»Protecting the Bank in Your Pocket - Ukraine Crypto Edition« Jeremiah O'Connor; Talk (40 minutes)

Abstract: Come get an inside sneak peek how Coinbase Security utilizes innovative detection techniques and threat intelligence capabilities to help keep its users and the entire cryptocurrency community safe. We will focus specifically on what Coinbase Security is doing to track major financial a...

»10 major steps for Cybersecurity« Bert Heitink; Talk (40 minutes)

There's no such thing as 100% security, but this talk will demonstrate 10 main topics what needs attention to reduce the risk of being hacked

»Traffic Analysis Workshop - NoNameCon« Brad Duncan; Workshop (2 hours)

This workshop uses Wireshark to investigate Windows-based malware activity. Participants review packet captures (pcaps) of network traffic based on alerts from an Intrusion Detection System (IDS).

»Hunting fileless malware« Olha Pasko; Workshop (2 hours)

Fileless malware and system tools as bypass techniques in cyber-attack. Hunting with SysInternals tools and Digital Forensics techniques.

»Practical Approaches for Testing and Breaking JWT Authentication« Mazin Ahmed; Talk (40 minutes)

A walk-though on approaches for breaking and testing JWT authentication.

»Will you detect it or not? How to check if security team is ready before incident happens« Oksana Safronova; Talk (40 minutes)

Before the real incident happens, security team must test their detection capabilities in different ways. An overview of MITRE ATT&CK Matrix, test environments and other friends of Blue Team.

»Search over encrypted records: from academic dreams to production-ready tool« Artem Storozhuk; Talk (40 minutes)

The search over encrypted data is the modern cryptographic engineering problem. We will talk about existing approaches (both well-known and modern), and concentrate on practical solution based on blind index technique to search data in databases. What’s inside: cryptographic and functional scheme...

»Філософські роздуми про аналіз користувачів у соціальних мережах« Anton Pavlushko; Workshop (2 hours)

Протягом воркшопу хотілось би поговорити про аналіз профілей у соціальних мережах. На що звертати увагу, куди дивитись, які бувають користувачі, як вони себе поводять. Чому важливий кожен клік, лайк та репост.

Будемо використовувати приклади та напрацювання з роботи проекту InformNapalm.

»Car Hacking: Yes, You can do that!« Andrey Voloshin; Talk (40 minutes)

The complete list of (I hope) all {not only} publicly disclosed vulnerabilities in car hacking. Contains a detailed description of Who When How has been hacked, toolz and technics. Encourage every other-field pentester to use their skills in car hacking giving fundamental knowledge of where to st...

»Державна кібербезпека vs Кібербезпека держави. Уроки #FRD« Kostiantyn Korsun; Talk (40 minutes)

Про роль кібер-волонтерів та кібер-чиновників у сучасній кібер-війні

»Knock Knock: Security threats with Kubernetes« Igor Khoroshchenko; Talk (40 minutes)

We will try to describe the most interesting security problems with Kubernetes environments from a DevOps and Security side.

»Automation in modern Incident Detection & Response (IDR) process« Nazar Tymoshyk, Unnamed user; Talk (40 minutes)

Incident Detection & Response requires People - to Think, Tools - to provide data and analytics and Processes - to avoid fuckups and assure the quality. But with more alerts, analysis takes more time, decisions and moreover - actions need to be taken immediately. Attackers actively use automa...

»Hacking 50 Million users using 123456« Himanshu, Aman Sachdev; Talk (40 minutes)

We will show unique exploitation techniques of uncommon flaws which automated scanners will never detect . Includes , payment gateway bypasses , SQLIs , RCEs etc

»Mobile Anti-Virus apps exposed« Stephanie Vanroelen; Talk (40 minutes)

This talk is about top anti-virus apps on Mobile. An in depth look on how they work and what they do. Do they add to or break the security of the mobile OS?

»Калина, Купина, та інша флора вітчизняної криптографії« Ruslan Kiyanchuk; Talk (40 minutes)

Огляд українських криптографічних алгоритмів та стандартів