CyberAI — Home
Timeline

Important Dates

Keep track of the main deadlines for CyberAI.

Deadline
Paper Submission

28 Feb 2026

Notification
Acceptance

30 April 2026

Camera-Ready
Final Version

17 May 2026

Event
Conference Dates

25–26 June 2026

Call for Papers
Guidelines & template

The CFP and paper template will be published soon.

Registration
Fees & categories

Registration form and details will be available soon.

Venue & Map
Directions & address

Venue map button will be enabled soon.

Soon

CyberAI

Submission Portal

CMT Portal
Once published, the CMT link will appear here.

Submissions will be available soon!

The official submission link is not available yet. It will be published on this page as soon as possible.

Before submitting
Prepare your PDF, authors info, and keywords.
Policy
Original, unpublished work (per conference rules).
Direct link
Will be available soon
Welcome

Welcome from the Chairs of CyberAI

The first International conference in Cybersecurity and AI • 25–26 June, 2026 • Morocco

Live Welcome
EST-SB
Sidi Bennour, Morocco
25–26 June, 2026
CyberAI Conference
Focus Areas
Privacy • Cybersecurity • Generative AI • Smart Systems
CyberAI Hybrid Conference In-person & Virtual

It is with great pleasure to welcome you to the first International conference in Cybersecurity and AI (CyberAI). The conference will be held from 25 to 26 June, 2026 in Morocco.

CyberAI brings together experts, researchers, engineers, and industry professionals to share the latest advancements in Cybersecurity and Artificial Intelligence.


General Chairs
Youssef BADDI
Chouaib Doukkali University, El Jadida (Morocco)
Mohamed LAHBY
ENS Casablanca, Morocco
Yassine MALEH
ENSA Khouribga, Morocco
Topics

List of Topics

Main themes and tracks covered by CyberAI.

Track 1
Cybersecurity & Privacy Preservation
  • AI-Powered Threat Detection and Prediction
  • Anomaly detection, behavior analysis
  • Real-time monitoring and early warning systems
  • Automated Response and Incident Recovery
  • Machine Learning for Adaptive Defenses (supervised/unsupervised/RL)
  • Continuous learning from attacks
  • Federated Learning for Privacy-Sensitive Domains
  • Auditing & Monitoring AI for Privacy Compliance
  • Blockchain for Cybersecurity & Data Integrity
Track 2
Generative AI
  • GenAI for Threat Detection & Anomaly Analysis
  • Automated Incident Response with LLMs
  • GenAI for Malware Classification
  • Vulnerability Discovery Using Generative Models
  • GANs for Intrusion Detection Systems (IDS)
  • Malware Detection Using GAN-Augmented Models
Track 3
Smart Systems
  • Smart Systems & Emerging Technologies
  • AI & Machine Learning in Smart Systems
  • Edge Computing for Smart Applications
  • Quantum Computing & Smart Systems
  • Smart Cities & IoT Applications
  • Industrial IoT (IIoT) & Smart Manufacturing
  • 5G & IoT for Ultra-fast Connectivity
  • Zero Trust Security Model in Smart Systems
Track 4
Ethics of AI-Driven Cybersecurity
  • Security vs Privacy: An Ethical Balancing Act
  • Ethical Use of Generative AI in Cybersecurity
  • Offense vs Defense: Ethical Boundaries in Cyber Operations
  • Ethical Foundations of Cybersecurity
  • Human Impact of Cybersecurity Decisions
For questions about topics: contact@cyberai-conf.org
Hackathon

CyberAI Hackathon

Build real solutions for Privacy, Cybersecurity & Generative AI.

Teams Prizes Mentors

Innovation Challenge

Join our hackathon during CyberAI to design and prototype innovative solutions. Work with mentors, meet researchers and industry experts, and present your project to the jury.

Theme
Cybersecurity & AI
Format
Teams / Solo
Awards
Best Projects
Tracks

Hackathon Tracks

Choose a challenge and build your solution

Track 1
AI for Threat Detection

Detect attacks and anomalies using ML / GenAI (logs, network traffic, endpoint signals).

ML Detection Analytics
Example: phishing/spam detection, IDS anomaly scoring.
Track 2
Privacy & Data Protection

Build privacy-first apps and secure data pipelines (encryption, access control, compliance).

Privacy Crypto Access
Example: secure authentication, anonymization, data governance.
Track 3
Secure GenAI Apps

Create safe GenAI systems and prevent misuse (prompt safety, RAG security, model monitoring).

Prompts RAG Safety
Example: jailbreak protection, data leakage prevention.
Track 4
Web Development

Build modern web apps (front-end, back-end, APIs) with security & best practices.

Front-end Back-end Secure
Example: secure login, REST APIs, OWASP basics, deployment.
Keynotes

Speakers & Keynotes

Speaker lineup will be announced soon.

Speaker (Soon)
Affiliation
Speaker (Soon)
Affiliation
Speaker (Soon)
Affiliation
Speaker (Soon)
Affiliation
Speaker (Soon)
Affiliation
Speaker (Soon)
Affiliation

Sponsors & Partners

Thank you for supporting CyberAI

Sponsor 1
Sponsor 2
Sponsor 3
Sponsor 4

FAQ

Common questions about submission and attendance

Submit via CMT using the official submission link on the website. Ensure your work is original and unpublished.
Yes. The conference is hybrid: in-person and virtual participation.
Yes. Certificates will be provided according to the conference policy (attendance / presentation).
Resources

Downloads & Assets

Templates and official materials will be published soon.

Paper Template

Official template (PDF/Word) for submissions.

Poster / Banner

Official posters, banners, and visual assets.

Program Schedule

Agenda and sessions will be available soon.

Countdown

Countdown to CyberAI

25–26 June, 2026 • Morocco

0
Days
0
Hours
0
Minutes
0
Seconds

Organized By

Institutions supporting CyberAI

Université Chouaïb Doukkali
Université Chouaïb Doukkali
El Jadida, Morocco
Suleyman Demirel University
Ecole Supérieure de Technologie Sidi Bennour
Sidi Bennour, Morocco

Scroll to Top