Events

  Title Track Speakers
Event_small
Backup-as-a-service with data deduplication technique on the source
Backup process which utilizes source data deduplication techniques improves...
Control (Lecture)
Event_small
Breaking password protected PE files
In the world of custom crypters, it is not uncommon to stumble upon custom...
Event_small
Common Oops in DevOps
Common mistakes in DevOps
Defense (Lecture)
Event_small
Console Hacking
For as long as gaming consoles have been around, hackers have been finding...
Offense (Lecture)
Event_small
Cyber Crime u RH
Control (Lecture)
Orion_it_logo_transparent
Cyber reconnaissance and defense tactics on SME budget
Since Big Boys are failing big ... how on earth could Small & Medium...
Defense (Lecture)
Event_small
Cyber Security Leadership and Education in a Rapidly Evolving Cyber Environment
Control (Lecture)
Event_small
Demistifying Container Hype
what security pros can gain from this container hype? what should i know...
Defense (Lecture)
Event_small
Flashing displays: User-friendly solution for bootstrapping secure associations between multiple constrained wireless devices
Future healthcare systems, smart homes, power management systems and similar...
Defense (Lecture)
Event_small
FSec 0x05 Opening
Croatia_chapter_logo
(ISC)2 Croatia Chapter
Presentation of the (ISC)2 Croatia Chapter, its activities, membership,...
Control (Lecture)
Event_small
Keynote: deRaadt
Keynote - de Raadt
Control (Lecture)
Event_small
Keynote: FX
Control (Lecture)
Event_small
LibreSSL
Event_small
Living with PCI
Lecture will cover reality of living with PCI certified system - How does PCI...
Defense (Lecture)
Pos_pacman
Monitoring and Troubleshooting TLS/SSL Payment Transaction Services via Mobile and Fixed Internet
TLS/SSL encrypted payment transactions are boring. They are also...
Event_small
Overview of internet banking fraud in Croatia
The lecture will give a brief overview of internet banking fraud in Croatia...
Control (Lecture)
Event_small
OWASP round table: Internet of Things
Event_small
Raspberry Pi - best friend for all your flashing needs
Raspberry Pi is well known little Linux machine which almost everybody has....
Control (Lecture)
Event_small
Registration Day 1
Event_small
Registration Day 2
Event_small
Rise of Islamic State (ISIS/ISIL) - How Cyber Jihad contributed
Defense (Lecture)
Event_small
Security on the Internet in Croatia
The lecture will start with a brief overview of Croatian National CERT...
Control (Lecture)
Event_small
sqlmap - why (not how) it works?
Backstory of sqlmap, one of most successful pentesting tools - developing...
Event_small
The Miracle of Blockchain
What blockchain is, what it does, what can it do, and how to subvert it.
Control (Lecture)
Event_small
The wrong side of history
Snowden shocked the world, but few were surprised. Many were amazed by the...
Control (Lecture)
Event_small
Uforia - Universal Forensic Indexer and Analyzer
Uforia (Universal Forensic Indexer and Analyzer) is a simple, flexible and...
Control (Lecture)
Event_small
Vendor showcase
Presentation of following vendors: * ReversingLabs * Eteco * Infigo IS *...
Event_small
VIP Party 1
Event_small
VIP Party 2
Event_small
Why I Hate Digital Forensics
In this paper various issues about digital forensics and general IT security...
Control (Lecture)
Event_small
Y.aT.o..b.k.M
As you wished i use a recend Gig to explain how to break out of kiosk mode
Offense (Lecture)