Andrey Voloshin

»Car Hacking: Yes, You can do that!«


Ievgen Kulyk

»Advanced reverse engineering techniques in unpacking«


Brad Duncan

»Traffic Analysis Workshop«


Oksana Safronova

»Will you detect it or not? How to check if security team is ready before incident happens«


Artem Storozhuk

»Search over encrypted records: from academic dreams to production-ready tool«


Olha Pasko

»Hunting fileless malware«


Anton Pavlushko

»Philosophical reflections on social networks user analysis«


Nazar Tymoshyk

»Automation in modern Incident Detection & Response (IDR) process«


Stephanie Vanroelen

»Mobile Anti-Virus apps exposed«


Ruslan Kiyanchuk

»Калина, Купина, та інша флора вітчизняної криптографії«


Vitaliy Mechytashvili

»MacOS Security threats.«


Stanislav Kolenkin

»Knock Knock: Security threats with Kubernetes«


Nadia Klymenko

»How to improve your privacy online«


Pavlo Zhavoronkov

»What is autumn like in prison camps?«


Igor Khoroshchenko

»Knock Knock: Security threats with Kubernetes«


Kostiantyn Korsun

»State Cybersecurity vs. Cybersecurity of the State. #FRD Lessons.«


Ignat Korchagin

»Live-patching weak crypto with OpenSSL engines«


Bert Heitink

»10 major steps for Cybersecurity«


Invited speakers

»Professional Debates«


Teams registration pending

»Hacking Quiz«


Kyrylo Hobrenyak

»NoNameCon "Hack the Box" Activity Recap«


Tim Karpinsky, Vlad Styran, Ruslan Kiyanchuk, Ihor Kravchuk

»NoNamePodcast Episode 37 LIVE«


Vlad Styran, Ihor Bliumental, Tim Karpinsky

»Conference Closure«


Anastasiia Vixentael, Serhii Korolenko

»Conference Opening«