<We_can_help/>

What are you looking for?

08:30 - 10:00

Breakfast

Every good day starts with a good breakfast 🙂

GoodMorning GoodMorning
10:00 - 10:10

Keynote Speech

Armen Nurbekyan Armen Nurbekyan
10:10 - 10:20

Keynote Speech

Nerses Yeritsyan Nerses Yeritsyan
10:20 - 10:30

Keynote Speech

Zaruhi Soghomonyan Zaruhi Soghomonyan
10:30 - 11:40

Panel Discussion - New Cyber Threat Landscape: Emerging Trends and Mitigation Tactics

Ramses Gallego Ramses Gallego
11:40 - 12:10

Coffee Break

Coffee Coffee
12:10 - 12:50

The Age of AI and Quantum Technologies: Are You Prepared?

Ramses Gallego Ramses Gallego
12:50 - 14:00

Lunch

LunchBreak LunchBreak
14:00 - 14:50

Threat Intelligence, current state of Ransomware ecosystem

Paul Caiazzo Paul Caiazzo
14:50 - 15:40

Indistinguishable from Magic: Why Security Fails Silently

Adrian Sanabria Adrian Sanabria
15:40 - 16:15

Coffee Brake

Coffee Coffee
16:15 - 17:00

In Progress

17:00 - 17:15

Summary of the First Day

Ramses Gallego Ramses Gallego
08:30 - 09:30

Breakfast

Every good day starts with a good breakfast 🙂

GoodMorning GoodMorning
09:30 - 10:15

Advanced Active Directory Attacks & Mitigations

Michael Grafnetter Michael Grafnetter
10:15 - 11:00

Beyond the Web: Comprehensive Protection of Infrastructure from DDoS Attacks

Edgar Mikayelyan Edgar Mikayelyan
11:00 - 11:30

Coffee Break

Coffee Coffee
11:30 - 12:15

Inside the Storm: The Evolving Landscape of DDoS Threats and Defense

Jürgen Morgenstern Jürgen Morgenstern
12:15 - 13:00

AI Security Vulnerability Trends

Erfan Fazeli Erfan Fazeli
13:00 - 14:15

Lunch

LunchBreak LunchBreak
14:15 - 15:00

TBC

15:00 - 15:30

Coffee Break

Coffee Coffee
15:30 - 16:15

TBC

16:15 - 17:00

TBC

10:30 - 11:30 2nd floor, Room# 201

Session 1

This workshop will present you the critical tasks performed by skilled attacker or pentester against Active Directory and its key components.

Michael Grafnetter Michael Grafnetter
11:30 - 12:00

Coffee Break

12:00 - 13:00 2nd floor, Room# 201

Session 2

Exploits are not the only way to get to the systems! We will go through the operating systems’ built-in problems and explore how they can be beneficial for hackers.

Michael Grafnetter Michael Grafnetter
13:00 - 14:00

Lunch

15:00 - 16:00 2nd floor, Room# 201

Session 3

One of the most important things to conduct a successful attack is to understand how the targets work. Afterwards everything is clear and the tool is just a matter of our need. The workshop covers all aspects of Active Directory identity security from the hacker’s mind perspective!

16:00 - 16:30

Coffee Brake

16:30 - 17:30 2nd floor, Room# 201

Session 4

Our goal is to show and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get into organization.

Michael Grafnetter Michael Grafnetter
08:30 - 09:30

Breakfast

Every good day starts with a good breakfast 🙂

GoodMorning GoodMorning
09:30 - 10:20

Lazarus activity in AM and worldwide

Ruben Muradyan Ruben Muradyan
10:30 - 11:20

Offensive cybersecurity in the age of AI

Martun Minasian Martun Minasian
11:30 - 12:00

Coffee Break

Coffee Coffee
12:00 - 12:45

Hackathons, Findings, and Fear: Why Bug Bounties Actually Work

Over the past five years, we’ve opened our systems to the external teams through bug bounty programs—on purpose. In this talk, I’ll share what we’ve learned from dozens of reported vulnerabilities, real-world statistics, and the unexpected patterns that emerged. You’ll hear about the types of issues we actually faced, why bug bounty hunters often outperform internal security teams, and how embracing external scrutiny made our systems more resilient. This is not a sales pitch—it’s a war diary for anyone curious (or nervous) about letting hackers in the front door.

Ruben Manukyan Ruben Manukyan
12:45 - 14:00

Lunch

LunchBreak LunchBreak
14:00 - 14:45

Antifragility in cybersecurity: how to prepare for what cannot be predicted

Max Stupinskiy Max Stupinskiy
15:00 - 16:00

In Progress

16:00 - 17:00

In Progress