Events

  Title Track Speakers
Event small
Analyzing obfuscated JavaScript codes
This presentation is going to focus on obfuscation and obfuscation methods in...
Defense
Event small
Applications Without Constraints – F5 Networks
Applications—along with their users and data—are exposed to enormous risk as...
Event small
asseco vendor showcase
Event small
Cloud Privacy Check and Legal Framework
LEGISLATION -Croatian Legal framework -New EU Legal framework -AZOP...
Strategy
Event small
Consequent System Born - Fintech is Alive!
Strategy
Event small
Critical Infrastructure – Round Table (cro)
Okrugli stol: kritična nacionalna infrastruktura. Moderator: Alen Delić
Strategy
Event small
Daily operations with Hardware Security Modules
Hardware Security Modules are expensive piece of hardware that add new layer...
Defense
Event small
Defending against DDoS attacks - RioRey
RioRey has been defending DDoS attacks for 10 years. During this session you...
Event small
Digital Shadows SearchLight
Digital Shadows provides cyber situational awareness that helps organizations...
Event small
Diverto - Influence of cognitive biases in information security
Event small
Elastic Defence
The challenges that Endpoint Point security solutions have to solve...
Event small
Evaluation of Android Malware Detection Based on System Calls
With Android being the most widespread mobile platform, protecting it against...
Event small
FSec closing ceremony
Event small
FSec opening ceremony
Event small
Guided Fuzzing And Binary Blobs
Even though the notion of guided fuzzing has been around for years,...
Event small
Hosting provider Birds of Feather coffee
Event small
Integracija logičke i fizičke zaštite
Fizička zaštita predstavlja kontrolu fizičkog kretanja i pristupa štićenim...
Control
Event small
Kako izvući dodanu vrijednost iz sigurnosnih rješenja
Zaštita naših korisnika, organizacija svih veličina, nikada nije...
Event small
metronet vendor showcase
Event small
Mobile application security in Croatia and in the region
This presentation will show results of dozens of mobile application...
Defense
Event small
Networking event I
For VIP, supporters, business supporters we have our annual networking event....
Event small
Nifty Tricks for ARM Firmware Reverse Engineering
Offense
Event small
Non-Esoteric XSS Tips & Tricks
Cross-Site Scripting (XSS) is (still) one of the most prevalent security...
Offense
Event small
[Opening Keynote] Emerging Trends in Cyberwarfare
Strategy
Event small
OWASP meetup & Networking event II
For VIP, supporters, business supporters we have our annual networking event....
20160727a fsec logo payments
Payments industry just don’t get Internet
Internet has never been bigger and better. Anyway it is important for...
Control
Event small
reversinglabs vendor showcase
ReversingLabs was formed in 2009 to combat the next generation of intelligent...
Event small
Security in the age of frameworks
A “monsters found” talk about the implications of security measures baked...
Defense
Event small
Security Management
Strategy
Event small
Sigurnost osobnih i drugih osjetljivih podataka u cloudu - pravni pogled
Pitanje zaštite osobnih i drugih osjetljivih podataka u cloudu ("oblak") nije...
Business
Picture1
[Strategy Keynote] Big game cyber-hunting
For several years our team have been revealing sophisticated cyber-attacks in...
Strategy
Pozadina
Surviving the malware apocalypse
This is a true story of the brave individuals who fight malware threats on a...
Strategy
Event small
The State of Information Security in the Republic of Croatia
Predstavnici iz PNUSKOK-a, NCERT-a, ZSIS-a i HNB-a prikazati će pregled...
Strategy
Event small
TLS/SSL transactions and mutual client - server authentication using SSL client certificates: configuration, troubleshooting and monitoring
Complex TLS/SSL protocols for secure encrypted transactions over public...
Defense
Usbarmory coin web
USB armory
Defense
Event small
Using payment HSM in application
We will create demo app in Python that communicates with HSM available...
Defense
Event small
When hacker meets BIG DATA
Even white hat hackers have to deal with Big data these days if they want to...
Offense
Event small
When the digital hair stands up in your neck
a talk how sigint works who does it and what could possible go wrong with it....
Defense
Event small
Why choice of programming language matters
It is inevitable that humans make mistakes. Mistakes in writing software turn...