International Applied Cybersecurity Conference – 2025
Ohrid, North Macedonia
11-14 October 2025
Organized by the CyberMACS Erasmus-Mundus Masters Programme.
I-ACSC 2025
Uniting Global Experts for Innovation and Education
As you read these lines, tens of thousands of cyber incidences are taking place worldwide.
International Applied Cybersecurity Conference (IACyC) aims to bring together cybersecurity experts, industry leaders, and IT professionals from around Europe, the Middle East, and Asia. The conference is organized mainly by the Erasmus+ MUNDUS Joint Master’s Degree Project partners whose aim through their international projects is to attract students around the world and to educate in cybersecurity fields within a master program. Our vision is to create a platform to exchange ideas, share best practices, and explore innovative approaches to cybersecurity. Especially to share newly created knowledge by these Erasmus MUNDUS students, alumni, and academic and industrial partners with the interested parties.
The conference will feature a diverse program, including special sessions, workshops, tutorials, keynote speeches, panel discussions, and oral presentations. All submissions will be reviewed by a minimum of three members of the Technical Committee members. Papers on all topics of cybersecurity are welcome.
Workshop running headline: International Workshop on Cybersecurity, Artificial Intelligence, Research Methods, Ethics (CAIRE)
The workshop will be held in conjunction with International Applied Cybersecurity Conference (IACyC) 2025 We invite scholars, practitioners, and students to participate in the CRAIE 2025 International Workshop, an interdisciplinary forum that explores the evolving intersection of Cybersecurity, Research Methods, Artificial Intelligence, and Ethics. As emerging ans smart technologies transform how we secure digital environments and make data-driven decisions, it is critical to examine not only what aspect (we build), but also how and why aspects. This workshop provides a platform to share insights, methodologies, case studies, and critical reflections that address the complex challenges at the nexus of AI, Ethics and Research Methods in the context of Cybersecurity Research and Innovation. We welcome: • Research papers • Case studies • Positioning papers • Tool demos This workshop invites researchers and practitioners to explore the latest advances in Cybersecurity, Research Methods, Artifical Intelligence, Ethics. One can consider the following topics, but not limited to: • Mixed methods for cybersecurity • xAI for cybersecurity and ethics • Cybersecurity and ethics: regulations, standards • Responsible research methodologies in sensitive digital domains • AI governance, bias, and trustworthiness • Cyber threats, defense strategies, and data integrity • Ethics of AI for cybersecurity • Cybersecurity and Ethics for smart systems • Open source intelligence and cybersecurity and ethics • AI-based cybersecurity applications • Methodological issues for cybersecurity • Qualitative research in cybersecurity research • Cybersecurity behavioral research • Real-world research in cybersecurity • Cybersecurity data science and ethics • Systematic mapping of literature on AI for cybersecurity Workshop Chair: Assoc.Prof. Mehmet N. Aydin, Kadir Has University, MIS Dept
Workshops: Using and Abusing JSON Web Tokens: The road to authentication bypass by Bozidar Spirovski and Wekoslav Stefanovski
Abstract: JSON Web Tokens are everywhere - you are using a bunch of them right now when you log in to almost anything on the Internet. It’s such a common technology, yet, it’s very easy to get them wrong. In this workshop, we get to the nitty gritty of JWT’s - what they are, how they work, and how to make sure that we haven’t made an app that's just waiting to be hacked. The workshop’s goal is to make developers and security teams aware of the pitfalls accompanying JWT’s by delving deep into some scenarios of real cases where JWT’s were used improperly making them susceptible to hacking. In our experience, improper implementation of JWTs is extremely commonplace since JWT’s are often associated with magical thinking, i.e. “I’m using JWT’s so I’m secure”. JWT’s are a powerful tool, and like all powerful tools it should be used carefully, with full understanding of what it does and how to be safe while using it. This will be a hands-on workshop, where people will be able to literally hack and abuse various 'mishaps' in implementing JWTs in authentication and authorization. And we will try to remedy some of these errors live, with the audience. The examples will be in Python and JavaScript.
Industry-Academia Collaboration
Foster meaningful connections between academia and industry to drive impactful research and innovative cybersecurity solutions.
Global Knowledge Exchange
Engage with a diverse community of professionals, students, and experts to exchange ideas and broaden perspectives in the ever-evolving field of cybersecurity.
Register and Join the Future of Cybersecurity
Join industry leaders, academics, and innovators at the International Applied Cybersecurity Conference (IACyC). Gain insights into the latest trends, connect with global experts, and contribute to the cybersecurity solutions of tomorrow. Don’t miss this opportunity to be part of the conversation shaping the digital future.
Conference Fee Structure
Student Fee
Other students: 100 euro
- Access to all keynote speeches and main conference sessions
- Networking opportunities with industry professionals and academics
- Certificate of participation
Regular Fee
- Access to all keynote speeches, main conference sessions, and panel discussions
- Networking opportunities with professionals and researchers
- Certificate of participation
WORKSHOP AND TUTORIALS
TUTORIALS 100 Euro /each
- Access to keynote speeches and main conference sessions
- Opportunity to attend on workshops and tutorials
- Certificate of attendance
Contact
Get in Touch for More Information
Location
The conference will be organized by the CyberMACS Master Programme supported by Erasmus Mundus Joint/double Master’s Degree (EMJM). The conference venue is METROPOL LAKE RESORT, Ohrid in North Macedonia.
Contact info
Mail : [email protected]
