Agenda

09:00

Oficial opening of the conference - Marek Zagórski, Minister of Digital Affairs; Krzysztof Silicki, Director of NASK

09:00 - 09:20

Artificial intelligence and machine learning in the context of cyber security challenges


09:20-10:05 / Galaxy I/II/III

Aleksandra Przegalińska

Kozminski University, Massachusetts Institute of Technology

PL

Trust will win


10:05-10:35 / Galaxy I/II/III

Sophie Batas

HUAWEI

EN

What should your applications be afraid of?


10:35-10:55 / Galaxy I/II/III

Mariusz Sawczuk

F5

PL

Materiały

Future Proofing Security Operations


10:55-11:15 / Galaxy I/II/III

Martin Ohl

McAfee

EN

Materiały

Coffee break

11:15 - 11:30

11:30

Introduction to the debate


11:30-12:00 / Galaxy I/II

Krzysztof Silicki

NASK

PL

Detect & Respond to IoT Botnets as an ISP


11:30-12:10 / Galaxy III

Christoph Giese, Manuel Kamp,

Telekom AG, Telekom Security,

Debate - National cyber security system - challenges, problems, practical solutions


12:00-12:50 / Galaxy I/II

PL

Threat monitoring on the country level and beyond


12:10-12:50 / Galaxy III

Paweł Pawliński

CERT Polska - NASK

PL

12:50

Lunch

12:50 - 01:50

Fishing the Phishers: a Hunters Handbook


01:50-14:35 / Galaxy I

Adam Lange

PL

Under the Hood - The Automotive Challenge


01:50-02:35 / Galaxy II

Inbar Raz

EN

Informational supermutant


01:50-02:35 / Galaxy III

Marcin Napiórkowski

PL

02:35

Differences in approach to IT and OT network protection


02:35-03:20 / Galaxy I

Will Stefan Roth

Nozomi Networks

EN

Smart car forensics and sensor warfare


02:35-03:20 / Galaxy II

Stefan Tanase, Gabriel Cirlig ,

IXIA, IXIA,

EN

Materiały

Disinformation as an element of shaping the information enviroment and influence on decision-making process of groups and individuals


02:35-03:20 / Galaxy III

Kamil Basaj

Cybersecurity Foundation

PL

Coffee break

03:20 - 03:40

03:40

LOG management - does it have to be expensive and complicated?


03:40-04:25 / Galaxy I

Miroslav Knapovsky

LOGmanager

EN

Everything you want to know about Reconnaissance


03:40-04:25 / Galaxy II

Abhijeth Dugginapeddi

EN

Taming the beast: The question of AI control and its discontents


03:40-04:25 / Galaxy III

Filip Konopczyński, Urszula Rybicka,

NASK, NASK,

PL

04:25

XSS - why is it noteworthy?


04:25-05:10 / Galaxy I

Michał Bentkowski

Securitum

PL

Hunting for Android Malware


04:25-05:10 / Galaxy II

Fernando Diaz

VirusTotal

EN

Web attacks are not only OWASP Top 10


04:25-05:10 / Galaxy III

Mariusz Sawczuk

F5

PL

05:10

I will click it anyway, dear IT!


05:10-05:55 / Galaxy I

Piotr Konieczny

Niebezpiecznik.pl

PL

Code never lies: Investigating code-reuse in Olympic Destroyer


05:10-05:55 / Galaxy II

Stefano Ortolani

Lastline

EN

National Cybersecurity Platform


05:10-05:55 / Galaxy III

Krzysztof Biniek

NASK

PL

08:00

Evening meeting - The View, Twarda 18, Warsaw

-

09:15

Opening of the second day of the conference

09:15 - 09:20

Today Digital Security challenges


09:20-10:05 / Galaxy I/II/III

Jean-Baptiste Demaison

ANSSI

EN

Personal Perspective on a Security Innovation Ecosystem


10:05-10:50 / Galaxy I/II/III

Yaron Wolfsthal

IBM Security Center of Excellence

EN

The king is naked, that is about mobile safety


10:50-11:10 / Galaxy I/II/III

Kamil Grondys

Samsung Research Polska

PL

Coffee break

11:10 - 11:30

11:30

Lightning Talks

11:30 - 12:15

Using Deep Web Scan services to search for potentially critical customer information


12:15-12:35 / Galaxy I, II, III

Aleksander Łapiński

Check Point Software Technologies

PL

Cybersecurity in the Era of Digital Transformation


12:35-12:55 / Galaxy I, II, III

Mariusz Baczyński

Zscaler

PL

Lunch

12:55 - 01:55

01:55

Cyberdyne: Automatic Bug Finding At Scale


01:55-02:40 / Galaxy I

Peter Goodman

Trail of Bits

PL

Observations of malicious activities in a network telescope – from DoS detection to fingerprinting of botnets


01:55-02:40 / Galaxy II

Piotr Bazydło

NASK

PL

Cybersecurity Awareness Sans Frontières


01:55-02:40 / Galaxy III

Przemek Jaroszewski, Zoriana Dmytryshyna,

CERT Polska, APWG.EU,

EN

02:40

Malware + Machine Learning (ML) - does it make sense?


02:40-03:25 / Galaxy I

Kamil Frankowicz

CERT Polska - NASK

PL

Honeycomb - a repository of honeypot services and integrations for the information security


02:40-03:25 / Galaxy II

Imri Goldberg, Omer Cohen,

Cymmetria, Demisto,

EN

Boys from the GRU: How Russian State Cyber Operators Use False Hacktivist Personas


02:40-03:25 / Galaxy III

Christy Quinn

Accenture Security iDefense

EN

Coffee break

03:25 - 03:45

03:45

ICS cybersecurity is a challenge for organization, i.e. what the industry has to defend against


03:45-04:30 / Galaxy I

Jarosław Sordyl

CERT PSE

PL

How to make a CTF and survive, i.e. providing hacker competitions from admin's perspective


03:45-04:30 / Galaxy II

Michał Leszczyński

CERT Polska - NASK

PL

Selected aspects of conducting criminal proceedings in cybercrime cases


03:45-04:30 / Galaxy III

Agnieszka Gryszczyńska

Regional Public Prosecutor's Office in Warsaw

PL

04:30

I behaved like a dumb - users in the face of attacks


04:30-05:15 / Galaxy I

Adam Haertle

Zaufana Trzecia Strona

EN

Red Team Exercise in practice - tips and tricks how to successfully implement an attack simulation project


04:30-05:15 / Galaxy II

Przemysław Kępa

ING Bank

EN

Cybercompliance in practice


04:30-05:15 / Galaxy III

Wojciech Dziomdziora

Kancelaria Domański Zakrzewski Palinka

PL

05:15

End of the conference - Prize drawing

05:15 - 05:45

Partners

Honorary Patronage

Main Partner

Special Partner

Media Partners

The conference is supported by