybersecurity Risk and Problem-Solving: Practical frameworks for assessing, managing, and addressing AI and cybersecurity risks in diverse fields through real-world, problem-based learning.
- Foundations of Interdisciplinary Cybersecurity: Beginner-level track for non-technical attendees, college administrators, and leaders. Exploring strategies for integrating core AI and cybersecurity concepts into any discipline and gaining insights into developing new courses, programs, or grant opportunities to support interdisciplinary approaches.
- Human Factors, Privacy, Ethics, and Governance in Cybersecurity: Exploring user behavior, social engineering, ethical dilemmas, data protection, security and privacy laws, and policies, while fostering a culture of awareness and compliance across fields.
Presentation Format:
- Session Presentations (45 minutes):
Share insights, strategies, and practical applications that inform and engage the audience, with time for Q&A.
- Panel Presentation (45 minutes):
Join with 2-4 speakers to explore a topic from multiple perspectives, followed by a moderated discussion and audience Q&A.
- Interactive Workshops (1.75 hours):
Facilitate hands-on, participatory sessions that encourage deep engagement and collaborative learning, with time for Q&A.
- Student Spotlight (20 minutes):
Community college and university students — Deliver a “Ted Talk”- style presentation, showcasing original ideas, research, or innovations in cybersecurity and emerging technologies.
- Keynote or Plenary Presentation
How Proposals Are Evaluated
Download the Evaluation Rubric (PDF)
Explore past programs for examples of successful presentations:
Key Deadlines:
- Proposal Submission Deadline: January 30, 2026
- Approximate Notification Date: March 11, 2026
Presenter Requirements:
If your proposal is accepted, all presenters and co-presenters must:
- Confirm Participation: Confirm your intention to present and agree to the speaker terms and conditions by March 18, 2026.
- Register by May 8, 2026: Registration rates and policies are as follows.
- Early Bird Rate ($150): Available to all attendees through January 30, 2026 at 5:00 PM Pacific. If you plan to attend regardless of proposal outcome, register early to lock in this rate!
- Presenter Rate ($150): Accepted presenters are eligible for the discounted presenter registration rate of $150 from the notification date (March 11, 2026) through May 8, 2026 at 5:00 PM Pacific.
- Important Note: If you register at the Regular Rate ($250) before proposal decisions are announced, no rate adjustments will be issued—even if your proposal is later accepted.
- Late Registration ($500): After May 8, 2026, the Late registration rate of $500 will apply to ALL attendees.
- Submit Presentation Materials: Upload your final presentation and any supporting materials by May 30, 2026 for preloading on the summit room presentation system.
If your proposal is selected, you will receive detailed instructions for summit registration and presentation material submission.
Questions?
If you have any questions about the presentations, please email Chris Rondeau, CyAD 2026 Program Committee Co-Chair at crondeau@bpcc.edu.
