Become a Speaker
Qubit Conference® Prague 2025

Important Information

The conference will be conducted in English. The entire speaker application must be completed and submitted in English.

Closure of the Call for Speakers

March 5, 2025

Confirmation of the topic selection

24. March, 2025

Evaluation of presentations

Until April 5, 2025

Presentation rehearsals (mandatory for vendors)

April – May, 2025

The conference runs in two parallel tracks: the Management Track and the Technical Track.
Management Track: what managers, executives, board members, and lawyers need to know about cybersecurity.
Technical track: what security professionals need to know to mitigate, detect, and respond to cyberattacks.

Cyber Resilience: Leaving No One Behind

Technologies are only as strong as the people who use them. With the increasing integration of artificial intelligence into security strategies, organizations must focus on technological innovations and cultivating a human approach to cyber resilience. While AI can quickly respond to threats, the human ability to innovate, adapt, and think strategically will ensure lasting resilience against ever-changing cyber risks.

Call for Speakers is Open

Become a speaker at Qubit Conference® Prague 2025 and share your best practices, strategies, and innovative approaches to cybersecurity with our community.


Speakers are carefully selected based on their knowledge and expertise by the program committee members. Speakers present a new set of cybersecurity challenges and threats through case studies and highly specialized presentations.
Our goal is to create a community where cybersecurity professionals come together to discuss, explore best practices, present strategies, and exchange innovative ideas.

Why Participate?

Take advantage of unique opportunities for networking in a community spirit and gain recognition from your industry peers.

Qubit is a socially responsible company that contributes annually to the United International School in Levoča to support visually impaired children. We do not charge speakers any fees and do not offer honorariums or reimbursements (travel and accommodation are your choices on how to contribute to a good cause). We are happy to provide you with a conference ticket, including free access to all conference sessions and networking events.

Proposed Conference Topics

  • AI (including ‘AI – to protect or not to protect and how?’)
  • Threat Intelligence
  • Reverse Engineering and Malware Analysis
  • Hackers and Threats – ethical hacking
  • Endpoint and IoT protection
  • Network and Infrastructure Security
  • Security Operations & Incident Response
  • OT and IoT Implications on Cybersecurity
  • TLPT – how to implement?
  • Security by design (Security by default)
  • Cloud Security
  • Digital supply chain risk
  • How to create a working security team?
  • Deepfakes
  • Journey to DORA
  • Security Strategy & Architecture, GRC
  • Modern attack techniques and behavioral training (social engineering, phishing).
  • AI/ML-driven risk metrics for a more forward-thinking approach.
  • Insider threats and modern manipulation tactics.

Tips and Recommendations

All submissions will be evaluated equally! The Qubit Conference® is product-independent. Members of the expert committee are selected based on their knowledge and experience in the field. The Qubit Conference® is product-independent. Committee members are selected based on their knowledge and experience in the field.

Primary attention will be given to presentations that include case studies from practice and practical recommendations. Please note that the presentation must be original and should not have been presented at other events.

We are looking for case studies and practical presentations with recommendations. If you are interested in a product presentation, please apply for the Qubit Shark Tank.

Presentations will take place in 20 and 40-minute intervals + 5 minutes for questions and answers. Only in-person presentations will be accepted.

Submissions will be evaluated based on the following criteria:

  • Emphasis on strategy, implementation presentations, and business results (for a management audience), and strong technical details and performance results (for a technical audience).
  • Relevance and timeliness of the content.
  • Presentation skills and expertise.

Reasons why your submissions are not accepted:

  • The content is a product or sales offer.
  • The name of the product, service, or company is in the discussion title.
  • The content is not relevant to the Qubit Conference® audience.
  • The topic of the submission does not match the themes of the Qubit Conference®.

How to write an application correctly? Download the manual.

Highest Rated Presentations

This year, we are introducing a new format a post-conference free webinar featuring the highest-rated presentations.

This applies to confirmed speakers whose presentations will be marked by the audience as the highest rated.
Following the highest-rated presentations, there will be a free webinar in the months after the event. These meetings provide a unique opportunity to connect live with the audience and receive immediate feedback from community members.

Rules for the Free Follow-Up Webinar

1. Eligibility:

Only confirmed speakers whose presentations are rated as the best by the audience can participate in the follow-up webinar.
The top-rated presentations will be determined based on audience feedback gathered during the event.

2. Timing:

Follow-up webinars will be scheduled in the months following the conference.
Speakers will be informed in advance about the proposed dates for the follow-up webinars.

3. Content:

The content of the webinar should expand on the topics covered in the original session.
Speakers are encouraged to include interactive elements, such as Q&A sessions, polls, and discussions, to engage the audience.

4.Promotion:

Webinars will be promoted through our official channels to maximize attendance and brand awareness.
Speakers are encouraged to promote the webinar through their own networks as well.

5. Engagement:

Speakers should be prepared for live interaction with the audience and provide immediate feedback.

We will encourage the audience to actively participate.

6. Feedback:

We will collect feedback from the webinar to assess its effectiveness and make improvements for future meetings.
Speakers will receive a summary of the feedback, which will help them understand the audience’s perspective and enhance their future presentations.

7. Technical Requirements:

Presenters must ensure that they have a stable internet connection and the necessary technical setup to conduct the webinar smoothly.

Any technical issues should be reported to the event organizers in a timely manner.
These guidelines should help ensure that webinars are valuable and engaging for both speakers and the audience.