Call for Proposals

CYBER.ORG Presents EdCon 2025

Call for Proposals

Are you a K-12 educator or employed at a non-profit supporting cybersecurity education? Are you passionate about sharing your knowledge? CYBER.ORG is now accepting proposals for EdCon 25 conference sessions, June 16-18!

Please carefully read all details below.

 

Main Content
WYSIWYG

Thank you for your interest in submitting a session for CYBER.ORG EdCon 25! Please review the following before submitting a proposal. To be eligible you must be one of the following:

  1. K-12 educator
  2. Representative of a non-profit organization or a government agency
  3. Cybersecurity or computer science instructor at a college or university

 

Submission Rules

  1. An individual may not be listed on more than two (2) EdCon 25 conference sessions.
  2. The primary presenter will be the contact person and responsible for notifying all co-presenters of acceptance, rejection, scheduling, and any other information provided by CYBER.ORG. The primary presenter's email address will be the main form of communication.
  3. Presenters must identify with one of the following three (3) specific categories related to relevant education and/or training.
    • Category 1: The presenter must hold a bachelor's degree in education or be currently employed as a K-12 educator.
    • Category 2: The presenter must be employed in a cybersecurity or cybersecurity related field. This includes promoting cybersecurity to K-12 students in any capacity.
    • Category 3: The presenter must hold at least a master’s level degree and be employed at a college or university specializing in education or cybersecurity.
  4. Presenters may not submit proposals that are promotional in nature of a product or service that is for sale. Presenters who wish to sell products or services must purchase exhibit space. Presentations can include no-cost resources for K-12 educators.
  5. Once a proposal has been accepted, the main presenter of record must attend and present the session.
  6. Presenters must be able to attend CYBER.ORG EdCon 25 and be available to present any day/time during the conference.
  7. Presenters must register for the conference no later than March 15th to be eligible to present.
  8. Presentation material must be original to the presenter or used by permission of the copyright holder, including CYBER.ORG content.
  9. Presenters grant CYBER.ORG the right to share their presentation materials with conference attendees. Presenters must submit their final presentation and any other materials they would like to be shared electronically with attendees to georgette.price@cyber.org by May 15, 2025.
  10. Recording of a live session is prohibited without written consent from CYBER.ORG.
  11. CYBER.ORG reserves the right to edit session title, description, and additional promotional information for style and consistency.

 

Application Overview

Resources presented in your session(s) must be available at no cost to K-12 educators. You must have permission to use the content being presented. If you would like to provide information about materials or content that is for sale, please contact georgette.price@cyber.org for information about exhibit tables. Proposals are due January 15th, 2025.

Presenter Details 

  1. Primary Presenter's First Name
  2. Primary Presenter's Last Name
  3. Primary Presenter's Email Address
  4. Primary Presenter's Mobile Phone
  5. Primary Presenter’s Organization
  6. Primary Presenter’s Organization Type
  7. Primary Presenter’s Title/Job/Role
  8. Additional Presenter's Names

Presentation Types

  1. Breakout Session (50-minutes): This session should have a hands-on component.
  2. Spark Session (20 minutes): This session should focus on a short hands-on activity or interactive presentation meant to inspire new teaching methods.

Presentation Information

  1. Title of Session (12 words or less)
  2. Description of Session (50-word limit)
  3. Please provide a short tagline for your session. (5-word limit)
  4. What prerequisite knowledge and/or skills, if any, do you expect your audience to understand to be able to participate in your session? (i.e. operate Linux, understand programming, know basic concepts of digital citizenship)
  5. What grade band is your presentation geared towards? Pick all that apply.
    • K-2 
    • 3-5 
    • 6-8 
    • 9-12 
  6. Is your presentation plugged? (attendees need a laptop)
  7. How does your topic relate to cybersecurity? (50-word limit)
  8. Does your topic relate to any educational standards? Please list. (50-word limit)
  9. What are the learning objectives for your proposal? (No more than 3)
  10. If you would like to include any additional links to illustrate your proposal, please include them here.
  11. By entering my name, I hereby certify that the information stated above is true, correct, and complete to the best of my knowledge. I also hereby attest that my presentation will follow the Submission Rules and Instructions.

 

How to Submit

  1. Fill out the Microsoft form
  2. All proposals must be completed by January 15, 2025. 
  3. You will receive a confirmation notice from Microsoft upon submission. 

 

Selection Criteria 

The following will be considered when making selections.

  1. The content being presented is readily available at no cost to K-12 educators.
  2. The level of expertise of the presenter. Is the presenter a former or current K-12 cybersecurity educator? Is the presenter a leader in the field of cybersecurity or cybersecurity education?
  3. The quality of the proposal. Is the proposal well written, related to educational standards, have clear learning objectives, and will provide K-12 cybersecurity educators with activities, lessons, or subject matter they can immediately implement into the classroom.
  4. The presentation is dynamic and engaging for K-12 educators.

 

If you have any additional questions, please contact georgette.price@cyber.org.