International Conference on Cybersecurity Automation and Software Testing - (I2CAST-26)
14th - 15th July, 2026 | Andorra la vella, Andorra
14th June, 2026
24th June, 2026
29th June, 2026
14th - 15th July, 2026
This conference contributes to global sustainability by aligning its research discussions and academic sessions with key United Nations Sustainable Development Goals. It fosters knowledge exchange, innovation, and collaborative engagement.
SDG 4 — Quality Education
SDG 8 — Decent Work and Economic Growth
SDG 9 — Industry, Innovation and Infrastructure
SDG 16 — Peace, Justice and Strong Institutions
This track explores the latest innovations in automating cybersecurity processes to enhance threat detection and response. Papers should focus on methodologies, tools, and frameworks that improve the efficiency of cybersecurity operations.
This session delves into the application of artificial intelligence techniques in software testing practices. Contributions should highlight how AI can optimize test case generation, execution, and defect prediction.
This track addresses the critical aspects of risk management within IT systems, emphasizing strategies for identifying, assessing, and mitigating risks. Submissions should present frameworks or case studies that demonstrate effective risk management practices.
This session focuses on methodologies and best practices for integrating security into the software engineering lifecycle. Papers should discuss approaches to secure coding, design principles, and the role of security in agile development.
This track examines the intersection of compliance requirements and cybersecurity governance. Contributions should analyze frameworks and policies that ensure organizational adherence to legal and regulatory standards.
This session investigates the latest advancements in encryption technologies and their practical applications in securing data. Papers should explore both theoretical and practical aspects of encryption in various contexts.
This track focuses on methodologies for effective threat detection and vulnerability assessment in software systems. Submissions should provide insights into novel techniques and tools that enhance the identification of security weaknesses.
This session addresses the development and implementation of incident response strategies to mitigate cybersecurity threats. Papers should present case studies or frameworks that illustrate effective incident management practices.
This track explores the unique security challenges posed by cloud computing environments. Contributions should discuss risk management strategies, compliance issues, and innovative solutions for securing cloud-based applications.
This session examines the role of system architecture in developing secure IT solutions. Papers should focus on architectural patterns and design principles that enhance the security posture of software systems.
This track highlights emerging trends and technologies at the intersection of cybersecurity and software engineering. Submissions should provide forward-looking perspectives on how these fields are evolving and their implications for future practices.