Conferences

9:30 am

Welcome Speech

With Winn SCHWARTAU
15 min
9:45 am

Dig deeper into OWASP Kubernetes

With Daniel Simionato, Miguel Hernández
During the talk, we want to make a walkthrough of the OWASP Kubernetes project, which is growing due to the ever increasing adoption of Kubernetes...
45 min
10:30 am
11:00 am

The Power of Simple Cyber: You have the Cyber Mojo. But do you have the Power of Simple Cyber?

With Sylvan Ravinet
As the cybersecurity challenges intensify each year, the call for cyber experts echoes louder. Reports from ISC2 repeatedly indicate a widening demand for professionals who...
45 min
11:45 am

How to have visibility and security OF CICD ecosystem

With Pramod Rana
Today CICD platforms are an integral and critical part of the overall software supply chain. To support the business requirements, it processes a lot of...
45 min
12:30 pm
2:00 pm

A Deep Dive into Browser Security: Uncovering Security Bugs in Mobile Browsers

With Rafay Baloch
Modern browsers have implemented various security features such as sandboxing, code integrity checks, memory safety checks, introduction of memory safe languages so on and so...
45 min
2:45 pm

From On-Premises to Cloud: A Comprehensive Analysis of SAP Security Issues

With Arpine Maghakyan, Vahagn Vardanian
The SAP landscape is complex and highly customized, with numerous systems such as SAP HANA, SAP Solman, SAP Cloud Connector, and SAP ME. Many companies...
45 min
3:30 pm
4:00 pm

The Modern CISO and the Culture Map: Challenges of Building a Strong Cybersecurity Culture in Global Organizations

With George Dobrea
The Culture Map is a popular theory providing practical guide for navigating cultural complexity while conducting global business. The CISO’s who can adapt their leadership...
45 min
4:45 pm

Hey You! Get Off my Satellite!

With Paul Coggin
There are many components and systems that may be targeted in a space system by adversaries including ground station systems and satellites. In this presentation...
45 min
5:30 pm

Save The Environment (Variable): Hijacking Legitimate Applications with a Minimal Footprint

With Wietze Beukema
DLL Hijacking, being a well-known technique for executing malicious payloads via trusted executables, has been scrutinised extensively, to the point where defensive measures are in...
45 min
6:15 pm

Closing Day 1

With Winn SCHWARTAU
15 min
8:55 am

Introduction Day 2

With Winn SCHWARTAU
5 min
9:00 am

LATMA – Lateral movement analyzer

With Gal Sadeh
Lateral movement has become a staple component used in most wide-scale cyber-attacks on organizations. However, the set of tools for detecting, analyzing, and investigating this...
45 min
9:45 am

Adventures in the Underland: Uncommon Hacker’s Persistence Methods and Countermeasures

With Paula Januszkiewicz
Persistence is one of the main aspects that hackers pay special attention to during the malware development and during the attack phase. The goal is...
45 min
10:30 am
11:00am

Hacking Serverless Applications: A Treasure Map for Uncharted Waters

With Tal Melamed
Serverless technology eliminates the need for development teams to provision servers, and it also results in some security threats being passed to the cloud provider....
45 min
11:45 am

A Tale of Credential Leak of a Popular Cloud Threat Actor

With Nitesh Surana
Containers are something that developers live and breathe by, as it aids them in escaping dependency hell, optimizing their workflows, and increasing their productivity. But...
45 min
12:30 pm
2:00 pm

Microsoft Defender for Office 365 Evasion – The Story of Confirmed Vulnerability

With Sergey Chubarov
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools. Safe Attachments routes all messages...
45 min
2:45 pm

Stake at the heart : Destroying common security wisdom

With Ayoub El Aassal
I believe that that the dissonance between what we see in the hacking field and enterprise security is the result of misplaced focus and bad...
3:30 pm
4:00 pm

A journey into Medical Device Security Research

With Deral Heiland
Just coming out of a global pandemic has made most of us acutely aware of the importance of the medical community and the technologies that...
45 min
4:45 pm

Closing Speech

With Winn SCHWARTAU
15 min