Panel Discussion - New Cyber Threat Landscape: Emerging Trends and Mitigation Tactics
Starts with Fresh Analytics of Attacks on Armenia, then a Result-Driven Cybersecurity Approach
Beyond the Web: Comprehensive Protection of Infrastructure from DDoS Attacks
Inside the Storm: The Evolving Landscape of DDoS Threats and Defense
Securing Digital Identities - Building Resilience Against Phishing and Cyber Threats using Phishing Resistant Authentication
Using secure, and phishing-resistant MFA that prevents account takeovers and cyber breaches. Through real-world examples and practical insights, discover why top global enterprises and government organizations choose MFA to provide user data protection while simplifying the user experience.
Interactive Cyber Incident Response Simulation
This will be a highly interactive, scenario-based workshop where participants take on defined roles within a simulated organization responding to a realistic cyber-attack. The session will be facilitated by a cyber expert who guides participants through the unfolding incident, prompting decision-making, communication, and coordination under pressure. The format encourages active participation, discussion, and reflection on real-world challenges in cyber crisis management
Session 1
This workshop will present you the critical tasks performed by skilled attacker or pentester against Active Directory and its key components.
Coffee Break
Session 2
Exploits are not the only way to get to the systems! We will go through the operating systems’ built-in problems and explore how they can be beneficial for hackers.
Lunch
Session 3
One of the most important things to conduct a successful attack is to understand how the targets work. Afterwards everything is clear and the tool is just a matter of our need. The workshop covers all aspects of Active Directory identity security from the hacker’s mind perspective!
Coffee Brake
Antifragility in cybersecurity: how to prepare for what cannot be predicted
Hackathons, Findings, and Fear: Why Bug Bounties Actually Work
Over the past five years, we’ve opened our systems to the external teams through bug bounty programs—on purpose. In this talk, I’ll share what we’ve learned from dozens of reported vulnerabilities, real-world statistics, and the unexpected patterns that emerged. You’ll hear about the types of issues we actually faced, why bug bounty hunters often outperform internal security teams, and how embracing external scrutiny made our systems more resilient. This is not a sales pitch—it’s a war diary for anyone curious (or nervous) about letting hackers in the front door.