14.5. 2024
Fantastični prostori, Ljubljana
750 €
Cene ne vsebujejo 22% DDV



Attacks on Blockchain in the Last Year

Over the past year, there have been a large number of attacks on crypto exchanges and various blockchain solutions, and the target was very often cross-chain bridges. Blockchain is more secure than other protocols/systems/applications, but… What happens when it is not implemented well, when there are vulnerabilities and when endpoints are not sufficiently secure as the technology itself? During the presentation, we will go through the various attack techniques that have most affected the blockchain network and see which protection measures are desirable to apply.

Luka Milinković
Petek, 14.04.2023
09:00 - 09:30
O predavatelju

Cloud Forensics investigations in Azure

When a security incident is detected on the Azure cloud platform, forensic investigators must examine the log data collected from various sources. If a virtual machine is found to be affected, it is important to take a snapshot of the OS disk of the VM for further investigation. This session discusses the forensic acquisition methodology of an Azure VM and discusses an assumed DFIR scenario to divide the whole process into multiple steps using different forensic tools.

Uroš Babić
NIS a.d. Novi Sad
Petek, 14.04.2023
10:00 - 10:30
O predavatelju

How my system got pwned: Lessons learned from CVE-2022-41352

In this, hopefully eye-opening lecture, we'll dive into how my system was compromised by exploiting CVE-2022-41352, a critical RCE that took me by surprise. I'll share my experience and how I learned
the hard way that "The cobbler's shoes are always the worst".
This incident reinforced the importance of taking layered security approach seriously and understanding that security is responsibility of the owner, even when using cloud services. Join me for an insightful
discussion on how to avoid making the same mistakes I did and keep your systems safe(r).

Tomislav Gotovac
CARNET – Croatian Academic and Research Network
Petek, 14.04.2023
09:30 - 10:00
O predavatelju

Insight into the ransomware incidents of 2022

Analysis on the ransomware incidents in Hungary of the past year, highlighting the different attack techniques. Presenting statistics and mitigation strategies of the sectors.

Vivien Léránt
National Cyber Security Center Hungary
Petek, 14.04.2023
12:30 - 13:00
O predavatelju

Kibernetsko varnostna mrežna arhitektura

"Kibernetsko varnostna mrežna arhitektura" je koncept, ki ga je predlagal Gartner kot smernice za gradnjo varne in zanesljive mrežne arhitekture. Ta koncept poudarja potrebo po celovitem pristopu k varnosti omrežij, ki vključuje tako tehnološke kot tudi organizacijske vidike. Pogledali si bomo, kako in zakaj bi te smernice želeli upoštevati.

Simon Kaučič
Četrtek, 13.04.2023
09:45 - 10:00
O predavatelju

Klasičen, najet ali hibriden?

Gorazd Rolih
Četrtek, 13.04.2023
09:30 - 09:45
O predavatelju

Microsoft 365: Attack simulation training

Božidar Radosavljević
Petek, 14.04.2023
12:00 - 12:30
O predavatelju

Modern Cyberwarfare - From watering hole to supply chain attacks

Presentation describes some of the most complex techniques used by threat actors to compromise even the most secured networks, as seen in the SolarWinds hack.

Andrei Bozeanu
Cybersecurity Researcher Dekeneas
Petek, 14.04.2023
11:00 - 11:30
O predavatelju

Post-quantum digital signature scheme using Verkle construction

In October 2019, Google made a controversial claim of achieving quantum supremacy. However, considering the race among tech giants to develop the first quantum computers, and their progress in doing so, the world may be on the cusp of a new era.
Google's current chip design could increase memory capacity from 100 to 1000 qubits, while IBM aims to build a quantum processor with over 1,000 qubits and between 10 to 50 logical qubits by the end of 2023.
In 2021, Chinese scientists announced the development of a new quantum computer that surpasses its predecessors in strength. As a result, they have taken the lead in the quantum computing race. The scientists claim that their 66-qubit quantum CPU, called "Zuchongzhi 2," completed the same task as Google's computer one million times faster. This CPU was created by a team of researchers from the Chinese Academy of Sciences Center for Excellence in Quantum Information and Quantum Physics, in collaboration with the Shanghai Institute of Technical Physics and the Shanghai Institute of Microsystem and Information Technology.
Quantum computers have the potential to break the cryptographic codes currently used to secure communications and financial transactions. Therefore, quantum-resistant cryptography should be adopted as the current digital signature systems are vulnerable to attacks from quantum computers. The security of current digital signature systems relies on the difficulty of calculating discrete logarithms and factoring large numbers. Although some cryptosystems, such as RSA with four thousand-bit keys, are resistant to attacks from classical computers, they are ineffective against attacks from quantum computers.
At INFOSEK 2023 Maksim Iavich will offer the model of the new post-quantum digital signature scheme using the novel technology - Verkle tree. The offered signature is much more efficient than the existing hash based digital signatures.

Maksim Iavich
Scientific Cyber Security Association - SCSA /Caucasus University
Petek, 14.04.2023
14:30 - 15:00
O predavatelju

Russian Hacktism Unmasked

Before the war in Ukraine if a large group of hackers would attack US financial systems, military suppliers, airports, or healthcare providers, this type of an event would be basis for a serious conflict and sanctions. Yet, over the past year these events became normal with little coverage and advice from law enforcement to brace for impact. We will examine who is behind the Russian Hacktivist collective and how it functions. Its targets and goals. Its weaknesses and strong points.

Alex Holden
Hold Security, LLC
Petek, 14.04.2023
15:00 - 15:30
O predavatelju

Security strategy development

  • What should be the initial strategy ideas?
  • What should be the expected output?
  • Major focuses
  • What? Why? How?
  • How to define requirements?
  • Action plans / projects
Aleksandar Mirković
Petek, 14.04.2023
13:30 - 14:00
O predavatelju

Stormshield, the European choice for cybersecurity!

Marko Kašič
Četrtek, 13.04.2023
09:15 - 09:30
O predavatelju

TIBER-EU, the shift is here

The shift is here. As the time for testing in cyber security is not frozen, we need to be knowledgeable for what’s next generation penetration testing services. In that context we welcome TIBER-EU (European framework for threat intelligence-based ethical red-teaming) as the first EU-wide guide on how authorities, entities and threat intelligence and red-team providers should work together to test and improve the cyber resilience of entities by carrying out a controlled cyberattack. We did some study and find a way for implementing this framework by identifying its pros and cons. Join us for fast shift track to get into new era of testing in cyber security.

Mane Piperevski
Piperevski & Associates
Petek, 14.04.2023
14:00 - 14:30
O predavatelju

Why EDR is not the ultimate cure for cyber security

In today's world and with the shortage of cyber security professionals, organizations are looking for the ultimate solution to defend against the threat actor. One of these frequently selected solutions is an EDR. It certainly has a significant impact on endpoint security, but it does not solve enterprise network security on a holistic level. In this talk, Jan will present the ways in which adversaries are evading various EDRs and thus still causing harm.

Jan Marek
Cyber Rangers
Petek, 14.04.2023
11:30 - 12:00
O predavatelju

Zero Trust Security

Neven Mitrović
Zscaler Germany GmbH & PERFORM IT d.o.o.
O predavatelju








Z vplačilom kotizacije za INFOSEK NETWORKING (750 € + DDV) prejmete VIP (brezplačno) vstopnico za konferenco INFOSEK 2024!


Cene ne vsebujejo 22% DDV



Generalni sponzor

Partner dogodka

Platinasti sponzorji

Zlati sponzorji

Bronasti sponzorji

Sponzorji tehnologije

Medijski sponzorji

Obveščamo vas, da so bili naši pogoji poslovanja posodobljeni.
Sprememba se nanaša na člen »Odpoved ali sprememba dogodka s strani organizatorja«. Zaradi nepredvidenih dogodkov, kot je tudi trenutna epidemija koronavirusa, si pridržujemo pravico, da posamezna izobraževanja odpovemo ali spremenimo termin oz. način izvedbe (online izvedba).

Odpoved ali sprememba dogodka s strani organizatorja
Organizator si pridržuje pravico do odpovedi posameznega izobraževanja, delavnice, dogodka, seminarja ali spremembe terminov oz. načina izvedbe (namesto osebne izvedbe dogodka, izvedba dogodka preko spleta ali na drug način, pri čemer se ključna vsebina in obseg dogodka ne spreminjata oziroma se prilagodita glede na spremembo, npr. zamenjava predavatelja, prilagoditev urnika ipd., vendar se ohrani enakovredna kakovost izvedenega dogodka). Zavezuje se k obvestilu prijavljenim najkasneje en delovni dan pred predvidenim pričetkom izobraževanja oz. takoj, ko prejme novico o morebitnih izrednih dogodkih, ki so razlog za spremembo/odpoved. V primeru odpovedi izobraževanja s strani organizatorja, organizator, morebitno že vplačano kotizacijo, brezobrestno povrne v roku štirinajstih dni od obvestila o odpovedi ali pa omogoči stranki, da kotizacijo porabi za druge izdelke ali storitve. V primeru spremembe načina izvedbe ostanejo plačila v veljavi, v primeru spremembe termina pa ima udeleženec možnost odpovedati udeležbo iz utemeljenih razlogov po določbi Odpoved s strani udeleženca ali pa se odjaviti na način v rokih, ki jih predvideva določba Odjava udeleženca. 

Celotni pogoji poslovanja so dostopni tukaj: https://poslovanje.pogoji.si/tos/29xyi0o

Ta spletna stran uporablja piškotke. Z obiskom in uporabo spletne strani soglašate s piškotki.  DOVOLIM Več informacij o piškotkih najdete in nastavitve tukaj.