Conference Launch Introduction
Dear guests, white-hat hackers, security experts, researchers, and enthusiasts,Welcome to the official launch of the Hacking Group International Hackathon Cybersecurity Conference!I’m Amanda, your AI host for this event. It is a great honor to gather with all of you on this platform of intelligence and passion, to explore cutting-edge cybersecurity technologies, research, and practical insights.
Call for Topics
Theme:
Gathering Global Wisdom to Build a Cybersecurity Fortress
会议
Goal: To create a global platform for cybersecurity exchange.We invite top experts, scholars, and industry leaders from around the world to share their unique insights and experiences.Format: Pre-recorded sessions + Live interactive segments
Call for Submissions
Eligible Participants: Hackers, security researchers, students, enterprise security teams, independent consultants—anyone with original thoughts or research in cybersecurity.Topics: No restrictions on content or duration. We welcome areas such as:
·Cyber offense and defense strategies
·Vulnerability discovery and analysis
·Cryptography applications
·Data protection and privacy-enhancing technologies
·AI applications in cybersecurity
·IoT and industrial control security
·Cloud security
·Legal and regulatory insights in cybersecuritySpecial encouragement for cross-disciplinary topics (e.g., red-blue teaming, blockchain security, secure DevOps, AI + security, etc.)
Time Zone Allocation: Submissions will be organized by global time zones. Each time zone will have a capped number of accepted topics (e.g., max 10), ensuring worldwide representation.
Video Guidelines:
·The organizing committee will provide a detailed recording guide (format, resolution, audio quality, etc.).
·Use a clean, professional background (virtual or physical).
·English subtitles encouraged. Non-English speakers should provide subtitle files.
·Include a brief self-introduction and talk overview.
Conference Workflow
Submission Phase:
·Online submission portal on the official website
·Dedicated submission email for questions and materials
·Preliminary screening by organizers for theme relevance
Review Phase:
·Judged by a panel of renowned experts and industry leaders
·Criteria: originality, practicality, technical depth
·Selected speakers will be notified to proceed to video recording
Recording Phase:
·Follow recording guide to ensure quality
·Tech support available for editing, subtitles, etc.
·Videos submitted to organizers for final publication
Publishing Phase:
·Videos released on the conference website and partner platforms
·Categorized by topic or time zone
·Search and filtering available for easy navigation
·Encouragement for social media sharing to expand reach
Live Interactions:
·Scheduled live Q&A sessions and roundtables
·Audience can ask questions via comments or chat
·Recordings of live segments will be archived on the website
Conference Timing
Sponsorship Plan
Goal: Attract sponsors from tech companies, cybersecurity vendors, and educational institutionsSponsorship Tiers:
·Diamond: Top-level benefits and exposure
·Gold: Extensive benefits
·Silver: Moderate support and visibility
·Bronze: Basic support, foundational exposure
Sponsor Benefits:
·Brand logo displayed on the website, videos, and live streams
·Exclusive sponsor introduction videos integrated into sessions
·Free or discounted passes for sponsor clients or staff
·Acknowledgment during live sessions
·Promotion via official social media channels
Customization Available: Tailored packages to fit sponsor needs and budgets with dedicated consultation support
Viewing Strategy
Free Access:
·Basic content (some recorded sessions + interactive live content) free for all active participants
Social media promotion encouraged—participants can earn access codes by reaching certain sharing milestones.
Full access for:
·Major contributors and VIP guests
·Chinese region participants must verify identity to prevent abuse of access rights
Premium Membership:
·Exclusive access to selected talks
·Early access privileges
·Priority during live sessions
·Multiple tiers to match user needs
·Dedicated member support
Enterprise Packages:
·Group access based on company size and demand
·Flexible cooperation modes with technical assistance
Offline Participation (China only):
·“Conference Party” venues for local attendees
·Ticketed access:
oEarly bird: discounted price for early registration
oRegular: standard pricing
oVIP: full perks + exclusive gifts + 1-on-1 consultation
Co-Organizer Recruitment
Purpose: To enhance global collaboration and facilitate the successful delivery of this international eventTarget Partners:
·Cybersecurity solution providers, service vendors, equipment manufacturers
·Universities and research institutions
·Industry associations and NGOs
·Media agencies with a cybersecurity focus
Roles & Responsibilities:
·Financial/material support
·Conference promotion
·Technical/human resources assistance
·Exhibits during the event
·Active participation in discussions and networking
Requirements:
·Industry influence and reputation
·Strong technical capacity and resources
·Commitment to cybersecurity development
·Ability to coordinate with the organizing committee
How to Apply:
·Online registration form
·Offline consultation for qualified applicants
·Sign formal cooperation agreement upon consensus
Training & Management:
·Training sessions for co-organizer staff
·Dedicated liaison team for coordination and communication
Volunteer Recruitment
Goal: Build a passionate and responsible team to support the conferenceScope: Open to individuals worldwide passionate about cybersecurityDuties Include:
Requirements:
·Interest and knowledge in cybersecurity
·Strong communication and teamwork skills
·Responsibility and punctuality
·Proficiency in at least one language (English preferred; multilinguals prioritized)
Recruitment Process:
·Official announcement on the conference website and social media
·Dedicated volunteer application portalTraining & Evaluation:
·Online training covering background, roles, and responsibilities
·Group communication and task management channels
·Regular feedback and performance reviews
·Certificates and recognition for outstanding volunteers
Founding Team
关于我们
Excitingactivities
Cooperative contact
Scan the code to follow
原文始发于微信公众号(HackingGroup):Hackathon Cybersecurity Conference Announcement Thread
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论