International Conference on Cybersecurity Automation and Software Testing - (I2CAST-26)


14th - 15th July, 2026 | Andorra la vella, Andorra

Multi-format (In-person/Virtual)

Important Dates

Pre-registration Deadline

14th June, 2026

Paper Submission Deadline

24th June, 2026

Last Date Of Registration

29th June, 2026

Date Of Conference

14th - 15th July, 2026

Downloads

Conference Session Tracks

SDG Wheel

Aligned with

UN Sustainable Development Goals

This conference contributes to global sustainability by aligning its research discussions and academic sessions with key United Nations Sustainable Development Goals. It fosters knowledge exchange, innovation, and collaborative engagement.

SDG 4 SDG 4 — Quality Education
SDG 8 SDG 8 — Decent Work and Economic Growth
SDG 9 SDG 9 — Industry, Innovation and Infrastructure
SDG 16 SDG 16 — Peace, Justice and Strong Institutions
Explore

All Session Tracks

Track 01
Advancements in Cybersecurity Automation

This track explores the latest innovations in automating cybersecurity processes to enhance threat detection and response. Papers should focus on methodologies, tools, and frameworks that improve the efficiency of cybersecurity operations.

Track 02
Artificial Intelligence in Software Testing

This session delves into the application of artificial intelligence techniques in software testing practices. Contributions should highlight how AI can optimize test case generation, execution, and defect prediction.

Track 03
Risk Management in IT Systems

This track addresses the critical aspects of risk management within IT systems, emphasizing strategies for identifying, assessing, and mitigating risks. Submissions should present frameworks or case studies that demonstrate effective risk management practices.

Track 04
Secure Software Engineering Practices

This session focuses on methodologies and best practices for integrating security into the software engineering lifecycle. Papers should discuss approaches to secure coding, design principles, and the role of security in agile development.

Track 05
Compliance and Governance in Cybersecurity

This track examines the intersection of compliance requirements and cybersecurity governance. Contributions should analyze frameworks and policies that ensure organizational adherence to legal and regulatory standards.

Track 06
Encryption Technologies and Their Applications

This session investigates the latest advancements in encryption technologies and their practical applications in securing data. Papers should explore both theoretical and practical aspects of encryption in various contexts.

Track 07
Threat Detection and Vulnerability Assessment

This track focuses on methodologies for effective threat detection and vulnerability assessment in software systems. Submissions should provide insights into novel techniques and tools that enhance the identification of security weaknesses.

Track 08
Incident Response Strategies in Cybersecurity

This session addresses the development and implementation of incident response strategies to mitigate cybersecurity threats. Papers should present case studies or frameworks that illustrate effective incident management practices.

Track 09
Cloud Computing Security Challenges

This track explores the unique security challenges posed by cloud computing environments. Contributions should discuss risk management strategies, compliance issues, and innovative solutions for securing cloud-based applications.

Track 10
System Architecture for Secure IT Solutions

This session examines the role of system architecture in developing secure IT solutions. Papers should focus on architectural patterns and design principles that enhance the security posture of software systems.

Track 11
Emerging Trends in Cybersecurity and Software Engineering

This track highlights emerging trends and technologies at the intersection of cybersecurity and software engineering. Submissions should provide forward-looking perspectives on how these fields are evolving and their implications for future practices.

Empowering Research Continuity

At Research Leagues, academic engagement continues without interruption despite the current global situation. Researchers can present and publish through online and integrated participation pathways.