Trainings for Qubit Conference® Prague 2026

How to Secure AI-Generated Code Using Open-Source Tools

The training will take place on May 18, 2026

In-person | Duration: 6 hours | Suitable for: developers, AppSec engineers, and security leaders who want to master the security challenges of the generative AI era with real-world tools | Maximum number of participants: 20

Participants will learn how to set up effective protective mechanisms, detect weaknesses in AI code, and build automated security pipelines that verify both human- and AI-generated code.

Artificial intelligence is no longer just a developer’s assistant – it has become the main driver of modern software development. Today, almost 24% of production code is written by AI, and in the United States, it is nearly one-third. This shift has accelerated development but has also opened entirely new categories of risks. As many as 69% of organizations have discovered vulnerabilities directly in AI-generated code, and one in five has experienced a critical security incident.

During the training, participants will go through the entire secure development cycle:

  • from identifying the most common vulnerabilities in AI code,
  • through evaluating security scanners and testing prompts,
  • up to creating a complete security architecture that integrates SAST, SCA, secrets, and container scanning.

However, the training goes even further — it will show how attackers are using AI. Participants will explore concepts such as package hallucination, prompt injection, and AI-generated malware, and learn how to recognize and neutralize these threats.

By the end of the day, each participant will leave with a functional security pipeline that can automatically:

  • detect dangerous AI outputs,
  • enforce secure prompting practices,
  • verify dependencies and containers,
  • and generate clear risk reports.
What you will take away from the training:
  • understanding how AI changes risk, responsibility, and code ownership,
  • practical methods for implementing secure prompts and tracking AI authorship,
  • possibilities for using AI to detect vulnerabilities and malicious packages,
  • a procedure for building a unified AppSec + CloudSec architecture that shortens detection and response time.
Note:
The training uses only open-source tools that participants can freely deploy in their own organizations.

Trainer

Maskenzie Jackson

Mackenzie Jackson

Researcher & Advocate |
Aikido Security | Netherlands

How to analyze Android malware

The training will take place on May 19, 2026

In-person | Duration: 6 hours | Suitable for: cybersecurity analysts, SOC team members, threat hunters, forensic specialists, AppSec engineers, researchers, and students who want to expand their skills in the field of mobile malware analysis and learn to work with real threats in practice | Maximum number of participants: 20

This intensive one-day training is designed for security professionals who want to gain practical skills in Android malware analysis, from basic to advanced techniques. In a safe laboratory environment, participants will work with real malicious APK samples, learn static and dynamic analysis, and use tools such as APKTool, JADX, MobSF, Frida, Objection, Wireshark, and mitmproxy.

Smartphones are now the main battlefield of the cyber war. Attackers are increasingly focusing their activities on mobile devices, and Android has become their primary target. Malware families such as Joker, Anubis, Coper, Facestealer, and Shedun prove that mobile threats are no longer simple — they use multi-stage payloads, social engineering, and techniques capable of evading even modern security solutions.

During the training, participants will uncover the internal workings of malicious applications, learn to detect suspicious code, monitor network communication, and bypass protection mechanisms such as SSL pinning and root detection. They will gain the ability to extract Indicators of Compromise (IOCs), create simple YARA rules, and map findings according to the MITRE ATT&CK Mobile framework.

The final part of the training focuses on defense and response – participants will learn how to build effective incident response processes for mobile threats, use Google Play Protect, implement MDM policies, and recognize early warning signs of device compromise.

What you will take away from the training:
  • real experience analyzing malicious Android applications in a safe environment,
  • the ability to identify and analyze the behavior of modern malware families,
  • practical skills using open-source tools for static and dynamic analysis,
  • proficiency in generating and applying IOCs and creating YARA rules,
  • understanding of defense techniques and response strategies for the mobile ecosystem.
Requirements for training participants:
  • basic knowledge of Linux and command-line usage,
  • familiarity with malware concepts is an advantage, but not required.

Trainer

Shyam Sundar R.

Shyam Sundar R.

Senior Manager | Arctic Wolf Networks | India

We are preparing training

The training will take place on May 19, 2026

In-person | Duration: 6 hours | Suitable for:

Trainer

úprava foto spíkers (1)

Joseph Carson

Chief Security Evangelist & Advisory CISO | Segura | Estonia

Mackenzie Jackson

Researcher & Advocate | Aikido Security | Holandsko

Shyam Sundar R.

Senior Manager | Arctic Wolf Networks | India

Joseph Carson

Chief Security Evangelist & Advisory CISO | Segura | Estónsko

Mackenzie Jackson

Researcher & Advocate | Aikido Security | Netherlands

Shyam Sundar R.

Senior Manager | Arctic Wolf Networks | India

Joseph Carson

Chief Security Researcher & Advisory CISO | Wiretrap | Estonia

Lenka Madudova

Dave Lewis

Aleksander Gorkowienko

Domagoj Maric

Martin Pavelka

Jan Dusatko

Yohann Sillam

Ladislav Snapko

Tamas Buzgo

Stanislav Balko

Chief of Information Technology Department | University Hospital Martin | Slovakia

Michal Kaprinay

Systems Engineer | Fortinet | Slovakia

Lubomir Kriz

CISO | Slovak Post | Slovakia

Slavomir Zavacky

Head of Distribution System Automation Department | Východoslovenská distribučná a.s. and Západoslovenská distribučná a.s. | Slovakia

Zuzana Halasova

Head of the Cyber Security Department | the Slovak Ministry of the Interior | Slovakia

Marcela Zimova

Chief Information Security Officer | Piano Software | Slovakia

Zdenek Huspenina

Head of AI Solutions | Blogic | Czech Republic

Michal Gross

Head of IT Security | 365.bank | Slovakia

Boris Mittelmann

Senior Systems Engineer | Veeam Software | Slovakia

Branislav Magula

Global Cyber Security Manager | Marelli | Slovakia

Florian Ettinger

Solutions Architect | AWS Austria

Maximilian Stremy

rector | STU | Slovakia

Martin Zajicek

CISO | Medirex, a.s. | Slovakia

Ivan Malik

CEO/CTO | Logicworks | Slovakia

Ondrej Krajc

Solution Architect | ESET | Slovakia

Zuzana Rebrova

Head of Third Party Cyber Risk Management | Swiss Re | Slovakia

Rastislav Beno

EMEA Information Security & Cyber Resilience Manager | Mitsubishi Chemical Group Corporation | Slovakia

Pavol Dovicovic

Executive Consultant , certified auditor | Cyber Security Competence and Certification Centre | Slovakia

Michal Srnec

CISO | Aliter Technologies | Slovakia

Milan Oselsky

Partner & Board Member | Xolution Robots | Slovakia

Ing. Radoslav Stefanek

State Secretary of the Ministry of Investments, Regional Development and Informatization of the Slovak Republic and Government Plenipotentiary for Artificial Intelligence.

Martin Kupci

CISO | Tatra banka | Slovakia

Dusan Petricko

Cyber Security Domain Lead | SLSP | Slovakia

Nicol Dankova

Head of Security Operations Center | Researcher | Henkel | Tomas Bata University | Germany

Igor Urban

Territory Account Manager | Forcepoint | Slovakia

Jean Gobin

Senior Technical Architect | Truesec AB | Sweden

Andrea Pezzotti

Global Head Cyber Security Operations | Sandoz | Czech Republic

Tiarne Hawkins

CEO & Co-Founder | Optica Labs | USA

Michal Susko

IT GRC and Security Team Leader | VOLKSWAGEN Financial Services Slovakia | Slovakia

Jozef Filko

Cyber security consultant | beluga | Slovakia

Tudor Damian

Cybersecurity & Cloud Advisor | D3 Cyber | Romania

Charles Tango

CISO | SYSCO | USA

Lukas Hatala

Regional CTO | DXC Technology | Slovakia

Pavel Minarik

VP, Product Security | Progress Software | Czech Republic