Agenda – Day 1 – May 29th
Time | Talk Title | Speaker | Workshops | Trainers |
9:00 – 10:00 | Registrations and welcome coffee | |||
10:00 – 10:20 | Keynote: Catalan Cybersecurity Ecosystem Overview | Tomàs Roy Català, Agència de Ciberseguretat de Catalunya | ||
10:25 – 10:50 | Deepfakes in the Age of Disinformation: Risk Analysis and their Propagation in the Dark Web | Alixia Rutayisire & Santiago Rocha Vargas, QuoIntelligence | Two-Day CTF from Hack Barcelona %27 and Flaghunters | |
10:55 – 11:20 | ||||
11:20 – 11:40 | Coffee Break | |||
11:40 – 12:05 | What If the Great Cybersecurity Solutions of Tomorrow Are Already Dead? | Pete Herzog, ISECOM | How to investigate with Maltego: Cyber Threat Intel (CTI) & SOCMINT | Carlos Fragoso, Mathieu Gaucheler, Maltego |
12:30 – 12:55 | Breaking Mbed TLS RSA with one power trace | Victor Micó, Comexi | ||
13:00 – 13:25 | Finding vulnerabilities at scale in Jenkins plugins with CodeQL | Alvaro Muñoz & Toni Torralba, GitHub | ||
13:30 – 13:55 | The challenge of hardening multi-cloud with Open Source | Toni de la Fuente, Prowler | ||
14:00 – 15:00 | Lunch | |||
15:00 – 15:25 | Operation Optimal: A Global Skimming Epidemic | Andrei Moldovan, QuoIntelligence | x86_64 Assembly and Shellcode for Linux | Marco Lux |
15:30 – 15:55 | Leveraging OSINT Techniques to help locate Missing Persons – Insights from TraceLabs Search Party CTF | Anna Mazurkiewicz, Quorum Cyber | ||
16:00 – 16:25 | Here’s my data, what could possibly go wrong? An introduction into machine learning privacy and security with a survival analysis | Inken Hagestedt, Apheris | ||
16:30 – 16:55 | External Attack Surface Management… for dummies! | Matias Busco, Mews | ||
17:00 – 17:25 | GenAI: Transforming Cybersecurity in 2024 and Beyond | Daniel Voicu, Accenture | ||
17:40 – 17:50 | Closing Day 1 |
Agenda – Day 2 – May 30th
Time | Talk Title | Speaker | Workshops | Trainer |
9:00 – 10:00 | Registrations and welcome coffee | | ||
10:00 – 10:20 | Securing the Perimeter: A Deep Dive into Attack Surfaces, Ransomware Threats, and Insurance Issues | Marc Rivero Lopez, Kaspersky | ||
10:25 – 10:50 | Beyond Cryptominers: Unveiling the Depths of AWS Post-Exploitation Strategies | Miguel Hernández, Sysdig | ||
10:50 – 11:05 | Coffee Break | |||
11:05 – 11:30 | React, Resist, Reclaim: The Memetic Frontline of Ukraine | Dr. Tine Munk, Nottingham Trent University | Wiz.io CTF | |
11:35 – 12:00 | Navigating the Maze: Enhancing User Access Reviews for Comprehensive Security | Nicolás Villalobos Ramírez, OKTA | ||
12:05 – 12:30 | The miscreant’s field manual for exploiting secrets | Mackenzie Jackson, GitGuardian | ||
12:35 – 13:00 | Securing the Future: Navigating the Complexities of Multi-User AI Environments | Andrew Zigler, Mattermost | ||
13:05 – 13:30 | Fightcade: Online Retro Gaming | Pau Oliva Fora, IOActive | RedGPT Vs BlueGPT: Realistic AI-based confrontation | Carlos Valderrama |
13:35 – 14:00 | Recycling same topics for 5 years now – Red team stuff | Gerardo, Zurich Insurance, & Fran, Oracle | ||
14:00 – 15:00 | Lunch | |||
15:00 – 15:25 | Start covering your bases & Stop chasing APT headlines | Matan Mittelman, Cato Networks | Securing the Cloud: A Workshop on Building a Fortified SDLC on Kubernetes with Open Source Power | Antonio Juanilla (AkA Specter) |
15:30 – 15:55 | InfoHound: a passive OSINT gathering tool for domain profiling | Xavier Marrugat Plaza, i2cat | ||
16:00 – 16:25 | The pursuit of exfiltration: Lessons learned from a Threat Hunt | Fabian Olender, Salesforce | ||
16:30 – 17:10 | How The Hacking Games will create a generation of ethical hackers to make the world safer | Fergus Hay, The Hacking Games | ||
17:10 – 17:30 | Closing the conference |