Trainings for Qubit Conference® Prague 2026
How to Secure AI Generated Code Using Open Source Tools
The training will take place on May 18, 2026
Participants will learn how to set up effective protective mechanisms, detect weaknesses in AI code, and build automated security pipelines that verify both human- and AI-generated code.
What will the training cover?
Artificial intelligence is no longer just a developer’s assistant – it has become the main driver of modern software development. Today, almost 24% of production code is written by AI, and in the United States, it is nearly one-third. This shift has accelerated development but has also opened entirely new categories of risks. As many as 69% of organizations have discovered vulnerabilities directly in AI-generated code, and one in five has experienced a critical security incident.
During the training, participants will go through the entire secure development cycle:
- from identifying the most common vulnerabilities in AI code,
- through evaluating security scanners and testing prompts,
- up to creating a complete security architecture that integrates SAST, SCA, secrets, and container scanning.
However, the training goes even further — it will show how attackers are using AI. Participants will explore concepts such as package hallucination, prompt injection, and AI-generated malware, and learn how to recognize and neutralize these threats.
By the end of the day, each participant will leave with a functional security pipeline that can automatically:
- detect dangerous AI outputs,
- enforce secure prompting practices,
- verify dependencies and containers,
- and generate clear risk reports.
- understanding how AI changes risk, responsibility, and code ownership,
- practical methods for implementing secure prompts and tracking AI authorship,
- possibilities for using AI to detect vulnerabilities and malicious packages,
- a procedure for building a unified AppSec + CloudSec architecture that shortens detection and response time.
How to analyze Android malware
What will the training cover?
Smartphones are now the main battlefield of the cyber war. Attackers are increasingly focusing their activities on mobile devices, and Android has become their primary target. Malware families such as Joker, Anubis, Coper, Facestealer, and Shedun prove that mobile threats are no longer simple — they use multi-stage payloads, social engineering, and techniques capable of evading even modern security solutions.
The final part of the training focuses on defense and response – participants will learn how to build effective incident response processes for mobile threats, use Google Play Protect, implement MDM policies, and recognize early warning signs of device compromise.
What you will take away from the training:
- real experience analyzing malicious Android applications in a safe environment,
- the ability to identify and analyze the behavior of modern malware families,
- practical skills using open-source tools for static and dynamic analysis,
- proficiency in generating and applying IOCs and creating YARA rules,
- understanding of defense techniques and response strategies for the mobile ecosystem.
- basic knowledge of Linux and command-line usage,
- familiarity with malware concepts is an advantage, but not required.
Practical OT Security Roadmap
One-day expert training for organizations that need a common OT security foundation across leadership, engineering, and technical security teams. A complete one-day journey through the OT security capabilities that matter most in real industrial environments.
What will the training cover?
- OT foundations and architecture (OT vs IT, industrial environments, Purdue model, core OT security principles),
- OT governance and risk (roles, ownership, policies, standards, risk treatment, operating model),
- Access control and remote access (least privilege, vendor access, jump hosts, MFA, approval-based access),
- Asset inventory and visibility (asset discovery, criticality, ownership, lifecycle, safe visibility methods),
- Secure network architecture (segmentation, zones and conduits, industrial DMZ, practical design requirements),
- Resilience and incident readiness (monitoring, hardening, vulnerability handling, response, recovery, third-party risk ).
What you will take away from the training:
- a high-impact, management-and-technical overview that aligns the whole OT security audience,
- a structured framework for evaluating current OT security maturity and gaps ,
- a practical reference point for future roadmap, policy, segmentation, access, and recovery decisions,
- Training content that is relevant across manufacturing, utilities, energy, transport, and critical infrastructure environments.
- understand the security priorities unique to OT and industrial operations,
- recognize the minimum structural elements of a mature OT security environment,
- know why inventory, governance, segmentation, and controlled access are foundational,
- be able to prioritize practical OT security improvements based on risk and operational impact,
- understand how monitoring, maintenance, incident response, and recovery must work in OT,
- leave with a coherent picture of how to build an OT security roadmap.