27. 11. 2025| Stage 1
09:00 - 9:45
Attacker bridge from onprem to cloud
Today’s attackers are well aware that most companies operate in a hybrid infrastructure – the interconnected world of on-premises and cloud – and they adapt their entire attack kill chain accordingly. How can adversaries successfully execute different stages of the attack and move laterally between both worlds? What serves as a bridge between these environments? During this session, we will explore attack techniques used to “bridge” from on-premises to cloud environments (and vice versa). We will also take a closer look at threat groups such as Storm-0501 and examine their attack kill chain against hybrid infrastructures.
27. 11. 2025| Stage 1
09:50 - 10:50
From Phishing to Ransomware: The Kill Chain of a Modern Cyber Attack
Follow the anatomy of a cyberattack from phishing entry point to full ransomware deployment, with detection and prevention strategies.
Featured products, solutions and vendors: Microsoft Defender, Sentinel, Splunk
27. 11. 2025| Stage 1
11:00 - 12:00
The Rise of AI in Offensive Security: Automating the Hunt for Zero-Days
Discover how AI is transforming offensive security. Learn how adversaries use AI to find zero-days and how defenders can counter these new threats with automation.
Featured solutions, products and vendors: OpenAI, Microsoft Security Copilot, custom AI security tools
27. 11. 2025| Stage 1
13:00 - 13:45
Security testing of Elasticsearch and Kibana
Organizations collect huge amounts of data during operation, and tools such as Elasticsearch and Kibana are used to process it. If they are not set up correctly, they can become a gateway for attackers. In this lecture, we will show real ways in which these interfaces can be exploited, explain why proper configuration is critical, and introduce two tools - PTELASTIC and PTKIBANA - that automate penetration testing of these services.
27. 11. 2025| Stage 1
13:55 - 14:40
From Reactive to Predictive: How AI is Redefining Cyber Defense Strategies
AI is shifting cybersecurity from reactive to predictive. This session explores how AI detects threats before they strike, boosts resilience, reduces costs, and empowers both decision makers and IT teams to turn cyber defense into a strategic advantage.
Featured products, solutions, vendors: Microsoft Sentinel, Microsoft Defender for endpoint, Amazon Guard Duty, AWS Macie, Cortex XDR
27. 11. 2025| Stage 1
14:50 - 15:35
Beyond the Basics: Practical Steps for a Safer Digital Life
Elevate your cyber defenses! This session goes beyond security awareness to provide practical, intermediate-level insights on protecting your data. We'll cover topics like advanced authentication, threat hunting, and the basics of incident response, giving you actionable strategies to secure your personal and professional digital footprint.
Featured products, solutions, vendors: Microsoft Authenticator, Google Authenticator, YubiKey
27. 11. 2025| Stage 1
15:45 - 16:30
AI-Powered Security: Enhancing Incident Response with Azure OpenAI
Explore how Azure OpenAI enhances incident response by integrating with XDR and SIEM. Learn about Microsoft 365 Copilot, Security Copilot, AI automation, Retrieval-Augmented Generation, and fine-tuning AI models to boost security threat analysis and mitigation.
Featured products, solutions, vendors: Security Copilot, Azure OpenAI
27. 11. 2025| Stage 1
16:40 - 17:25
From Standards to Reality: AI-Driven Cyber Risk Management in Multi-Sector Environments
This session explores cyber risk management integration throughout IT project lifecycles, from planning to operational deployment. Drawing from ISO/IEC standards contribution experience and ongoing research in AI-enhanced risk assessment, it examines how project teams can identify, prevent, and mitigate cyber risks across aviation, banking, and education sectors. The presentation addresses practical challenges of embedding cybersecurity and resilience considerations before, during, and after project implementation, offering strategic insights for evolving training curricula to prepare professionals for proactive cyber risk management in diverse regulatory environments.
27. 11. 2025| Stage 1
17:35 - 18:35
Respond, Investigate, Recover: A Practical Guide to IR & Forensics
This session explores incident response and forensics, covering detection, containment, evidence handling, and practical demos with tools to strengthen your cybersecurity skills.
Featured solutions, products, vendors: Microsoft Sysinternals, Wireshark, Alien vault OTX
27. 11. 2025| Stage 1
18:45 - 19:30
Drone AI Tactical Forensics – Robots are not coming, they are here. Are we ready?
Drone AI Tactical Forensics is not about preparing for some distant future—it’s about adapting to the reality we face right now. Robots are not coming, they are here. Drones equipped with artificial intelligence are already flying in our skies, capturing data, performing reconnaissance, and even being weaponized.