Aleš Brelih

A security engineer at 3fs and a self-taught developer who loves breaking things just to figure out how to secure them again.

I've also been a part of Locked Shields, the biggest live-fire cyber defense exercise.

When I’m not staring into my monitor, I’m busy being a proud parent (which comes with its own set of security challenges).

  • Breaking the Box: A Practical Guide to Container Security
Danijela Šantak

Danijela is a business company leader with 15 years of experience in the technology sector, specializing in strategic growth, operational excellence, and innovation. She is a former CEO of a successful IT hardware company, where she was in charge of market expansion, operations optimisation, and business growth strategies. Currently she is serving as Business Director in cybersecurity industry, driving strategic initiatives, business development, and organizational performance to position the company as a market leader, with the effort to be educated and having a good insight with the field of expertise.
For the purpose of being competent, she obtained the eJPT certification and lately acquired the CRTP certification in Cybersecurity.

  • PXE Hacking 101: From Network Boot to Credential Extraction
David Modic

Dr David Modic is an assistant professor, Director of Studies, and PI for various defence projects. David teaches INFOSEC and his main interest are human attack vectors. He is an EU-registered expert and an EDF reviewer, specialising in Information Security, Cyber Warfare, the psychology of security, and the ethics of intelligent systems.

Dr. Modic holds national and EU security clearance up to SECRET and is affiliated with Cambridge University, where he is a Senior Non-Residential Member of King's College and a former research associate at the Computer Laboratory. At Cambridge, he was also the former CamCERT Social Engineering Special Advisor.
He consults governments and organisations on cybercrime and security, in Brazil, Estonia, Lithuania, Slovenia, the UK, and various businesses.

  • Rethinking Human Vulnerabilities in Cybersecurity
Foobar

Open source advocate and contributor, usually related to security.

  • Reproducible builds and why they matter
Marko Ličina

I'm an experienced IT professional at 1811Solutions with a background in both technical and sales roles. For the past seven years, I’ve specialized in corporate cybersecurity and now work independently as a consultant, while staying current with broader IT trends.
Because I sell my knowledge, I invest heavily in continuous learning and hold several cybersecurity certifications, including TCM Practical OSINT Research Professional (PJOR), Certified Ethical Hacker (CEH) Master, NIST Cybersecurity Consultant, CompTIA PenTest+, Security+, CySA+, as well as Microsoft certifications (MCSE, MCSA) and others.

I regularly use Open Source Intelligence (OSINT) for business and technical research related to my work. Additionally, I've participated in Trace Labs' "Search Party" Capture The Flag (CTF) events — competitive, gamified initiatives focused on locating real missing persons by analyzing their digital footprints. These events involve teams applying OSINT techniques to gather intelligence that may assist law enforcement in ongoing investigations.

🔗 linkedin.com/in/markolicina

  • Recon OSINT
Matej Kovačič

Matej Kovačič is has done several research and presentations on privacy, cryptography and information security (especially in the area of mobile communications) and has extensive knowledge on IT law related issues. He is an author of four monographs and his last book, published in 2022 is titled "Crash course on cybersecurity: a manual for surviving in a networked world". You can view/download his lectures and presentations here: https://telefoncek.si/predavanja/.

  • Rootkits - how deep the rabbit hole is
Neyts Zupan

Born a geek, learned to love sports later in life. Bootstrapped & powered by Open Source. Founder of ParetoSecurity.com, MayetRX.com, OceanSprint.org, niteo.co.

  • How to (mostly) fail at making money with security
Q Misell

Researcher at the Max-Plank Institute für Informatik, Saarbrücken, Germany.

https://magicalcodewit.ch

  • Automating HTTPS for Tor Onion Sites
Urban Vidergar

Malware Reverse Engineer, Incident Responder. Cyber Security Specialist @ SI-CERT

  • Dissecting HijackLoader: From Fake CAPTCHA to NTFS Transacted Hollowing
Žan Urbančič

Žan Urbančič is a penetration tester and cybersecurity specialist with a comprehensive skill set in offensive security, vulnerability assessment, and security implementation. He holds multiple industry-recognized certifications, including CCNA, eJPT, eCPPTv2, CRTP, CRTE, and OSCP, demonstrating deep expertise in network security, Active Directory exploitation, and advanced penetration testing methodologies. Passionate about staying ahead of emerging cyber threats, vulnerabilities (CVEs), and security trends, he proactively identifies, analyzes, and mitigates risks to strengthen organizational security postures. His experience includes testing and deploying XDR solutions such as Cynet, SentinelOne, and Sophos, as well as working with SIEM platforms like QRadar and Splunk to enhance threat detection, incident response, and threat hunting capabilities. Žan has also participated in Locked Shields and Crossed Swords, the largest NATO cyber exercises, where he gained hands-on experience in real-world cyber warfare simulations and both defensive and offensive cybersecurity operations. These experiences have further sharpened his ability to respond to advanced persistent threats (APTs), conduct red team engagements, and support blue team operations in high-stakes environments.

  • PXE Hacking 101: From Network Boot to Credential Extraction