Panel Discussion - New Cyber Threat Landscape: Emerging Trends and Mitigation Tactics
In Progress
Beyond the Web: Comprehensive Protection of Infrastructure from DDoS Attacks
Inside the Storm: The Evolving Landscape of DDoS Threats and Defense
TBC
TBC
TBC
Session 1
This workshop will present you the critical tasks performed by skilled attacker or pentester against Active Directory and its key components.
Coffee Break
Session 2
Exploits are not the only way to get to the systems! We will go through the operating systems’ built-in problems and explore how they can be beneficial for hackers.
Lunch
Session 3
One of the most important things to conduct a successful attack is to understand how the targets work. Afterwards everything is clear and the tool is just a matter of our need. The workshop covers all aspects of Active Directory identity security from the hacker’s mind perspective!
Coffee Brake
Hackathons, Findings, and Fear: Why Bug Bounties Actually Work
Over the past five years, we’ve opened our systems to the external teams through bug bounty programs—on purpose. In this talk, I’ll share what we’ve learned from dozens of reported vulnerabilities, real-world statistics, and the unexpected patterns that emerged. You’ll hear about the types of issues we actually faced, why bug bounty hunters often outperform internal security teams, and how embracing external scrutiny made our systems more resilient. This is not a sales pitch—it’s a war diary for anyone curious (or nervous) about letting hackers in the front door.