Events
Title | Track | Speakers | |
---|---|---|---|
![]() |
Analyzing obfuscated JavaScript codes
This presentation is going to focus on obfuscation and obfuscation methods in... |
Defense | |
![]() |
Applications Without Constraints – F5 Networks
Applications—along with their users and data—are exposed to enormous risk as... |
|
|
![]() |
asseco vendor showcase
|
|
|
![]() |
Cloud Privacy Check and Legal Framework
LEGISLATION -Croatian Legal framework -New EU Legal framework -AZOP... |
Strategy | |
![]() |
Consequent System Born - Fintech is Alive!
|
Strategy | |
![]() |
Critical Infrastructure – Round Table (cro)
Okrugli stol: kritična nacionalna infrastruktura. Moderator: Alen Delić |
Strategy | |
![]() |
Daily operations with Hardware Security Modules
Hardware Security Modules are expensive piece of hardware that add new layer... |
Defense | |
![]() |
Defending against DDoS attacks - RioRey
RioRey has been defending DDoS attacks for 10 years. During this session you... |
|
|
![]() |
Digital Shadows SearchLight
Digital Shadows provides cyber situational awareness that helps organizations... |
|
|
![]() |
Diverto - Influence of cognitive biases in information security
|
|
|
![]() |
Elastic Defence
The challenges that Endpoint Point security solutions have to solve... |
|
|
![]() |
Evaluation of Android Malware Detection Based on System Calls
With Android being the most widespread mobile platform, protecting it against... |
||
![]() |
FSec closing ceremony
|
|
|
![]() |
FSec opening ceremony
|
|
|
![]() |
Guided Fuzzing And Binary Blobs
Even though the notion of guided fuzzing has been around for years,... |
||
![]() |
Hosting provider Birds of Feather coffee
|
|
|
![]() |
Integracija logičke i fizičke zaštite
Fizička zaštita predstavlja kontrolu fizičkog kretanja i pristupa štićenim... |
Control | |
![]() |
Kako izvući dodanu vrijednost iz sigurnosnih rješenja
Zaštita naših korisnika, organizacija svih veličina, nikada nije... |
|
|
![]() |
metronet vendor showcase
|
|
|
![]() |
Mobile application security in Croatia and in the region
This presentation will show results of dozens of mobile application... |
Defense | |
![]() |
Networking event I
For VIP, supporters, business supporters we have our annual networking event.... |
|
|
![]() |
Nifty Tricks for ARM Firmware Reverse Engineering
|
Offense | |
![]() |
Non-Esoteric XSS Tips & Tricks
Cross-Site Scripting (XSS) is (still) one of the most prevalent security... |
Offense | |
![]() |
[Opening Keynote] Emerging Trends in Cyberwarfare
|
Strategy | |
![]() |
OWASP meetup & Networking event II
For VIP, supporters, business supporters we have our annual networking event.... |
|
|
![]() |
Payments industry just don’t get Internet
Internet has never been bigger and better. Anyway it is important for... |
Control | |
![]() |
reversinglabs vendor showcase
ReversingLabs was formed in 2009 to combat the next generation of intelligent... |
|
|
![]() |
Security in the age of frameworks
A “monsters found” talk about the implications of security measures baked... |
Defense | |
![]() |
Security Management
|
Strategy | |
![]() |
Sigurnost osobnih i drugih osjetljivih podataka u cloudu - pravni pogled
Pitanje zaštite osobnih i drugih osjetljivih podataka u cloudu ("oblak") nije... |
Business | |
![]() |
[Strategy Keynote] Big game cyber-hunting
For several years our team have been revealing sophisticated cyber-attacks in... |
Strategy | |
![]() |
Surviving the malware apocalypse
This is a true story of the brave individuals who fight malware threats on a... |
Strategy | |
![]() |
The State of Information Security in the Republic of Croatia
Predstavnici iz PNUSKOK-a, NCERT-a, ZSIS-a i HNB-a prikazati će pregled... |
Strategy |
|
![]() |
TLS/SSL transactions and mutual client - server authentication using SSL client certificates: configuration, troubleshooting and monitoring
Complex TLS/SSL protocols for secure encrypted transactions over public... |
Defense | |
![]() |
USB armory
|
Defense | |
![]() |
Using payment HSM in application
We will create demo app in Python that communicates with HSM available... |
Defense | |
![]() |
When hacker meets BIG DATA
Even white hat hackers have to deal with Big data these days if they want to... |
Offense | |
![]() |
When the digital hair stands up in your neck
a talk how sigint works who does it and what could possible go wrong with it.... |
Defense | |
![]() |
Why choice of programming language matters
It is inevitable that humans make mistakes. Mistakes in writing software turn... |