Callforspeakers

The Risk Operations Conference 2026

Submit Your Talk
April 21-22 2026 London, UK

00:00:00

DaysHourMin

Jan 23

Call for
Speakers closes

Feb 6

Call for
Speakers Notifications

Feb 27

Schedule
Announcement

April 21-22

Event
Dates

The Risk Operations Conference(ROCon) offers an unparalleled chance to stay informed about advancements in cybersecurity, best practices, and innovations.

Attendees will gain valuable insights and learn tips and tricks from security professionals, discovering how they effectively safeguard their organizations.

Session Format:

clock20 to 25 minutes talk

Additionally, ROCon provides an opportunity for you to present and share your experiences with peers on how you are leveraging the Qualys platform to address cybersecurity challenges and the positive outcomes you've received. We encourage you to submit a session as it is a great opportunity to showcase your efforts amongst your peers. Submit your proposed topic for consideration.

Suggested Speaker Topic Areas

Leadership Topics for CISOs:

hero mobile
Cybersecurity &  Risk Governance

Cybersecurity & Risk Governance

Shifting Responsibilities of the CISO

Shifting Responsibilities of the CISO

Going Beyond Measurement to Mitigate Cyber Risk

Going Beyond Measurement to Mitigate Cyber Risk

Securing the Supply Chain

Securing the Supply Chain

Artificial Intelligence in Security

Artificial Intelligence in Security

Strategic and Tactical Topics:

hero2 mobile
Automating Audit Readiness

Automating Audit Readiness

Securing the Attack Surface

Securing the Attack Surface

Leveraging Automation in Remediation / Patching

Leveraging Automation in Remediation / Patching

Securing Your Multi-Cloud Infrastructure

Securing Your Multi-Cloud Infrastructure

Managing and Mitigating Risk for Your DevOps Pipeline

Managing and Mitigating Risk for Your DevOps Pipeline

Protecting Against Modern Threats to Web Applications and APIs

Protecting Against Modern Threats to Web Applications and APIs

Modern Risk-Based Vulnerability Management: Prioritizing what Matters

Modern Risk-Based Vulnerability Management: Prioritizing what Matters

Data Privacy and Governance

Data Privacy and Governance

Security in the Age of AI

Security in the Age of AI

Submission Process & Requirements

icon

STEP 01

Your submission should highlight a specific challenge, the solution you applied, and the measurable results.

icon

STEP 02

Qualys will review all submissions and notify presenters of acceptance and in-person session status.

icon

STEP 03

Only complete submissions will be accepted.

icon

STEP 04

You may submit multiple proposals, but each must have its own submission form.

icon

STEP 05

If travelling from abroad, ensure you're eligible to enter the United Kingdom and have valid travel documents.

If you have any questions regarding your submission, please email them to [email protected]

Agreement To Terms of
Speaking Remuneration

arrow

Official Terms

arrow
Submit Your Talk