A new gathering aimed squarely at the technical heart of modern cybersecurity research is taking shape as CrowdStrike opens submissions for the inaugural Day Zero Threat Research Summit. The invitation-only event will run August 30 through September 1, 2026 at the Mandalay Bay Resort and Casino in Las Vegas, forming part of the broader Fal.Con 2026 cybersecurity conference. The idea behind the summit is fairly direct: bring together some of the most technically skilled threat researchers and intelligence practitioners in the world and give them a focused stage to share research on how adversaries actually operate today.
The event is structured around original, previously unpublished research, with submissions invited from analysts studying everything from emerging attack techniques to deep technical exploitation work. Researchers are encouraged to present findings on topics such as AI-enabled attack methods, model abuse, malware reverse engineering, vulnerability discovery, detection engineering, and cross-domain intrusion strategies that span endpoint, cloud, SaaS, and AI infrastructure. The emphasis isn’t marketing or product talk — it’s technical depth, the kind that typically circulates privately among small research teams or intelligence units before gradually reaching the wider industry.
The summit’s focus reflects how the threat landscape itself has changed over the past few years. Modern adversaries increasingly operate across multiple environments at once, blending credential compromise, cloud exploitation, supply-chain manipulation, and automated tooling into campaigns that unfold far faster than earlier intrusion models. In many cases, attackers weaponize newly disclosed vulnerabilities within hours rather than weeks. At the same time, AI systems are becoming both tools for attackers and targets themselves, expanding the range of systems researchers must analyze.
According to CrowdStrike’s counter-adversary operations leadership, the goal of the Day Zero summit is to accelerate the cycle of discovery and defense by sharing research earlier within a trusted peer community. When researchers reveal new techniques, exploits, or detection strategies before they become widespread, defenders gain time — sometimes the most valuable resource in cybersecurity. Faster knowledge transfer allows security teams to build detections, patch vulnerabilities, and adjust monitoring strategies before adversaries can operationalize techniques at scale.
Submissions to the summit will be evaluated primarily on technical depth, originality, and direct relevance to current adversary behavior. Research that sheds light on how attackers actually build and execute campaigns — including campaign analysis, identity-based compromise techniques, malware development practices, or detection-engineering methodologies — is particularly encouraged. In effect, the summit aims to function as a high-signal forum for adversary tradecraft analysis, one that prioritizes practical insight over theoretical discussion.
Positioned alongside Fal.Con, CrowdStrike’s flagship cybersecurity conference, Day Zero is intended to become a dedicated research layer within the broader industry gathering. If successful, it could evolve into a kind of annual meeting point for elite threat researchers — the people who spend their days dissecting malware samples, mapping intrusion sets, and studying the tactics adversaries use to navigate modern infrastructure.
For the cybersecurity community, the launch of Day Zero reflects a broader recognition that the pace of adversary innovation has accelerated dramatically. The defenders’ advantage increasingly depends on collaboration, early disclosure within trusted circles, and rapid translation of research into detection and defense mechanisms. A forum built specifically around those principles may end up becoming one of the more technically influential events on the cybersecurity calendar.
Leave a Reply