< CONTINUUM />THREAT 2026: CONTINUUM is the fourth edition of the THREAT Conference Series. It convenes cybersecurity, logistics, policy, and research leaders to address a pressing challenge facing the global economy: the security and continuity of modern supply chains.
< conference_co_chairs />
< conference_editorial_board />
Mauritius
South Africa
South Africa
Mauritius
United States
Mauritius
Mauritius
Malaysia
Mauritius
India
South Africa
South Africa
< conference_venue />
THREAT 2026: CONTINUUM is the fourth edition of the THREAT Conference Series. It convenes cybersecurity, logistics, policy, and research leaders to address a pressing challenge facing the global economy: the security and continuity of modern supply chains. From maritime logistics and air cargo security to digital infrastructure and cross-border data flows, modern supply chains are increasingly reliant on interconnected systems. THREAT 2026 explores the operational, strategic, and regulatory dimensions of supply chain security—including the vulnerabilities of critical infrastructure, the integrity of logistics networks, and the evolving nature of cyber-physical threats. The conference advocates a multi-sectoral approach that brings together industry, government, and academia. By fostering dialogue between cybersecurity professionals, logistics operators, policymakers, and researchers, THREAT 2026 aims to build resilience, strengthen coordination, and promote secure, uninterrupted global trade. THREAT 2026 will equip participants with the knowledge and tools to safeguard supply chain continuity, secure critical nodes, and prepare for the evolving threats that disrupt global commerce. THREAT 2026 thus becomes a pivotal event for reshaping the discourse on supply chain resilience in an increasingly interconnected world.
< call_for_papers />
CONTINUUM: Securing Modern Supply Chains. THREAT 2026 invites concise academic, practitioner, policy, and industry contributions on the cybersecurity challenges facing modern supply chains — from logistics platforms, ports, airports, warehouses, and customs systems to cloud services, identity platforms, and third-party providers.
Academic rigour is welcome. Practitioner insight is essential. Evidence-based contribution is expected.
Peer-reviewed research using the IEEE conference format. Considered for inclusion in the official THREAT 2026 Conference Proceedings (ISBN).
Clear, evidence-informed, reflective contributions from practitioners. Vendor marketing submissions will not be accepted.
Visual contributions presented during the dedicated poster session on Day 3 of the conference.
THREAT does not use standard conference presentation formats. Accepted papers will be grouped into thematic roundtables. Each author will have four minutes to communicate the most important contribution of their paper, followed by facilitated discussion with the panel and audience.
Authors of accepted papers will also be required to provide a tight one-page summary of their paper.
Accepted Research Papers and Professional Insight Papers will be considered for inclusion in the official THREAT 2026 Conference Proceedings, which will carry an ISBN.
Closed-Door Session (By Invitation Only)
For senior government officials, industry executives, logistics operators, and policymakers
Securing the Lifelines of Global Commerce: A Multi-Sectoral Imperative
High-level discussion on economic security, geopolitical risks, and the criticality of supply chain resilience
Cyber-physical threats to ports, logistics hubs, and transport networks
Briefings on current threat actors, attack vectors, and operational disruptions
National and regional critical infrastructure protection policies
Public-private partnership models, regulatory harmonization, and cross-border coordination
Building resilience: investment priorities, capacity building, and technology adoption
Roundtable on joint action, information sharing, and future commitments
Open to All Registered Participants
The Security and Continuity of Modern Supply Chains: From Risk to Resilience
OT/IoT vulnerabilities, maritime and aviation logistics security, integration of IT and OT frameworks
Cloud platforms, APIs, customs systems, data integrity, regulatory compliance (GDPR, POPIA)
AI/ML for security, blockchain for traceability, quantum computing, digital twins, 5G and edge computing
Interactive Sessions and Collaborative Dialogues
• Workshop 1: Incident Response Coordination Across Multi-Party Supply Chains
• Workshop 2: Risk Assessment and Threat Modeling for Logistics Networks
• Workshop 3: Building Business Continuity Plans for Critical Infrastructure
Regional priorities, sector-specific challenges, public-private partnership models, and collaborative security frameworks
Peer-reviewed academic and industry research on supply chain security
Synthesis of conference findings, commitments, and roadmap for future collaboration
Accepted papers will be presented via round-table discussions and dedicated presentation sessions.
< conference_speakers />
< conference_fees />
< conference_contact />