Learn and collaborate with the cybersecurity industry leaders
Qubit Conference Prague strives to bring the latest information to the cybersecurity community in CEE region.
Over two decades of offensive and digital forensics investigative engagements provide great learning and transforming lessons shared from Yankee land, Europe, scratching cyber warfare in the Middle East, to nation-state corporate espionage originated in Asia while crossing Africa diamond trades ending in Switzerland. Stories to be told that embrace a human understanding of the digital universe dimension we are all plugged in.
Azure OpenAI service provides a platform for building AI models and deploying them at scale. ChatGPT is a conversational AI model that can be used to automate customer support, HR services, and other internal corporate tasks. By using ChatGPT, companies can reduce the workload of their employees and improve their productivity.
AI can also help security by detecting and preventing cyber-attacks. With the help of machine learning algorithms, AI can analyse large amounts of data to identify patterns that indicate a potential attack. This can help companies detect and prevent attacks before they cause any damage.
The advantages of using AI as an internal corporate tool are numerous. AI can automate repetitive tasks, freeing up employees to focus on more important work. It can also improve efficiency by providing real-time insights into business operations. Additionally, AI can help companies make better decisions by providing data-driven insights.
In summary, using ChatGPT and AI as internal corporate tools with Azure OpenAI service can help companies improve productivity, efficiency, and automation. AI can also help security by detecting and preventing cyber-attacks. The advantages of using AI as an internal corporate tool are numerous, including automation of repetitive tasks, improved efficiency, and data-driven insights.
New business models needs also a new way of Cyber threats protection. SASE and Secure Service Edge is the right answer. Organizations can easily consume Security as a service for their remote workers or branches, choose the type and deepness of protection, and also built end-to-end security for any application and any location – cloud or private DC.
Organizations worldwide are targeted more than ever by external Cyber risks. The presentation deals with new tactics, techniques, and protocols currently used by Cyber attackers, focusing on supply chain attacks, Cyber fraud, brand abuse, and Cyber attacks on employees and executives.
In cybersecurity, we all tend to focus on those covetable “best practices.” But what’s on the other side? What kinds of bad practices do we see in our customer base (or the industry)? What kinds of risks are associated with these bad practices? What’s behind these bad practices? Why are they the problem that they are?
How the role of security has developed from an old fashion business blocker to a modern enabler? We will discuss key cyber security considerations for this year and demonstrate what a project for NIS 2 can look like and what organizations need to start doing now to ensure that they are compliant.
Within the security community, psychological research has traditionally been directed towards attackers. However, it is useful to understand how personality traits influence the functioning of security professionals, too. Since attackers and defenders both engage in an antagonistic partnership, taking different perspective while tackling the same sets of challenges, they influence each other significantly. Security defenders develop counter-offensive strategies and attempt to anticipate new threats. Attackers, on the other hand, seek weaknesses and blind spots in defence strategies of their counterparts. What are these possible blind spots and underlying tendencies which might be exploited, if deciphered, by adversaries?
Financial management and budgeting in the recension era
– What needs to be addressed to C-Level and board on cyber breach preakness and potential cyber incident
– Geopolitical volatilities and their implication to enterprises – for example, Pegasus used to hack cellphones in the middle east and the rest of the world, Ukraine was attacked by criminal groups from Russia, and the same threat actors attacked the West for ransomware
Over two decades of offensive and digital forensics investigative engagements provide great learning and transforming lessons shared from Yankee land, Europe, scratching cyber warfare in the Middle East, to nation-state corporate espionage originated in Asia while crossing Africa diamond trades ending in Switzerland. Stories to be told that embrace a human understanding of the digital universe dimension we are all plugged in.
Azure OpenAI service provides a platform for building AI models and deploying them at scale. ChatGPT is a conversational AI model that can be used to automate customer support, HR services, and other internal corporate tasks. By using ChatGPT, companies can reduce the workload of their employees and improve their productivity.
AI can also help security by detecting and preventing cyber-attacks. With the help of machine learning algorithms, AI can analyse large amounts of data to identify patterns that indicate a potential attack. This can help companies detect and prevent attacks before they cause any damage.
The advantages of using AI as an internal corporate tool are numerous. AI can automate repetitive tasks, freeing up employees to focus on more important work. It can also improve efficiency by providing real-time insights into business operations. Additionally, AI can help companies make better decisions by providing data-driven insights.
In summary, using ChatGPT and AI as internal corporate tools with Azure OpenAI service can help companies improve productivity, efficiency, and automation. AI can also help security by detecting and preventing cyber-attacks. The advantages of using AI as an internal corporate tool are numerous, including automation of repetitive tasks, improved efficiency, and data-driven insights.
New business models needs also a new way of Cyber threats protection. SASE and Secure Service Edge is the right answer. Organizations can easily consume Security as a service for their remote workers or branches, choose the type and deepness of protection, and also built end-to-end security for any application and any location – cloud or private DC.
Our research aimed to determine whether the active cyber defense can prevent successful cyber attacks. We investigated whether preparing for an attack using CTI or increasing the environment’s resilience through detection rules hardening can help eliminate the possibility of a successful attack.
In cybersecurity, we all tend to focus on those covetable “best practices.” But what’s on the other side? What kinds of bad practices do we see in our customer base (or the industry)? What kinds of risks are associated with these bad practices? What’s behind these bad practices? Why are they the problem that they are?
In the ever-changing IT landscape where containerized applications running in a Kubernetes cluster are now the de facto standard, it is key to secure them properly to keep malicious attackers out of the way. But can we keep the agility of DevOps without losing security controls in the SDLC?
This session is built on my 2 years long research of EDRs and my experience with different EDR solutions during Red Teaming engagements. I will show you how EDRs work and how they don’t always cover all attack vectors as you expect.
Financial management and budgeting in the recension era
– What needs to be addressed to C-Level and board on cyber breach preakness and potential cyber incident
– Geopolitical volatilities and their implication to enterprises – for example, Pegasus used to hack cellphones in the middle east and the rest of the world, Ukraine was attacked by criminal groups from Russia, and the same threat actors attacked the West for ransomware
Although the new legislation and cybersecurity methodologies do not address the relationship between cybersecurity, corporate governance, and compliance always sufficiently, cybersecurity is necessarily the “next big thing” also for legal and compliance teams in organizations. Without both internal and External lawyers and compliance officers, risks cannot be properly identified and evaluated, they will be needed to set up proper and robust processes and records, and it will often not be possible to set up adequate rules to protect the organization through organizational and technical measures without an adequate legal framework for them.
The human factor remains the most persistent attack vector for cybercriminals. In this talk, we will explore the current best practices in cybersecurity awareness training to effectively prepare your employees without overburdening them.
In this session, we will discuss the history and evolution of threats to Operational Technology, their past, present, and future. Learn how Industrial Control Systems, connected devices, and even medical technology have become progressively more attractive to threat actors.
In 2021, Swedish national TV aired a six-part TV series called “Hacked” where 4 professional hackers hacked into the private assets of normal people, celebrities, and companies. Linus was one of the 4 hackers and is going to talk about some of the most interesting hacks that were seen on-screen.
The presentation will explain the difference between metrics and KPIs and identify the essential data points to be captured and compared in your next Red Team Test. The content is devoid of commercial content.
How to raise the number of women in cybersecurity and close the cybersecurity skill gap at the same time? The presentation will describe the created concept of the Women Security Academy with the details on how it helps women to get to cybersecurity fundamentals and find the job in entry-level positions.
AI is an emerging technology trend, but there are no trends coming from a vacuum. Current AI hype is a consequence of technology, Social, and Economic pressures converging into the so-called 5th Industrial Revolution or Singularity.
Let’s discuss what is behind this:
– Why is technology trend emerging now and what is behind
– Why there are so deep social implications
– How it may shape our not-so-distant future
My presentation explores using timing between network transactions to identify malicious activity in network traffic captures.
No matter where you are on your software supply chain security journey, one thing is clear. Security is everyone’s responsibility and it starts from the development environment all the way to the runtime. In this session, you will learn how Google Cloud thinks about end-to-end secure software delivery.
Secrets like API keys are constantly leaking, in your source code and even in your apps on the Google Play Store. This talk reveals how millions of secrets are leaking through public source code by mistake, and how nearly half of all apps on the Play Store contain extractable secrets.
Discover how advanced bad bots are threatening the internet and how they can be analyzed like malicious software to uncover detection strategies. This presentation covers bot types, their impact, ecosystem, and code protection.
BurpSuite – although it’s a great tool it can miss vulnerabilities if you don’t know its limits. We’ll be looking at how to programmatically change its behavior to fit the application that you’re pentesting. This is very useful in difficult pentesting scenarios or when pentesting web APIs.
Is it a secret, that all modern and especially tech-oriented firms actively reuse 3rd parties? Probably, no. I’d walk the audience through the best tools and technics reflecting industry-leading practices to help IT or Dev teams to consume 3rd parties securely, not relying on “somebody else takes care”
AI is an emerging technology trend, but there are no trends coming from a vacuum. Current AI hype is a consequence of technology, Social, and Economic pressures converging into the so-called 5th Industrial Revolution or Singularity.
Let’s discuss what is behind this:
– Why is technology trend emerging now and what is behind
– Why there are so deep social implications
– How it may shape our not-so-distant future