Events
Title | Track | Speakers | |
---|---|---|---|
Backup-as-a-service with data deduplication technique on the source
Backup process which utilizes source data deduplication techniques improves... |
Control (Lecture) | ||
Breaking password protected PE files
In the world of custom crypters, it is not uncommon to stumble upon custom... |
|||
Common Oops in DevOps
Common mistakes in DevOps |
Defense (Lecture) | ||
Console Hacking
For as long as gaming consoles have been around, hackers have been finding... |
Offense (Lecture) | ||
Cyber Crime u RH
|
Control (Lecture) | ||
Cyber reconnaissance and defense tactics on SME budget
Since Big Boys are failing big ... how on earth could Small & Medium... |
Defense (Lecture) | ||
Cyber Security Leadership and Education in a Rapidly Evolving Cyber Environment
|
Control (Lecture) |
|
|
Demistifying Container Hype
what security pros can gain from this container hype? what should i know... |
Defense (Lecture) | ||
Flashing displays: User-friendly solution for bootstrapping secure associations between multiple constrained wireless devices
Future healthcare systems, smart homes, power management systems and similar... |
Defense (Lecture) | ||
FSec 0x05 Opening
|
|||
(ISC)2 Croatia Chapter
Presentation of the (ISC)2 Croatia Chapter, its activities, membership,... |
Control (Lecture) | ||
Keynote: deRaadt
Keynote - de Raadt |
Control (Lecture) | ||
Keynote: FX
|
Control (Lecture) |
|
|
LibreSSL
|
|||
Living with PCI
Lecture will cover reality of living with PCI certified system - How does PCI... |
Defense (Lecture) | ||
Monitoring and Troubleshooting TLS/SSL Payment Transaction Services via Mobile and Fixed Internet
TLS/SSL encrypted payment transactions are boring. They are also... |
|||
Overview of internet banking fraud in Croatia
The lecture will give a brief overview of internet banking fraud in Croatia... |
Control (Lecture) | ||
OWASP round table: Internet of Things
|
|
||
Raspberry Pi - best friend for all your flashing needs
Raspberry Pi is well known little Linux machine which almost everybody has.... |
Control (Lecture) | ||
Registration Day 1
|
|
||
Registration Day 2
|
|
||
Rise of Islamic State (ISIS/ISIL) - How Cyber Jihad contributed
|
Defense (Lecture) | ||
Security on the Internet in Croatia
The lecture will start with a brief overview of Croatian National CERT... |
Control (Lecture) | ||
sqlmap - why (not how) it works?
Backstory of sqlmap, one of most successful pentesting tools - developing... |
|||
The Miracle of Blockchain
What blockchain is, what it does, what can it do, and how to subvert it. |
Control (Lecture) | ||
The wrong side of history
Snowden shocked the world, but few were surprised. Many were amazed by the... |
Control (Lecture) | ||
Uforia - Universal Forensic Indexer and Analyzer
Uforia (Universal Forensic Indexer and Analyzer) is a simple, flexible and... |
Control (Lecture) | ||
Vendor showcase
Presentation of following vendors: * ReversingLabs * Eteco * Infigo IS *... |
|
||
VIP Party 1
|
|
||
VIP Party 2
|
|
||
Why I Hate Digital Forensics
In this paper various issues about digital forensics and general IT security... |
Control (Lecture) | ||
Y.aT.o..b.k.M
As you wished i use a recend Gig to explain how to break out of kiosk mode |
Offense (Lecture) |