CONTENTS OF LECTURES 2021

 

 

How the military can enhance Cybersecurity by moving to the Cloud

Today, military analysts, together with the relevant infrastructure, around the world are struggling to cope with a constantly increasing amount of data, coming from almost everywhere. Moreover, the military environment itself adds an additional critical factor, that heavily affects the availability and integrity of data. Introducing and exploiting a “military-grade” cloud environment might provide the necessary flexibility, scalability, and fault tolerance which is needed in modern day operations. This can be achieved by the provision of alternate data routes, backup solutions, authentication mechanisms. Another exploit could be the allocation of resources where and when they are needed; for example, in order to quickly perform tasks that require increased processing power. Special provisions at the hook points can provide automatic recognition of bottlenecks or other issues, and act with little or no human intervention. In all, such a solution can enhance overall cybersecurity.

Sozon A. Leventopoulos
Intrasoft International S.A.
About Lecturer

Locking down an Oracle Database

This talk is an overview of the key steps involved in locking down an Oracle database. What can we do with the core features and what other tools are available. We look at how and why to lock down breaking the task into patching, hardening and actual data security. Locking down Oracle is not trivial as its a complex software and made more complex by virtue of each customer adding their own data model and application data and security. Join Pete for this whirlwind tour of securing Oracle.

Pete Finnigan
Pete Finnigan Ltd.
About Lecturer

M365 Security introduction

Microsoft Secure Score is a security analytics tool designed to help organizations understand what they have done to reduce the risk to their data and show them what they can do to further reduce that risk. Secure Score determines what Microsoft 365 services an organization is using, then looks at its configuration and behaviors and compares it to a baseline asserted by Microsoft. Rather than reacting or responding to security alerts, the Secure Score tool enables organizations to track and plan incremental improvements over a longer period of time.

Božidar Radosavljević
MCT and CEH trainer, MK IT Business Solutions
About Lecturer

Prediction for AI driven cyber security - Offensive and Defensive

Mane Piperevski
Piperevski & Associates
About Lecturer

Vuln Hunting Using Python AST

Application security engineers and vulnerability hunters often search code for specific strings or patterns as a starting point for vulnerability discovery. In this talk I aim to show how searching raw code can be improved upon by searching Python abstract syntax trees. We used such techniques at Bitstamp security team to help us discover codebase specific patterns which are otherwise hard to search for. These patterns can be used to improve SAST automation which you might already use in your CI/CD pipeline. I will opensource a simple proof of concept AST scanner for searching custom AST patterns with some code structure awareness.

David Petek
Bitstamp d.o.o.
About Lecturer

Whoever disappears has perhaps never existed

Nowadays a large portion of life takes place on the internet and it is estimated that around 4 billion users are active on social media.
Obtaining information on a specific target has never been easier and digital lives have a decisive influence on what happens in offline existence.
Privacy on the internet is in fact non-existent, users lose control of the information they disseminate more or less consciously and very often have to face the consequences for the rest of their days.
Can we regain our privacy? Can we erase our traces and completely disappear from the digital world?
In this talk we will explore the most common ways to collect information about the targets and, most importantly, how to protect yourself to the point of becoming a ghost on the internet.

Matteo Cuscusa
Cuscusa Web & Security
About Lecturer

 

CIO FORUM

 

2.-4.6.2021
Nova Gorica

Take advantage of a 30% discount, only valid until 18.4.2021

1 day
424€
297€
2 days
600€
420€
3 days
900€
630€

Take advantage of a 30% discount, only valid until 18.4.2021

1 conference day
424€
297€

The price applies to INFOSEK, GDPR (ZVOP-2) and CIO FORUM. The prices for NLP conference and workshops are fixed.

2 conference days
600€
420€

The price applies to INFOSEK, GDPR (ZVOP-2) and CIO FORUM. The prices for NLP conference and workshops are fixed.

3 conference days
900€
630€

The price applies to INFOSEK, GDPR (ZVOP-2) and CIO FORUM. The prices for NLP conference and workshops are fixed.

Platinum sponsors

Golden partner

Golden sponsors

Bronze sponsors

Technology sponsors

Media sponsors

Obveščamo vas, da so bili naši pogoji poslovanja posodobljeni.
Sprememba se nanaša na člen »Odpoved ali sprememba dogodka s strani organizatorja«. Zaradi nepredvidenih dogodkov, kot je tudi trenutna epidemija koronavirusa, si pridržujemo pravico, da posamezna izobraževanja odpovemo ali spremenimo termin oz. način izvedbe (online izvedba).

Odpoved ali sprememba dogodka s strani organizatorja
Organizator si pridržuje pravico do odpovedi posameznega izobraževanja, delavnice, dogodka, seminarja ali spremembe terminov oz. načina izvedbe (namesto osebne izvedbe dogodka, izvedba dogodka preko spleta ali na drug način, pri čemer se ključna vsebina in obseg dogodka ne spreminjata oziroma se prilagodita glede na spremembo, npr. zamenjava predavatelja, prilagoditev urnika ipd., vendar se ohrani enakovredna kakovost izvedenega dogodka). Zavezuje se k obvestilu prijavljenim najkasneje en delovni dan pred predvidenim pričetkom izobraževanja oz. takoj, ko prejme novico o morebitnih izrednih dogodkih, ki so razlog za spremembo/odpoved. V primeru odpovedi izobraževanja s strani organizatorja, organizator, morebitno že vplačano kotizacijo, brezobrestno povrne v roku štirinajstih dni od obvestila o odpovedi ali pa omogoči stranki, da kotizacijo porabi za druge izdelke ali storitve. V primeru spremembe načina izvedbe ostanejo plačila v veljavi, v primeru spremembe termina pa ima udeleženec možnost odpovedati udeležbo iz utemeljenih razlogov po določbi Odpoved s strani udeleženca ali pa se odjaviti na način v rokih, ki jih predvideva določba Odjava udeleženca. 

Celotni pogoji poslovanja so dostopni tukaj: https://poslovanje.pogoji.si/tos/29xyi0o

Ta spletna stran uporablja piškotke. Z obiskom in uporabo spletne strani soglašate s piškotki.  DOVOLIM Več informacij o piškotkih najdete in nastavitve tukaj.