Abstract Submission Abstract SubmissionDesignation- Select Designation -DrProfMrMissMrsNameEmailCompany/UniversityPhone/MobileCountry- Select Country -AfghanistanAlbaniaAlgeriaAndorraAngolaAntigua and BarbudaArgentinaArmeniaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBhutanBoliviaBosnia and HerzegovinaBotswanaBrazilBruneiBulgariaBurkina FasoBurundiCôte d'IvoireCabo VerdeCambodiaCameroonCanadaCentral African RepublicChadChileChinaColombiaComorosCongo (Congo-Brazzaville)Costa RicaCroatiaCubaCyprusCzechia (Czech Republic)Democratic Republic of the CongoDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEswatini (Swaziland)EthiopiaFijiFinlandFranceGabonGambiaGeorgiaGermanyGhanaGreeceGrenadaGuatemalaGuineaGuinea-BissauGuyanaHaitiHoly SeeHondurasHungaryIcelandIndiaIndonesiaIranIraqIrelandIsraelItalyJamaicaJapanJordanKazakhstanKenyaKiribatiKuwaitKyrgyzstanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall IslandsMauritaniaMauritiusMexicoMicronesiaMoldovaMonacoMongoliaMontenegroMoroccoMozambiqueMyanmar (Burma)NamibiaNauruNepalNetherlandsNew ZealandNicaraguaNigerNigeriaNorth KoreaNorth MacedoniaNorwayOmanPakistanPalauPalestine StatePanamaPapua New GuineaParaguayPeruPhilippinesPolandPortugalQatarRomaniaRussiaRwandaSaint Kitts and NevisSaint LuciaSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth KoreaSouth SudanSpainSri LankaSudanSurinameSwedenSwitzerlandSyriaTajikistanTanzaniaThailandTimor-LesteTogoTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTuvaluUgandaUkraineUnited Arab Emirates (UAE)United Kingdom (UK)United States of America (USA)UruguayUzbekistanVanuatuVenezuelaVietnamYemenZambiaZimbabweTopic- Select Topic -Cyber SecurityEthical HackingVulnerability ManagementNetwork SecurityCryptographyWeb SecurityBug Bounty InsightsAI SecurityCybersecurity ComplianceSocial EngineeringMalware AnalysisMobile Security, IoT Security, Cloud SecurityPhishingEmail SecurityCyber Security AwarenessPhishing AwarenessRansomwareData SecurityEndpoint SecurityCyber AttacksCybersecurity StrategyPresentation Category- Select Presentation Category -Oral PresentationPoster PresentationWorkshopFile UploadChoose File Submit Abstract Sample Abstract Download 1. Cyber Security2. Ethical Hacking3. Vulnerability Management4. Network Security5. Cryptography6. Web Security7. Bug Bounty Insights8. AI Security9. Cybersecurity Compliance10. Social Engineering11. Malware Analysis12. Mobile Security, IoT Security, Cloud Security13. Phishing14. Email Security15. Cyber Security Awareness16. Phishing Awareness17. Ransomware18. Data Security19. Endpoint Security20. Cyber Attacks & Cyber Strategies