To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
09:00
09:00
30min
Reception
FRI
09:30
09:30
30min
Welcome Speech
FRI
10:00
10:00
30min
Linux automation and hardening
Gašper Spagnolo

This talk will cover Linux automation with Ansible and dive into Linux hardening, focusing on kernel options, SSH, user management and services. The session aims to equip participants with practical knowledge on automating and securing Linux environments efficiently.

FRI
10:35
10:35
30min
How hard is operational security?
David Modic

I would like to talk about misconceptions when it comes to OPSEC and why OnlyFans models should really know a bit about why it is not smart to pose naked with personally identifiable information showing.

FRI
11:10
11:10
30min
Containers: A peek under the hood
Aleš Brelih

This presentation covers the basics of container technology, including namespaces, control groups, chroot, and capabilities, and outlines their role in container security. It briefly touches on how misconfigurations can lead to security vulnerabilities that we can avoid. This presentation will be demo heavy.

FRI
11:45
11:45
30min
Synergy: From individual knowledge to community power
Andraž Sraka

A short lecture intended for high school students and junior college students on integration, synergy between individuals and communities, here and abroad.

FRI
12:20
12:20
30min
Incident Responses in Slovenia
Gregor Spagnolo

In the realm of cybersecurity, the first response to a security incident is critical for containment and recovery. Quick and efficient handling can significantly reduce potential damage and downtime. This presentation will highlight key strategies for responding to security incidents and how they were handled.

FRI
12:55
12:55
30min
(Threat) hunting season
Žiga Humar

The experiences of some recent cyber attacks in our country have shown that cybercriminals can be infltrated in networks for a very long time before we detect them. Most often, we detect them when it's already too late – when they have already exposed our data and/or when it is encrypted and they demand high ransom. Through the talk, we will look at how we can establish an environment for simulating attacks and how, we can use SIEM, to find the indicators that suggest activities that can be attributed to cybercriminals.

FRI
13:30
13:30
30min
Overview of the Data Diode Concept in Theory and Practice
Luka Manojlović

In this presentation, we will explore the operation of data diodes, their fundamental characteristics, and through a practical example, examine the functioning of a DIY data diode using optical converters. We'll delve into how these devices, designed to allow data transmission in only one direction, enhance security in sensitive information environments. By understanding the principles behind data diodes and witnessing a hands-on example of constructing one, attendees will gain valuable insights into their potential applications and how they can be integrated into broader cybersecurity strategies.

FRI
14:00
14:00
60min
Lunch
FRI
15:00
15:00
240min
CTF
FRI
19:15
19:15
30min
Awards Ceremony
FRI