International Applied Cybersecurity Conference – 2025

Ohrid, North Macedonia

11-14 October 2025

Organized by the CyberMACS Erasmus-Mundus Masters Programme.

0 Days
0 Hours
0 Minutes
0 Seconds
I-ACSC 2025

Uniting Global Experts for Innovation and Education

As you read these lines, tens of thousands of cyber incidences are taking place worldwide.

International Applied Cybersecurity Conference (IACyC) aims to bring together cybersecurity experts, industry leaders, and IT professionals from around Europe, the Middle East, and Asia. The conference is organized mainly by the Erasmus+ MUNDUS Joint Master’s Degree Project partners whose aim through their international projects is to attract students around the world and to educate in cybersecurity fields within a master program. Our vision is to create a platform to exchange ideas, share best practices, and explore innovative approaches to cybersecurity. Especially to share newly created knowledge by these Erasmus MUNDUS students, alumni, and academic and industrial partners with the interested parties.

The conference will feature a diverse program, including special sessions, workshops, tutorials, keynote speeches, panel discussions, and oral presentations. All submissions will be reviewed by a minimum of three members of the Technical Committee members. Papers on all topics of cybersecurity are welcome.

Workshop running headline: International Workshop on Cybersecurity, Artificial Intelligence, Research Methods, Ethics (CAIRE)

The workshop will be held in conjunction with International Applied Cybersecurity Conference (IACyC) 2025 We invite scholars, practitioners, and students to participate in the CRAIE 2025 International Workshop, an interdisciplinary forum that explores the evolving intersection of Cybersecurity, Research Methods, Artificial Intelligence, and Ethics. As emerging ans smart technologies transform how we secure digital environments and make data-driven decisions, it is critical to examine not only what aspect (we build), but also how and why aspects. This workshop provides a platform to share insights, methodologies, case studies, and critical reflections that address the complex challenges at the nexus of AI, Ethics and Research Methods in the context of Cybersecurity Research and Innovation. We welcome: • Research papers • Case studies • Positioning papers • Tool demos This workshop invites researchers and practitioners to explore the latest advances in Cybersecurity, Research Methods, Artifical Intelligence, Ethics. One can consider the following topics, but not limited to: • Mixed methods for cybersecurity • xAI for cybersecurity and ethics • Cybersecurity and ethics: regulations, standards • Responsible research methodologies in sensitive digital domains • AI governance, bias, and trustworthiness • Cyber threats, defense strategies, and data integrity • Ethics of AI for cybersecurity • Cybersecurity and Ethics for smart systems • Open source intelligence and cybersecurity and ethics • AI-based cybersecurity applications • Methodological issues for cybersecurity • Qualitative research in cybersecurity research • Cybersecurity behavioral research • Real-world research in cybersecurity • Cybersecurity data science and ethics • Systematic mapping of literature on AI for cybersecurity Workshop Chair: Assoc.Prof. Mehmet N. Aydin, Kadir Has University, MIS Dept

Workshops: Using and Abusing JSON Web Tokens: The road to authentication bypass by Bozidar Spirovski and Wekoslav Stefanovski

Abstract: JSON Web Tokens are everywhere - you are using a bunch of them right now when you log in to almost anything on the Internet. It’s such a common technology, yet, it’s very easy to get them wrong. In this workshop, we get to the nitty gritty of JWT’s - what they are, how they work, and how to make sure that we haven’t made an app that's just waiting to be hacked. The workshop’s goal is to make developers and security teams aware of the pitfalls accompanying JWT’s by delving deep into some scenarios of real cases where JWT’s were used improperly making them susceptible to hacking. In our experience, improper implementation of JWTs is extremely commonplace since JWT’s are often associated with magical thinking, i.e. “I’m using JWT’s so I’m secure”. JWT’s are a powerful tool, and like all powerful tools it should be used carefully, with full understanding of what it does and how to be safe while using it. This will be a hands-on workshop, where people will be able to literally hack and abuse various 'mishaps' in implementing JWTs in authentication and authorization. And we will try to remedy some of these errors live, with the audience. The examples will be in Python and JavaScript.

Industry-Academia Collaboration

Foster meaningful connections between academia and industry to drive impactful research and innovative cybersecurity solutions.

Global Knowledge Exchange

Engage with a diverse community of professionals, students, and experts to exchange ideas and broaden perspectives in the ever-evolving field of cybersecurity.

Register and Join the Future of Cybersecurity

Join industry leaders, academics, and innovators at the International Applied Cybersecurity Conference (IACyC). Gain insights into the latest trends, connect with global experts, and contribute to the cybersecurity solutions of tomorrow. Don’t miss this opportunity to be part of the conversation shaping the digital future.

Conference Fee Structure

Student Fee

CyberMACS students: Free of charge
Other students: 100 euro

Regular Fee

250 euro

WORKSHOP AND TUTORIALS

WORKSHOP: 50 Euro
TUTORIALS 100 Euro /each
Contact

Get in Touch for More Information

Location

The conference will be organized by the CyberMACS Master Programme supported by Erasmus Mundus Joint/double Master’s Degree (EMJM). The conference venue is METROPOL LAKE RESORT, Ohrid in North Macedonia.

Contact info

Mail : [email protected]