Agenda – Day 1 – May 29th

TimeTalk TitleSpeakerWorkshops Trainers
9:00 – 10:00 Registrations and welcome coffee
10:00 – 10:20Keynote: Catalan Cybersecurity Ecosystem OverviewTomàs Roy Català, Agència de Ciberseguretat de Catalunya
10:25 – 10:50Deepfakes in the Age of Disinformation: Risk Analysis and their Propagation in the Dark WebAlixia Rutayisire & Santiago Rocha Vargas, QuoIntelligenceTwo-Day CTF from Hack Barcelona %27 and Flaghunters
10:55 – 11:20
11:20 – 11:40Coffee Break
11:40 – 12:05What If the Great Cybersecurity Solutions of Tomorrow Are Already Dead?Pete Herzog, ISECOMHow to investigate with Maltego: Cyber Threat Intel (CTI) & SOCMINTCarlos Fragoso, Mathieu Gaucheler, Maltego
12:30 – 12:55Breaking Mbed TLS RSA with one power traceVictor Micó, Comexi
13:00 – 13:25Finding vulnerabilities at scale in Jenkins plugins with CodeQLAlvaro Muñoz & Toni Torralba, GitHub
13:30 – 13:55The challenge of hardening multi-cloud with Open SourceToni de la Fuente, Prowler
14:00 – 15:00Lunch
15:00 – 15:25Operation Optimal: A Global Skimming EpidemicAndrei Moldovan, QuoIntelligencex86_64 Assembly and Shellcode for LinuxMarco Lux
15:30 – 15:55Leveraging OSINT Techniques to help locate Missing Persons – Insights from TraceLabs Search Party CTFAnna Mazurkiewicz, Quorum Cyber
16:00 – 16:25Here’s my data, what could possibly go wrong? An introduction into machine learning privacy and security with a survival analysisInken Hagestedt, Apheris
16:30 – 16:55External Attack Surface Management… for dummies!Matias Busco, Mews
17:00 – 17:25GenAI: Transforming Cybersecurity in 2024 and BeyondDaniel Voicu, Accenture
17:40 – 17:50Closing Day 1

Agenda – Day 2 – May 30th

Time Talk TitleSpeakerWorkshops Trainer
9:00 – 10:00Registrations and welcome coffee
10:00 – 10:20Securing the Perimeter: A Deep Dive into Attack Surfaces, Ransomware Threats, and Insurance
Marc Rivero Lopez, Kaspersky
10:25 – 10:50Beyond Cryptominers: Unveiling the Depths of AWS Post-Exploitation StrategiesMiguel Hernández, Sysdig
10:50 – 11:05Coffee Break
11:05 – 11:30React, Resist, Reclaim: The Memetic Frontline of UkraineDr. Tine Munk, Nottingham Trent CTF
11:35 – 12:00Navigating the Maze: Enhancing User Access Reviews for Comprehensive SecurityNicolás Villalobos Ramírez, OKTA
12:05 – 12:30The miscreant’s field manual for exploiting secretsMackenzie Jackson, GitGuardian
12:35 – 13:00Securing the Future: Navigating the Complexities of Multi-User AI EnvironmentsAndrew Zigler, Mattermost
13:05 – 13:30Fightcade: Online Retro GamingPau Oliva Fora, IOActive RedGPT Vs BlueGPT: Realistic AI-based confrontationCarlos Valderrama
13:35 – 14:00Recycling same topics for 5 years now – Red team stuffGerardo, Zurich Insurance, & Fran, Oracle
14:00 – 15:00Lunch
15:00 – 15:25Start covering your bases & Stop chasing APT headlinesMatan Mittelman, Cato NetworksSecuring the Cloud: A Workshop on Building
a Fortified SDLC on Kubernetes with Open Source Power
Antonio Juanilla (AkA Specter)
15:30 – 15:55InfoHound: a passive OSINT gathering tool for domain profilingXavier Marrugat Plaza, i2cat
16:00 – 16:25The pursuit of exfiltration: Lessons learned from a Threat HuntFabian Olender, Salesforce
16:30 – 17:10How The Hacking Games will create a generation of ethical hackers to make the world saferFergus Hay, The Hacking Games
17:10 – 17:30Closing the conference
Scroll to Top