Call for Speakers Now Open for Tech Tactics in Education: Roadmap to AI Impact

The virtual conference from the producers of Campus Technology and THE Journal will return on May 13, 2025, with a focus on emerging trends in with a focus on emerging trends in AI, cybersecurity, data, and ed tech.

The call for speakers is now open for Tech Tactics in Education May 2026, a fully virtual event developed by the producers of Campus Technology and THE Journal. Taking place on May 13, 2026, the conference will focus on building a "Roadmap to AI Impact," offering hands-on learning, practical tips, and strategic discussions on AI, cybersecurity, data, ed tech, and other key technology trends across K–12 and higher education.

Prospective speakers are invited to submit proposals for a variety of in-depth and interactive sessions, including panel discussions, hands-on tutorials, and campus/expert perspectives. Sessions should address current and emerging technology trends impacting education institutions and provide models for implementation, best practices, and strategies for effective technology leadership. Of particular interest are presenters who can provide hands-on exercises or concrete takeaways that attendees can utilize to fine-tune IT practices at their home institutions. Proposals are due Feb. 6, 2026.

The conference program will feature concurrent sessions in three tracks:

AI Across the Institution
From the classroom to the Administration building and everywhere in between, there's not one aspect of education that is untouched by advances in artificial intelligence. How can schools make the most of AI across teaching and learning, IT, operations, and other key areas? For this track, we're looking for practical applications of AI to advance the institutional mission, expert advice on AI risks, trends to watch, and guidelines for responsible implementation.

Potential topics include: AI in ed tech, generative AI's impact on learning, agentic AI, evaluating AI tools, AI skills/training, AI policy, AI risk management, responsible AI, workflow automation

Cybersecurity in an AI-Powered World
Education institutions of all levels are attractive targets for ransomware, malware, phishing, and other types of security breaches, and emerging technologies such as AI are bringing new capabilities to both attacks and defenses. For this track, we’re presenting information that IT leaders can use to help defend their institutions or help them recover after the worst comes to pass — with a particular focus on how AI is impacting cybersecurity strategy. We’re looking for best practices, case studies, lessons learned, tips and tutorials to avoid or recover from disaster, trends and predictions in the area of data/network security.

Potential topics include: incident response planning, threat detection, ransomware, network/data security, student and staff privacy, security operations, strategic cybersecurity planning, IT security leadership, IT security funding/budgeting, identity management, zero trust, cloud security, phishing, cybersecurity awareness, cyber liability insurance, securing remote work/learning environments, risk management, disaster recovery, training staff

Developing Data-Informed Strategies to Enhance Student Success
Education institutions of all levels are attractive targets for ransomware, malware, phishing, and other types of security breaches, and emerging technologies such as AI are bringing new capabilities to both attacks and defenses. For this track, we’re presenting information that IT leaders can use to help defend their institutions or help them recover after the worst comes to pass — with a particular focus on how AI is impacting cybersecurity strategy. We’re looking for best practices, case studies, lessons learned, tips and tutorials to avoid or recover from disaster, trends and predictions in the area of data/network security.

Potential topics include: incident response planning, threat detection, ransomware, network/data security, student and staff privacy, security operations, strategic cybersecurity planning, IT security leadership, IT security funding/budgeting, identity management, zero trust, cloud security, phishing, cybersecurity awareness, cyber liability insurance, securing remote work/learning environments, risk management, disaster recovery, training staff

Presentation types include:

Panel Discussion
Panel discussions feature a moderator and at least two panelists speaking conversationally about an important topic or issue in the education community. Panelists must be secured before submitting a proposal. 

Hands-on Tutorial
Tutorial sessions provide a hands-on workshop led by an education practitioner where attendees can engage in brainstorming, problem-solving exercises, small group exercises, and other activities that directly relate to their institution’s technology needs.

Campus/Expert Perspective
In Campus/Expert Perspective sessions, an individual or team presents first-hand experience with a technology project or expertise on a particular topic.

Presenters should be higher education and K-12 IT leaders and practitioners, independent consultants, association or nonprofit organization leaders, and others in the field of technology in education. Industry experts will be considered for non-promotional presentations only. Submissions will be evaluated for relevance to the education field, clarity of title and abstract, usefulness to attendees, and coverage of current issues and trends. Speakers chosen to present at the May 2026 Tech Tactics in Education conference will receive free event registration.

Visit the full call for speakers and submit your proposal here. For more information, visit techtacticsineducation.com.

Featured

  • stacks of science worksheets with scientific icons

    Kognity Intros Blended Learning Resources for Science Instruction

    Science education platform Kognity has launched a suite of blended learning resources for its four science courses: Biology, Chemistry, Physics, and Earth & Space Science.

  • a cloud, an AI chip, and a padlock interconnected by circuit-like lines

    CrowdStrike Report: Attackers Increasingly Targeting Cloud, AI Systems

    According to the 2025 Threat Hunting Report from CrowdStrike, adversaries are not just using AI to supercharge attacks — they are actively targeting the AI systems organizations deploy in production. Combined with a surge in cloud exploitation, this shift marks a significant change in the threat landscape for enterprises.

  • open laptop with data streams

    OpenAI Launches AI-Powered Web Browser

    OpenAI has unveiled ChatGPT Atlas, a standalone browser that places ChatGPT at the heart of everyday web activity. This release represents a major expansion of the company's efforts to reshape how users search, browse, and complete tasks online.

  • Person typing on laptop with education and learning icons floating around the screen

    StudyFetch Launches Free AI-Powered Literacy Platform

    Education platform StudyFetch has introduced StudyFetch Read, a free AI-powered literacy tool designed to provide personalized reading instruction for students.