Call for papers round 1 is closed and results are on the scheduleRound 2 is now open and closes August 7, 2015 – 11:59pm Pacific. Please submit your proposal below.

OWASP AppSec conferences are the premier gathering for software security leaders and researchers. It brings together the application security community to share cutting-edge ideas, initiatives and technological advancements.


OWASP AppSec conferences are true security conferences; with all talks and presentations focusing on various areas of information security. Topics should focus on the technical and social aspects of security, and should not contain marketing or sales pitches.

OWASP encourages and prioritizes submissions around the three focus areas of AppSec USA 2015:

Web Application Security – Research and new work impacting the security of web applications.
DevOps – Research and new work impacting the security of DevOps processes, architectures, and tools.
Cloud Security – Research and new work impacting the security of applications designed for and/or deployed to cloud environments, especially public cloud environments.

In addition to these three focus areas, OWASP is interested in all topics related to information security, in particular:

  • Privacy
  • Secure development
  • Security assessment (Application/Code review, penetration testing, etc)
  • Mobile security
  • Browser security
  • HTML5 security
  • OWASP tools or projects in practice
  • Management topics in Security
  • New technologies, paradigms, tools


By your submission you agree to the OWASP Speaker Agreement. It requires that you use an OWASP presentation template, or other non-branded template. Presentations may not use company themed decks or include a company logo except on the speaker bio slide. Failure to observe these requirements will result in talk removal.

All presentation slides will be published on the conference website. Pictures and other materials in presentations should not violate any copyrights. Presentation submitters are solely liable for copyright violations. You may choose any Creative Commons license for your slides, including CC0. OWASP suggests the use of open licenses.

Unfortunately we cannot cover travel expenses or costs for accommodations.


  • Round 1 Submission of proposal closes: March 14, 2015 – 11:59pm Pacific
  • Round 1 Notification of acceptance: April 15 – May 15, 2015
  • Round 2 Submission of proposal closes: August 7, 2015 – 11:59pm Pacific
  • Round 2 Notification of acceptance: August 17 to September 1, 2015
  • Conference Date: September 22-25, 2015


To submit a proposal, please submit an abstract of your intended presentation (500 to 4000 characters), a brief biography (150 to 800 characters), a headshot, and a signed copy of the speaker agreement. Talks without all required information may not be considered. Your planned presentation time is 40 minutes (excl. ~5 minutes for discussion and change of speaker). Feel free to attach a preliminary version of your presentation if available. Any proposal submitted is subject to a democratic vote by the program committee. Keep in mind: The better your description of the talk, the better picture the program committee will have to review your submission. Please proof-read your submission; after approval your abstract, biography, and headshot will be published verbatim into the program and website.

If you submitted for Round 1 please don’t resubmit. Thank you and good luck!