![](https://aavar.org/cybersecurity-conference/wp-content/uploads/2024/02/250Delegates-300x186.png)
![](https://aavar.org/cybersecurity-conference/wp-content/uploads/2024/02/50Speakers-300x186.png)
![](https://aavar.org/cybersecurity-conference/wp-content/uploads/2024/02/40Presentations-300x186.png)
![](https://aavar.org/cybersecurity-conference/wp-content/uploads/2024/02/Panel-Discussions-300x186.png)
![](https://aavar.org/cybersecurity-conference/wp-content/uploads/2024/02/CISO-Connect-300x186.png)
![](https://aavar.org/cybersecurity-conference/wp-content/uploads/2024/02/CISO-Awards-300x186.png)
Topics for Papers include
- Cyber AI to the Fore
- EDR/XDR Solutions and Flaws
- Supply Chain Compromise
- Cyber Forensic Investigation and Prosecution
- Sovereign Cyber Security
- Threat Intelligence Counter ATT&CK
- Is Offence the Best Defence?
- Vulnerability Exploitation of 0-days/n-days
- APT Groups and their TTPs
- pwning IoT/OT Infrastructure
- Malware on Mac
- UEFInsecurity
- ItW Mobile Threats
The above topics are only illustrative and not exhaustive. We welcome all recent threat research contributions that benefit the cybersecurity community.
Audience Profile
- CEOs
- CTOs
- CSOs/CISOs
- Regulators
- Law Enforcement Agencies
- Researchers
Past Event Highlights
Expert Speakers
CISO Panelists
Gallery
Partnership Opportunities
![](https://aavar.org/cybersecurity-conference/wp-content/uploads/2024/02/Partnership-Opportunities-1.png)
For more information on AVAR 2024 Partnership Benefits