Practical trainings
9:00 – 15:30


9:00 – 15:30
Mastering Threat Hunting


9:00 – 15:30
Hacking Gamification


Registration
9:15-10:00
EXECUTIVE TRACK
When you’ve been working in cybersecurity long enough, you start to wonder why some problems still haven’t been solved – and in fact, a few of them (like identity and access management) have become even more difficult. Some are related to the explosion of types of technologies, some are based on demographic, geopolitical, and economic factors, and some are our own fault. In this keynote speech, we will look deeply in the mirror to see what might need to change.


Privilege escalation is a critical tactic employed by cybercriminals to gain unauthorized access to sensitive data and systems. By advancing from initial entry points — typically a standard user or application account — to administrator, root, or full-system access, attackers can effectively take control of entire networks. This session unpacks the methods behind privilege escalation, illustrating how bad actors exploit vulnerabilities to elevate their access. Attendees will gain actionable insights into detecting, preventing, and mitigating these threats to safeguard systems and networks against advanced attacks.
10:00-10:45
10:45-11:05
Coffee break and refreshments
11:05-11:50
11:50-12:30
Shark Tank – 3 minute presentations
12:30-13:30
Lunch Break
13:30-14:15
MITRE ATT&CK has long been used in CTI and, more recently, in detection engineering, but its potential goes far beyond. Using practical examples, this presentation will show how ATT&CK can serve as a central framework for cybersecurity strategy, enabling organizations to map CTI, build ATT&CK-based threat models, assess security controls, and identify existing detection and protection gaps.
Interested in AI security and building resilient apps? The talk will delve into securing language models from prompt injection related threats. Explore deployment strategies in AWS and Azure, NLP input validation, prompt tracking, threat modeling, and effective countermeasures.
In cybersecurity, analysts are overwhelmed by cybernoise, a relentless stream of mass exploitation attempts, bot activity, opportunistic scans, false positives, and other mass AI-driven attacks. While SOC teams are caught up investigating low-priority non-urgent incidents, real attackers target your organisation can easily slip through undetected. Vlad will explore how this noisy landscape drains team efficiency and productivity. He’ll also share effective strategies to cut through the clutter, enhance automation, and streamline processes, helping teams reduce alert fatigue, strengthen defenses, and keep operations efficient without adding headcount or losing control of costs.
Current phishing detection methods include analyzing URL reputation and patterns, hosting infrastructure, and file signatures. However, these
approaches may not always detect phishing pages that mimic the look and feel of previously observed attacks. This talk explores an approach to detecting similar phishing pages by creating a corpus of visual fingerprints from known malicious sites. By taking screenshots, calculating hash values, and storing metadata, a reference library can be used to compare against newly crawled suspicious URLs. Fuzzy searches and OCR techniques can be combined with other methods to identify similar matches. Full code will be made available.
15:05-15:25


AI systems have been around for decades, but when ChatGPT emerged into our lives, it put AI capabilities into everyone’s hands. A new era of open-source models and LLMs (Large Language Models) has created a new threat landscape. Threat actors can now use this technology in their malicious activity. Organizations are also incorporating LLM systems without fully understanding the threat they can pose. Technologies like Retrieval Augmented Generation (RAG) allow organizations to use their data with state-of-the-art models like ChatGPT and Claude without needing the complex infrastructure of training and building their own models.
In this talk, we will explore how threat actors use AI in their attacks and delve into discussions regarding these methods taking place in the criminal underground. We will also examine attacks known as “jailbreaks,” which are designed to bypass the security measures put in place by companies like OpenAI and Claude to prevent the misuse of their large language models (LLMs). Additionally, we will address prompt injection attacks that specifically target AI-based systems, impacting applications that rely on AI, such as Retrieval-Augmented Generation (RAG) systems.
Panel discussion
16:55-17:05
Conclusion of the first conference day
Networking dinner
Registration
Panel discussion
We will publish the information soon.
Technical workshop
LAZARUS is a 3-year EU-funded project with a talented tech team aiming to simplify software development, particularly for SMEs, while ensuring secure applications for everyone. This is a hands-on, interactive session—passive participation is possible, but attendees will get the most out of it by testing the tools themselves. Find out more about workshop here.
Panel discussion
10:30-11:15


Marek Geleta
Application Security Engineer | Deepnote | Cybersecurity student | FI MU Brno | Czech Republic
MoreCoffee break and refreshments
11:30-11:55
We will publish the information soon.
11:30-11:55


One of the most dangerous infiltration techniques is to compromise a supply chain. We will showcase live a simulated supply chain compromise attack where the threat actor will gain unauthorized access through an altered application, exfiltrate sensitive data and disrupt company operations. We will look at each step of the attack and analyze the scattered footprints hidden in the network traffic.
What are the opportunities for upskilling in the field of cybersecurity? Who can become a cyber security specialist? There is a shortage of cybersecurity professionals in the world. Universities are not producing enough graduates in this field and interest in studying cyber security is only gradually increasing. The gap is widening every year. Fortunately, however, we have an “army” of IT professionals who may simply need to understand the context and seize the opportunity. What are the opportunities to upskill them in cyber security? How can certification and training programmes be structured and how can their practical experience be used?


We’ll explore both basic and advanced Active Directory features and explain lesser-known aspects that affect security. From understanding key components and protocols to diving into complex setups that often fly under the radar. We will discuss how attackers can exploit the internal mechanisms of AD and how defenders can use this knowledge to provide stronger protection. Whether you’re familiar with Active Directory or want to deepen your expertise, this talk will reveal important insights for securing AD environments from modern threats.
Lunch Break
13:40-14:30
We will publish the information soon.
14:30-14:40
Networking with refreshments
Speakers and Trainers
Tickets
Combo Pass
Conference + training
1250 €* | Regular price Until 9.5.2025 |
1050 €* | 1450 €* |
Early Bird | Late price |
11.11.2024-14.2.2025 | 10.5.-26.5.2025 |
- Conference Entrance
- Training Entrance
- Snacks, coffee and lunch
- Networking dinner
Conference Pass
Conference
800 €* | Regular price Until 9.5.2025 |
695 €* | 950 €* |
Early Bird | Late price |
11.11.2024-14.2.2025 | 10.5.-26.5.2025 |
- Conference Entrance
- Training Entrance
- Snacks, coffee and lunch
- Networking dinner
Training Pass
Training
550 €* | Regular price Until 9.5.2025 |
550 €* | 550 €* |
Early Bird | Late price |
11.11.2024-14.2.2025 | 10.5.-26.5.2025 |
- Conference Entrance
- Training Entrance
- Snacks, coffee and lunch
- Networking dinner
Public Pass
For representatives of government institutions, students, and university representatives with proof of their affiliation, we offer the opportunity to participate through discounted Combo Public Passes priced at €800 and Conference Public Passes priced at €450.
If you meet the specified conditions and are interested in a discounted registration, please fill out the registration form.
Venue
Conference Venue
For the best rates, book your accommodation via this link.
On the dates 26.-28. May: SINGLE/DOUBLE at the price of 116/122 EUR.
Reservations at the discounted price can be made until the limited capacity is exhausted, but no later than 25.4.2025.
After this date or when the promised capacity is exhausted, reservations will be confirmed on request only and the hotel reserves the right to set prices according to availability.
Cancellation conditions:
Until May 8, 2025, the reservation can be canceled free of charge. From May 9, 2025, up to 25 hours before arrival, a cancellation fee of 1 night is charged. Reservations canceled 24 hours before arrival are charged a cancellation fee in the amount of the entire stay.
The price includes breakfast, Wi-Fi, entrance to the hotel pool wellness, and VAT.
The price does not include a city tax of €2/person/day and parking: €8/day.
If you wish to send an invoice for accommodation with company details, please indicate this in the “Special request” field on the booking form.
Speaking Bureau
The Programme Commission is responsible for the most important part of the
compiling a list of speakers and topics presented at the highest professional and qualitative level
Speaking Bureau for conference
and panel discussions
Partners
Gold partners
Silver partners
Shark Tank partneri
Supporting partners
Media partners