CONTENTS OF LECTURES 2022
Create Onion Layers of Security around your data
My area of expertise is securing data in an Oracle database but the same ideas can transcend any database or type of data store. In my world we are securing Oracle BUT actually we are securing data held inside Oracle. We do not secure Oracle; we secure data. I will cover all the main areas to focus on in this talk; where is the data we want to protect, user access controls, data access controls, database access controls, patching, hardening and also context based security and adaptive security and audit trails. These ideas can be used on any data store; a file, a database, Oracle, SQL Server, ...

Demystifying Zero Trust
"Never trust, always verify" is the core principle of the Zero Trust Model, a rising trend in the world of IT security. With more and more people working remotely, there's a growing need to adapt to the complexity of the new hybrid workplace and to protect the people, devices, and apps, wherever they're located. However, not all people and organizations are ready for the digital transformation and management complexity that "perimeterless" security might require.
Verifying everything explicitly (users, apps, devices), using a least-privilege access model, defining the proper context for policy compliance and device health, and applying an assume breach approach are all essential parts of the process. Join this session to find out everything about how Zero Trust architectures are designed to work, and how implementing (or not implementing) ZT might impact you and your organization.

Dobre prakse korporativnega upravljanja z informacijsko varnostjo
ECM|BPM platforma naslednje generacije za varno digitalno transformacijo vašega biznisa
Na primeru ECM|BPM platforme ARIGAMIX bomo obravnavali možnosti izgradnje varne in fleksibilne arhitekture za upravljanje digitalnih procesov in dokumentov v podjetju. Pogovorili se bomo o sodobnih funkcionalnih možnostih za integrirano upravljanje vsebin podjetja (IDM), modeliranje, avtomatizacijo in spremljanje poslovnih procesov, interakcijo z drugimi korporacijskimi IT sistemi podjetja z uporabo Low-code orodij. Razpravljali bomo o pomembnosti uvedbe tovrstnih platform pri uporabi geografsko porazdeljenih informacijskih sistemov.

How to detect and prevent hackers in your network?

Latest cyber attack trends in Hungary
The accelerated digitalization of the organizations and the rise of remote working created new targets for cyber attacks. In addition to the security awareness of the users, it is extremely important to shield up the organizations as well, they must be prepared to respond to a destructive cyber attack. As an expert from the National Cyber Security Center of Hungary, Vivien will introduce the daily work of the Computer Security Incident Response Team and highlight the latest trends and challenges regarding cyber attacks in Hungary.

Power Platform Security and Governance
We will walk through Security and Governance strategies that can be used to secure your Power Platform environments.
The topics in this presentation include:
- Environments
- Data Loss Prevention policies
- Environment vs Tenant-wide DLP policies
- Dealing with exceptions
- HTTP Triggers and Actions
- Custom Connectors - Using Azure AD Groups to simplify environment access, deployments, licensing.

Router Vulnerabilities in the Past, Present and Future
Routers are considered easy to hack, and that's kind of true. But is that much harder to hack a home router than a very expensive enterprise firewall? Think twice before answering!
The purpose of this talk is to demonstrate the similarities in inner workings, technology, hardware and vulnerability density between every piece of network equipment, be it for home or enterprise.
We will walk through specific examples of vulnerabilities found in these equipments in the past and present. Vulnerability patterns will be identified, and we will discuss why they keep occuring and what circumstances led to them appearing in the first place.
Finally, we will discuss future trends for vulnerabilities in network equipment. And because it can't all be negative, we will also discuss how the constant hardening of these devices will make exploitation much harder (but far from impossible :) in the future.
Securing your GitHub Org
GitHub holds one of the main assets for many tech companies out there: The source code to their main products and, in the time of GitOps, also potentially their infrastructure. We will present a threat model for GitHub-based organizations which we used to determine relevant hardening steps and processes. To stay true to the subject, we will also start to outline how you can use GitHub functionality to ensure a continuously high security level of your GitHub org.


The Power of Phishing Attack 2.0
During the presentation Luka will talk about the constant problems of phishing attacks, and how trivial and ridiculous a phishing attack is sometimes, and sometimes powerful when used in the right way, and there is no advanced protection in the company. We will see what current phishing campaigns are and go through some examples from practice. We will also highlight some measures and steps, which are very important for successfully avoiding phishing attacks or early detection.

CIO FORUM
Nova Gorica