<We_can_help/>

What are you looking for?

08:30 - 10:00

Breakfast

Every good day starts with a good breakfast 🙂

GoodMorning GoodMorning
10:00 - 10:10

Opening Speech

Martin Galstyan Martin Galstyan
10:10 - 10:20

Keynote Speech

Paul Morris Paul Morris
10:20 - 10:30

Keynote Speech

Nerses Yeritsyan Nerses Yeritsyan
10:30 - 10:40

Keynote Speech

Zaruhi Soghomonyan Zaruhi Soghomonyan
10:40 - 11:40

Panel Discussion - New Cyber Threat Landscape: Emerging Trends and Mitigation Tactics

Ramses Gallego Ramses Gallego
Michael Grafnetter Michael Grafnetter
Ryan Gandrud Ryan Gandrud
11:40 - 12:10

Coffee Break

Coffee Coffee
12:10 - 12:50

The Age of AI and Quantum Technologies: Are You Prepared?

Ramses Gallego Ramses Gallego
12:50 - 14:00

Lunch

LunchBreak LunchBreak
14:00 - 14:45

How to Ruin Your Security with a Printer (And How to Prevent It)

Michael Grafnetter Michael Grafnetter
14:45 - 15:30

Indistinguishable from Magic: Why Security Fails Silently

Adrian Sanabria Adrian Sanabria
15:30 - 16:00

Coffee Brake

Coffee Coffee
16:00 - 16:45

Starts with Fresh Analytics of Attacks on Armenia, then a Result-Driven Cybersecurity Approach

Alexey Lukatsky Alexey Lukatsky
16:45 - 17:30

NG SOAR: The Next Step in Expanding Incident Management

Pavel Liubomskii Pavel Liubomskii
17:30 - 18:00

From Risk to Resilience: PGI's DORA-driven Cyber Strategy and Networking opportunity

Kieran Griffin Kieran Griffin
08:30 - 09:30

Breakfast

Every good day starts with a good breakfast 🙂

GoodMorning GoodMorning
09:30 - 10:15

Fraud prevention on early stage. Technologies, use cases

Bragin Stanislav Bragin Stanislav
10:15 - 11:00

Beyond the Web: Comprehensive Protection of Infrastructure from DDoS Attacks

Edgar Mikayelyan Edgar Mikayelyan
11:00 - 11:30

Coffee Break

Coffee Coffee
11:30 - 12:15

Inside the Storm: The Evolving Landscape of DDoS Threats and Defense

Jürgen Morgenstern Jürgen Morgenstern
12:15 - 13:00

Securing Digital Identities - Building Resilience Against Phishing and Cyber Threats using Phishing Resistant Authentication

Using secure, and phishing-resistant MFA that prevents account takeovers and cyber breaches. Through real-world examples and practical insights, discover why top global enterprises and government organizations choose MFA to provide user data protection while simplifying the user experience.

Marcin Majchrzak Marcin Majchrzak
13:00 - 14:15

Lunch

LunchBreak LunchBreak
14:15 - 15:00

Interactive Cyber Incident Response Simulation

This will be a highly interactive, scenario-based workshop where participants take on defined roles within a simulated organization responding to a realistic cyber-attack. The session will be facilitated by a cyber expert who guides participants through the unfolding incident, prompting decision-making, communication, and coordination under pressure. The format encourages active participation, discussion, and reflection on real-world challenges in cyber crisis management

Kieran Griffin Kieran Griffin
15:00 - 15:30

Coffee Break

Coffee Coffee
15:30 - 16:15

If I don’t know you, how can I trust you?

Rami Kayyali Rami Kayyali
16:15 - 17:00

Vitaliya Demekhina

Vitaliya Demekhina Vitaliya Demekhina
17:00 - 17:30

SumUP

Ramses Gallego Ramses Gallego
10:30 - 11:30 2nd floor, Room# 215

Session 1

This workshop will present you the critical tasks performed by skilled attacker or pentester against Active Directory and its key components.

Michael Grafnetter Michael Grafnetter
11:30 - 12:00

Coffee Break

12:00 - 13:00 2nd floor, Room# 215

Session 2

Exploits are not the only way to get to the systems! We will go through the operating systems’ built-in problems and explore how they can be beneficial for hackers.

Michael Grafnetter Michael Grafnetter
13:00 - 14:00

Lunch

15:00 - 16:00 2nd floor, Room# 215

Session 3

One of the most important things to conduct a successful attack is to understand how the targets work. Afterwards everything is clear and the tool is just a matter of our need. The workshop covers all aspects of Active Directory identity security from the hacker’s mind perspective!

16:00 - 16:30

Coffee Brake

16:30 - 17:30 2nd floor, Room# 215

Session 4

Our goal is to show and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get into organization.

Michael Grafnetter Michael Grafnetter
08:30 - 09:50

Breakfast

Every good day starts with a good breakfast 🙂

GoodMorning GoodMorning
09:50 - 10:35

Lazarus activity in AM and worldwide

Ruben Muradyan Ruben Muradyan
10:35 - 11:20

Offensive cybersecurity in the age of AI

Martun Minasian Martun Minasian
11:20 - 11:50

Coffee Break

Coffee Coffee
11:55 - 12:45

Antifragility in cybersecurity: how to prepare for what cannot be predicted

Max Stupinskiy Max Stupinskiy
12:45 - 14:00

Lunch

LunchBreak LunchBreak
14:00 - 14:45

AI Security Vulnerability Trends

Erfan Fazeli Erfan Fazeli
14:45 - 15:20

Hackathons, Findings, and Fear: Why Bug Bounties Actually Work

Over the past five years, we’ve opened our systems to the external teams through bug bounty programs—on purpose. In this talk, I’ll share what we’ve learned from dozens of reported vulnerabilities, real-world statistics, and the unexpected patterns that emerged. You’ll hear about the types of issues we actually faced, why bug bounty hunters often outperform internal security teams, and how embracing external scrutiny made our systems more resilient. This is not a sales pitch—it’s a war diary for anyone curious (or nervous) about letting hackers in the front door.

Ruben Manukyan Ruben Manukyan
15:20 - 15:50

Coffee Brake

Coffee Coffee
15:50 - 16:30

Reverse Engineering DJI Systems: Drone, Software & Hardware

Hrant Tadevosyan Hrant Tadevosyan
16:30 - 16:45

CyberGEN 2025 Closing

Ramses Gallego Ramses Gallego
Komitas Stepanyan Komitas Stepanyan