PRAGUE, May 17-18, 2023
Registration
  • About
    • About Qubit Conference Prague
    • About Qubit Conference
    • Past events
      • Qubit Conference Prague 2022
      • Qubit Conference Prague 2021
      • Qubit Conference Prague 2020
      • Qubit Conference Prague 2019
      • Qubit Conference Prague 2018
      • Qubit Conference Prague 2017
      • Qubit Conference Prague 2016
      • Qubit Conference Prague 2015
  • Agenda
    • Call For Speakers Prague 2023
    • Qubit conference agenda 2023
    • Speakers
    • Pre-Conference Trainings
    • Speaking Bureau
    • CPE & ECE
  • Sponsors
    • Sponsors Prague 2023
    • Sponsors details
  • Venue
  • Contact us
  • About
    • About Qubit Conference Prague
    • About Qubit Conference
    • Past events
      • Qubit Conference Prague 2022
      • Qubit Conference Prague 2021
      • Qubit Conference Prague 2020
      • Qubit Conference Prague 2019
      • Qubit Conference Prague 2018
      • Qubit Conference Prague 2017
      • Qubit Conference Prague 2016
      • Qubit Conference Prague 2015
  • Agenda
    • Call For Speakers Prague 2023
    • Qubit conference agenda 2023
    • Speakers
    • Pre-Conference Trainings
    • Speaking Bureau
    • CPE & ECE
  • Sponsors
    • Sponsors Prague 2023
    • Sponsors details
  • Venue
  • Contact us
Qubit conference agenda 2023

Qubit conference agenda 2023

Learn and collaborate with the cybersecurity industry leaders

Qubit Conference Prague strives to bring the latest information to the cybersecurity community in CEE region.

EXECUTIVE TRACK
17 May 2023
 
Registration
 
Conference Opening

Ondrej Krehel, Digital forensics and cybersecurity professional, USA
Maria Krahulecova, CEO QuBit Security, Slovakia

Ondrej KrehelOndrej_Krehel_2022
 
Opening Keynote: Cyber reflections of lessons learned

Over two decades of offensive and digital forensics investigative engagements provide great learning and transforming lessons shared from Yankee land, Europe, scratching cyberwarfare in the Middle East, to nation state corporate espionage originated in Asia, while crossing Africa diamond trades ending in Switzerland.
Stories to be told that embrace human understanding of the digital universe dimension we are all plugged in.

Ondrej Krehel, Digital forensics and cybersecurity professional, USA

Ondrej KrehelOndrej_Krehel_2022
 
Using the power of AI in corporate environment

Lukas Okal, Security Lead | Security, Compliance & Identity | Microsoft Czech Republic and Slovakia

 
TBD
 
Coffee break
 
External Cyber Risk Reinvented

Organizations worldwide are targeted more than ever by external Cyber risks. The presentation deals with new tactics, techniques and protocols currently used by Cyber attackers, focusing on supply chain attacks, Cyber fraud, brand abuse and Cyber attacks on employees and executives.

Presentation flow: – Current trends in Cyber attacks against external (and less defended) entities in organizations’ Cyber ecosystem

Analysis of several use cases of attacks against supply chain & organizations’ customers, employees and executives

Key takeaways: – How to protect executives from Cyber attacks

Ways to protect remote workforce

Practical recommendations to prevent fraud, improve business continuity & reduce financial loss and damage to reputation

Ron FelerDizajn bez názvu (8)
 
TBD
 
Hacked on national television

In 2021, Swedish national TV aired a six-part TV series called “Hacked” where 4 professional hackers hacked into the private assets of normal people, celebrities, and companies. Linus was one of the 4 hackers and is going to talk about some of the most interesting hacks that were seen on-screen.

Linus Kvarnhammar, Principal Cyber Security Consultant, Syneptic AB, Sweden

Linus KvarnhammarLinus Kvarnhammar
 
Lunch
 
PANEL DISCUSSION

Forcepoint, BlueVoyant, Cloudflare

 
TBD
 
NIS 2 – an opportunity to increase cybersecurity importance

How the role of security has developed from an old fashion business blocker to a modern enabler? We will discuss key cyber security considerations for this year and demonstrate how a project for NIS 2 can look like and what organisations need to start doing now to ensure that they are compliant.

Tomas KudelkaTomas Kudelka
 
Coffee break
 
TBD
 
PANEL DISCUSSION

Financial and Geopolitical cyber challenges
Financial management and budgeting in recension era
– What needs to be addressed to C-Level and board on cyber breach preakness and potential cyber incident
– Geopolitical volatilities and their implication to enterprises – example Pegasus used to hack cellphones in middle east and the rest of the world, Ukraine attacked by criminal groups from Russia, and same threat actors attacking West for ransomware
Moderator: Ondrej Krehel, Digital forensics and cybersecurity professional, USA Panelists: Charles Tango, CISO, SYSCO, USA

Ondrej KrehelOndrej_Krehel_2022, Charles TangoCharlesTango
TECHNICAL TRACK
17 May 2023
 
Registration
 
Conference Opening

Ondrej Krehel, Digital forensics and cybersecurity professional, USA
Maria Krahulecova, CEO QuBit Security, Slovakia

Ondrej KrehelOndrej_Krehel_2022
 
Opening Keynote: Cyber reflections of lessons learned

Over two decades of offensive and digital forensics investigative engagements provide great learning and transforming lessons shared from Yankee land, Europe, scratching cyberwarfare in the Middle East, to nation state corporate espionage originated in Asia, while crossing Africa diamond trades ending in Switzerland.
Stories to be told that embrace human understanding of the digital universe dimension we are all plugged in.

Ondrej Krehel, Digital forensics and cybersecurity professional, USA

Ondrej KrehelOndrej_Krehel_2022
 
Using the power of AI in corporate environment

Lukas Okal, Security Lead | Security, Compliance & Identity | Microsoft Czech Republic and Slovakia

 
TBD
 
Coffee break
 
Building cyber resiliency - Detection via Active Cyber Defense and CTI

Our research aimed to determine whether active cyber defense can prevent successful cyber attacks. We investigated whether preparing for an attack using CTI or increasing the environment’s resilience through detection rules hardening can help eliminate the possibility of a successful attack.

Presentation flow: Introduction

ACD use for private sector

Starting point

Questions

Use-case

Research

ACD Loop

ACD RA

Deception usage

Testing

Detection rules Hardening

Results

+C1

Key takeaways: 1. Effectiveness of Active Cyber Defense in preventing successful cyber attacks.

Possibility of preparing for an attack with the help of CTI.

Importance of emulation and detection rules hardening.

Reasons: Our paper presents the current results of our research on detection rules hardening using our ACD Loop and using deception elements. This is to inform and extend our knowledge to the expert community.

As an owners of a critical information infrastructure element we have a lot of experience here.

Ondrej NekovarOndrej Nekovar
 
Are your secrets safe - How mobile applications are leaking millions of credentials

Secrets like API keys are constantly leaking, in your source code and even in your apps on the Google Play Store. This talk reveals how millions of secrets are leaking through public source code by mistake, and how nearly half of all apps on the Play Store contain extractable secrets.

Mackenzie JacksonMackenzie Jackson
 
Signature-based Detection using Network Timing

My presentation explores using timing between network transactions to identify malicious activity in network traffic captures.

Joshua Pyorre, Senior Security Researcher, Cisco Talos, USA

Josh PyorreJosh Pyorre
 
Lunch
 
PANEL DISCUSSION

Forcepoint, BlueVoyant, Cloudflare

 
Container images, sign em like it’s hot

In the ever-changing IT landscape where containerized applications running in a Kubernetes cluster are now the de facto standard, it is key to secure them properly to keep the malicious attackers out of the way. But can we keep the agility of DevOps without losing security controls in the SDLC?

Lars LefebvreLars Lefebvre
 
Coffee break
 
TBD
 
PANEL DISCUSSION

Financial and Geopolitical cyber challenges
Financial management and budgeting in recension era
– What needs to be addressed to C-Level and board on cyber breach preakness and potential cyber incident
– Geopolitical volatilities and their implication to enterprises – example Pegasus used to hack cellphones in middle east and the rest of the world, Ukraine attacked by criminal groups from Russia, and same threat actors attacking West for ransomware
Moderator: Ondrej Krehel, Digital forensics and cybersecurity professional, USA Panelists: Charles Tango, CISO, SYSCO, USA

Ondrej KrehelOndrej_Krehel_2022, Charles TangoCharlesTango
EXECUTIVE TRACK
18 May 2023
 
Registration
 
opening notes from organizer
 
Opening Keynote:
Paul J. VitchockPaul_Vitchock
 
TBD
 
Coffee break
 
AI

Lukas Hatala, Regional CTO, DXC Technology, Slovakia

 
TBD
 
Lunch
 
Cybersecurity professionals outage? Let's close the gap!

How to raise a number of women in cybersecurity and close the cybersecurity skill gap at the same time? The presentation will describe created concept of Women Security Academy with the details on how it helps women to get to cybersecurity fundamentals and find the job in entry level positions.

Marcela Zimova, Information Security Director, Piano Software, Slovakia

Marcela ZimovaMarcela Zimova
 
TBD
 
Coffee break
 
TBD
 
Closing keynote
 
Raffle
TECHNICAL TRACK
18 May 2023
 
Registration
 
opening notes from organizer
 
Opening Keynote:
Paul J. VitchockPaul_Vitchock
 
TBD
 
Coffee break
 
How to evaluate EDRs and not be fooled by vendor marketing

This session is built on my 2 years long research of EDRs and my experience with different EDR solutions during Red Teaming engagements. I will show you how EDRs work and how they don’t always cover all attack vectors as you expect.

Jan MarekJan_Marek
 
TBD
 
Lunch
 
How to consume 3rd parties and open source projects securely

Is it a secret, that all modern and especially tech-oriented firms actively reusing 3rd parties? Probably, no. I’d walk audience through the best tools and technics reflecting industry-leading practices to help IT or Dev teams to consum 3rd parties securely, not relying on “somebody else takes care”.

Roman Zhukov, Product Security Lead, Intel, Ireland

Roman ZhukovQubit Conference Prague 2021 Roman Zhukov
 
Practical BurpSuite automation with python

BurpSuite – although it’s a great tool it can miss vulnerabilities if you don’t know its limits. We’ll be looking how to programmatically change its behavior to fit the application that you’re pentesting. This is very useful in difficult pentesting scenarios or when pentesting web APIs.

Oliver BachtikOliver_Bachtik
 
Coffee break
 
Deconstructing the Malicious Bot Problem

Discover how advanced bad bots are threatening the internet and how they can be analyzed like malicious software to uncover detection strategies. This presentation covers bot types, their impact, ecosystem, and code protection.

Yohann SillamDizajn bez názvu (8)
 
Closing keynote
 
Raffle

Not registered yet? Registration is quick and easy.

Save your seat and enjoy 2-day cybersecurity community event in 17.-18.May

Register

QUBIT CONFERENCE
PRAGUE | 23

QuBit Security, s.r.o.
J. Kozáčeka 2, 960 01
Zvolen, Slovakia

info@qubitconference.com
+421 949 000 338

JOIN THE QUBIT COMMUNITY




SECURE PAYMENT
© 2013-2022 Qubit Conference, The Universe of Cyber Security - Privacy Policy - Privacy Policy in Slovak language - Terms & Conditions - Terms & Conditions in Slovak language - About cookies - O cookies