Events
Title | Track | Speakers | |
---|---|---|---|
Analyzing obfuscated JavaScript codes
This presentation is going to focus on obfuscation and obfuscation methods in... |
Defense | ||
Applications Without Constraints – F5 Networks
Applications—along with their users and data—are exposed to enormous risk as... |
|
||
asseco vendor showcase
|
|
||
Cloud Privacy Check and Legal Framework
LEGISLATION -Croatian Legal framework -New EU Legal framework -AZOP... |
Strategy | ||
Consequent System Born - Fintech is Alive!
|
Strategy | ||
Critical Infrastructure – Round Table (cro)
Okrugli stol: kritična nacionalna infrastruktura. Moderator: Alen Delić |
Strategy | ||
Daily operations with Hardware Security Modules
Hardware Security Modules are expensive piece of hardware that add new layer... |
Defense | ||
Defending against DDoS attacks - RioRey
RioRey has been defending DDoS attacks for 10 years. During this session you... |
|
||
Digital Shadows SearchLight
Digital Shadows provides cyber situational awareness that helps organizations... |
|
||
Diverto - Influence of cognitive biases in information security
|
|
||
Elastic Defence
The challenges that Endpoint Point security solutions have to solve... |
|
||
Evaluation of Android Malware Detection Based on System Calls
With Android being the most widespread mobile platform, protecting it against... |
|||
FSec closing ceremony
|
|
||
FSec opening ceremony
|
|
||
Guided Fuzzing And Binary Blobs
Even though the notion of guided fuzzing has been around for years,... |
|||
Hosting provider Birds of Feather coffee
|
|
||
Integracija logičke i fizičke zaštite
Fizička zaštita predstavlja kontrolu fizičkog kretanja i pristupa štićenim... |
Control | ||
Kako izvući dodanu vrijednost iz sigurnosnih rješenja
Zaštita naših korisnika, organizacija svih veličina, nikada nije... |
|
||
metronet vendor showcase
|
|
||
Mobile application security in Croatia and in the region
This presentation will show results of dozens of mobile application... |
Defense | ||
Networking event I
For VIP, supporters, business supporters we have our annual networking event.... |
|
||
Nifty Tricks for ARM Firmware Reverse Engineering
|
Offense | ||
Non-Esoteric XSS Tips & Tricks
Cross-Site Scripting (XSS) is (still) one of the most prevalent security... |
Offense | ||
[Opening Keynote] Emerging Trends in Cyberwarfare
|
Strategy | ||
OWASP meetup & Networking event II
For VIP, supporters, business supporters we have our annual networking event.... |
|
||
Payments industry just don’t get Internet
Internet has never been bigger and better. Anyway it is important for... |
Control | ||
reversinglabs vendor showcase
ReversingLabs was formed in 2009 to combat the next generation of intelligent... |
|
||
Security in the age of frameworks
A “monsters found” talk about the implications of security measures baked... |
Defense | ||
Security Management
|
Strategy | ||
Sigurnost osobnih i drugih osjetljivih podataka u cloudu - pravni pogled
Pitanje zaštite osobnih i drugih osjetljivih podataka u cloudu ("oblak") nije... |
Business | ||
[Strategy Keynote] Big game cyber-hunting
For several years our team have been revealing sophisticated cyber-attacks in... |
Strategy | ||
Surviving the malware apocalypse
This is a true story of the brave individuals who fight malware threats on a... |
Strategy | ||
The State of Information Security in the Republic of Croatia
Predstavnici iz PNUSKOK-a, NCERT-a, ZSIS-a i HNB-a prikazati će pregled... |
Strategy |
|
|
TLS/SSL transactions and mutual client - server authentication using SSL client certificates: configuration, troubleshooting and monitoring
Complex TLS/SSL protocols for secure encrypted transactions over public... |
Defense | ||
USB armory
|
Defense | ||
Using payment HSM in application
We will create demo app in Python that communicates with HSM available... |
Defense | ||
When hacker meets BIG DATA
Even white hat hackers have to deal with Big data these days if they want to... |
Offense | ||
When the digital hair stands up in your neck
a talk how sigint works who does it and what could possible go wrong with it.... |
Defense | ||
Why choice of programming language matters
It is inevitable that humans make mistakes. Mistakes in writing software turn... |