Logo Icon

CYBPRO 2K25 invites original research contributions, case studies, and review articles that align with the overarching theme "Empowering a Resilient Digital Future: Innovations in Cybersecurity, Data Privacy, and Trustworthy Systems." The conference offers a multi-disciplinary platform for researchers, academicians, professionals, and policymakers to share groundbreaking ideas and advancements. Submissions are encouraged across a broad spectrum of thematic tracks that reflect the pressing challenges and emerging solutions in today’s digital and cyber landscapes. Authors are requested to carefully select the most relevant track for their submissions from the following theme areas:

To submit, visit Submit Paper Page.

Submit Now

Tracks

Topics
  • Threat modeling and risk assessment methodologies
  • Cyber threat hunting and proactive detection
  • Security Information and Event Management (SIEM)
  • Insider threats and behavioral analytics
  • Threat intelligence sharing frameworks (e.g., STIX/TAXII)
  • Risk-based vulnerability management
  • Cyber resilience and business continuity strategies
Track Chairs
  • Dr. Aashish Kumar, Associate Professor, Chitkara University, Punjab, India
  • Dr. Ankit Vishnoi, Associate professor, Graphic era deemed to be University, Dehradun, India

Topics
  • Implementation of GDPR, HIPAA, CCPA, and other global data protection laws
  • Legal and ethical implications of cross-border data transfer
  • Consent management systems and data subject rights
  • Privacy by design and privacy-enhancing technologies (PETs)
  • Data governance, classification, and minimization
  • Data localization policies and challenges
  • Regulatory technology (RegTech) for compliance
Track Chairs
  • Dr. Avtar, Galgotias University, Noida, India
  • Dr. Jatin Kumar, Assistant Professor, Chitkara University, Punjab, India

Topics
  • AI-driven intrusion detection and prevention systems (IDPS)
  • Machine learning for anomaly detection and behavior modeling
  • Adversarial attacks on ML models and countermeasures
  • Federated learning and distributed intelligence in cybersecurity
  • AI for automated threat response and remediation
  • Explainable AI (XAI) in security applications
  • Reinforcement learning for dynamic security policies
Track Chairs
  • Dr. Mayank Jain, Assistant Professor, Bennett University, Greater Noida, UP, India
  • Dr. Mudita, Assistant Professor, IILM University, Greater Noida, UP, India

Topics
  • Blockchain-enabled identity and access management
  • Secure and tamper-proof logging using distributed ledgers
  • Smart contract vulnerabilities and verification tools
  • Decentralized trust management in IoT and cloud ecosystems
  • Blockchain for supply chain and transaction integrity
  • Consensus algorithms and their impact on network security
  • Applications of NFTs and tokenization in cybersecurity
Track Chairs
  • Dr. Sridevi Sridhar, SRM Institute of Science and Technology, Vadapalani Campus, Chennai
  • Dr. Shivani Wadhwa, Associate Professor, Chitkara University, Punjab, india

Topics
  • Secure coding practices and static/dynamic code analysis
  • Software supply chain security and SBOM (Software Bill of Materials)
  • DevSecOps and continuous security integration
  • Security architecture for large-scale applications
  • Secure APIs and microservices security
  • Vulnerability management and patching strategies
  • Secure system design for embedded and real-time systems
Track Chairs
  • Dr. K.R. Ramkumar, Professor, CSE (AI), Chitkara University, Punjab
  • Dr. Anil Kumar, HOD, Poornima University, Jaipur, India

Topics
  • Lightweight Security Protocols for Constrained IoT Devices
  • Zero-Trust Architectures in Cloud and Edge Environments
  • AI/ML-Based Intrusion Detection for IoT–Edge Networks
  • Privacy-Preserving Data Sharing in IoT–Cloud Integration
  • Blockchain-Enabled Trust and Security in Edge Computing
Track Chairs
  • Dr. Deepali Gupta, Professor, Chitkara University, Punjab, India
  • Dr. Monica Dutta, Assistant Professor, GLA University, Mathura, India

Topics
  • Red Teaming and Advanced Attack Simulations
  • Exploiting and Securing IoT, Cloud, and Edge Systems
  • AI and Automation in Penetration Testing
  • Social Engineering and Cybersecurity Awareness
  • Ethics, Law, and Responsible Disclosure in Cybersecurity
Track Chairs
  • Dr. Varsha Grover, Associate Professor, MMU University, Ambala, India
  • Dr. Ashok Kumar, Associate Professor, Amity University, Punjab, India

Topics
  • AI-driven intrusion detection and threat prevention
  • Machine learning for malware and anomaly detection
  • Adversarial and explainable AI in cybersecurity
  • Automated incident response and threat hunting
  • Privacy-preserving and adaptive ML models for cyber defense
Track Chairs
  • Dr. Bhanu Sharma, Assistant Professor–Research, Chitkara University, Punjab, India
  • Dr. Nikhil Shrivastav, Assistant Professor, CRIO, Chitkara University, Punjab, India

Tracks

Topics
  • Threat modeling and risk assessment methodologies
  • Cyber threat hunting and proactive detection
  • Security Information and Event Management (SIEM)
  • Insider threats and behavioral analytics
  • Threat intelligence sharing frameworks (e.g., STIX/TAXII)
  • Risk-based vulnerability management
  • Cyber resilience and business continuity strategies
Track Chairs
  • Dr. Aashish Kumar, Associate Professor, Chitkara University, Punjab, India
  • Dr. Ankit Vishnoi, Associate professor, Graphic era deemed to be University, Dehradun, India

Topics
  • Implementation of GDPR, HIPAA, CCPA, and other global data protection laws
  • Legal and ethical implications of cross-border data transfer
  • Consent management systems and data subject rights
  • Privacy by design and privacy-enhancing technologies (PETs)
  • Data governance, classification, and minimization
  • Data localization policies and challenges
  • Regulatory technology (RegTech) for compliance
Track Chairs
  • Dr. Avtar, Galgotias University, Noida, India
  • Dr. Jatin Kumar, Assistant Professor, Chitkara University, Punjab, India

Topics
  • AI-driven intrusion detection and prevention systems (IDPS)
  • Machine learning for anomaly detection and behavior modeling
  • Adversarial attacks on ML models and countermeasures
  • Federated learning and distributed intelligence in cybersecurity
  • AI for automated threat response and remediation
  • Explainable AI (XAI) in security applications
  • Reinforcement learning for dynamic security policies
Track Chairs
  • Dr. Mayank Jain, Assistant Professor, Bennett University, Greater Noida, UP, India
  • Dr. Mudita, Assistant Professor, IILM University, Greater Noida, UP, India

Topics
  • Blockchain-enabled identity and access management
  • Secure and tamper-proof logging using distributed ledgers
  • Smart contract vulnerabilities and verification tools
  • Decentralized trust management in IoT and cloud ecosystems
  • Blockchain for supply chain and transaction integrity
  • Consensus algorithms and their impact on network security
  • Applications of NFTs and tokenization in cybersecurity
Track Chairs
  • Dr. Sridevi Sridhar, SRM Institute of Science and Technology, Vadapalani Campus, Chennai
  • Dr. Shivani Wadhwa, Associate Professor, Chitkara University, Punjab, india

Topics
  • Secure coding practices and static/dynamic code analysis
  • Software supply chain security and SBOM (Software Bill of Materials)
  • DevSecOps and continuous security integration
  • Security architecture for large-scale applications
  • Secure APIs and microservices security
  • Vulnerability management and patching strategies
  • Secure system design for embedded and real-time systems
Track Chairs
  • Dr. K.R. Ramkumar, Professor, CSE (AI), Chitkara University, Punjab
  • Dr. Anil Kumar, HOD, Poornima University, Jaipur, India

Topics
  • Lightweight Security Protocols for Constrained IoT Devices
  • Zero-Trust Architectures in Cloud and Edge Environments
  • AI/ML-Based Intrusion Detection for IoT–Edge Networks
  • Privacy-Preserving Data Sharing in IoT–Cloud Integration
  • Blockchain-Enabled Trust and Security in Edge Computing
Track Chairs
  • Dr. Deepali Gupta, Professor, Chitkara University, Punjab, India
  • Dr. Monica Dutta, Assistant Professor, GLA University, Mathura, India

Topics
  • Red Teaming and Advanced Attack Simulations
  • Exploiting and Securing IoT, Cloud, and Edge Systems
  • AI and Automation in Penetration Testing
  • Social Engineering and Cybersecurity Awareness
  • Ethics, Law, and Responsible Disclosure in Cybersecurity
Track Chairs
  • Dr. Varsha Grover, Associate Professor, MMU University, Ambala, India
  • Dr. Ashok Kumar, Associate Professor, Amity University, Punjab, India

Topics
  • AI-driven intrusion detection and threat prevention
  • Machine learning for malware and anomaly detection
  • Adversarial and explainable AI in cybersecurity
  • Automated incident response and threat hunting
  • Privacy-preserving and adaptive ML models for cyber defense
Track Chairs
  • Dr. Bhanu Sharma, Assistant Professor–Research, Chitkara University, Punjab, India
  • Dr. Nikhil Shrivastav, Assistant Professor, CRIO, Chitkara University, Punjab, India