Schedule
Please find details for all talks here.
Two Days of Trainings (14./15. November)
Workshop 1 | Workshop 2 | Workshop 3 | Workshop 4 | Workshop 5 | Workshop 6 | Workshop 7 | Workshop A | Workshop B |
---|---|---|---|---|---|---|---|---|
Network Threat Hunting & Incident Response Michael Meixner, Rainer Sykora CISSP (Computerforensic & more GmbH) |
Mobile Security Testing Guide Hands-On Sven Schleier (Crayon) |
Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access Dawid Czagan (Silesia Security Lab) |
Web Hacking Expert: Full-Stack Exploitation Mastery [Video Training, Lifetime Access] Dawid Czagan (Silesia Security Lab) |
Black Belt Pentesting / Bug Hunting Millionaire (100% Hands-On, Live Online Training, 24-25 October) Dawid Czagan (Silesia Security Lab) |
Security Intelligence: Practical Social Engineering & Open-source Intelligence for Security Teams Christina Lekati (Cyber Risk GmbH) |
Terraform: Infrastructure as Remote Code Execution (closed) Michael McCabe (Cloud Security Partners) |
T.B.A. |
T.B.A. |
All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.
Two Days of Conference (16./17. November)
Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.
Conference, day 1 - Thu, 16 Nov
Track 2 (Strassburg) | Track 1 (Paris) | Tech Track / Workshops | |
---|---|---|---|
08:00 | Registration opens | ||
09:00 | T.B.A. |
||
09:10 | Putin's Shadow War Maria Georgieva (-) |
||
10:00 | Introducing CS2BR - Teaching Badgers New Tricks Moritz Thomas & Patrick Eisenschmidt (NVISO) |
Oil - But at What Cost: Azerbaijan and the EU’s Murky Partnership Pavle Bozalo (Valencia Risk) |
T.B.A. |
10:50 | Coffee Break | ||
11:10 | Post-quantum digital signatures using Verkle tree and AI in post-quantum cryptography Maksim Iavich (Scientific Cyber Security Association (SCSA), Caucasus University) |
How Paris Hilton's Cell Phone was Hacked, and Why It Still Matters Scott Shapiro (Yale Law School) |
Tabletop Exercise/War Games Julian B. & Aron Feuer (Valencia Risk) |
12:00 | Detection and Blocking with BPF via YAML Kev Sheldrake (Isovalent. Also University of Sussex Psychology Dept (masters/PhD student)) |
SAP as a Cyber Weapon Andreas Wiegenstein (SERPENTEQ GmbH) |
Table Top Exercise/War Games Julian B. & Aron Feuer (Valencia Risk) |
12:50 | Lunch | ||
14:00 | Thunderstorm: Turning Off the Lights in your Data Center Joel Gámez Molina (Security Consultant at Deloitte Touche Tohmatsu) |
Let's Prepare for the Unexpected Erlend Andreas Gjære (Secure Practice) |
Up Close & Personnel Chris Carlis (Dolos Group) |
14:50 | Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones Moritz Abrell (SySS GmbH) |
Unveiling the Cyber Battlefield: Geopolitics, Espionage, and Cybersecurity Chris Kubecka (Hypasec) |
Building C2 Servers for Fun and Profit Sergei Simonovi (Researcher and lecture at Caucasus University, senior penetration tester at SCSA.) |
15:40 | Coffee Break | ||
16:00 | WEFF : p2p Communication without Third Party Nikolaos Tsapakis (N/A) |
Are we Training our Enemies? Facing Cybersecurity Education Challenges in a World of Globalized Thre Prof. Matthieu J. Guitton, PhD, FRAI (Université Laval (Quebec City, QC, Canada)) |
Let's Prepare for the Unexpected (Session) Erlend Andreas Gjære (Secure Practice) |
16:50 | The Attackers Guide to Exploiting Secrets in the Universe Mackenzie Jackson (GitGuardian) |
RansomAWARE in 2023 Steph Shample (DarkOWL) |
Let's Prepare for the Unexpected (Session) Erlend Andreas Gjære (Secure Practice) |
17:40 | !CVE: A New Platform for Unacknowledged Cybersecurity !Vulnerabilities Hector Marco & Samuel Arevalo (Cyber Intelligence S.L.) |
Techniques for Analyzing URLs for Maliciousness at Scale Josh Pyorre (Cisco (Talos)) |
HackBack - An Incident Reponse Role Playing Game (starts at 1900!) Klaus Agnoletti (T.B.A.) |
20:00 | Speaker's Dinner |