<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>R8ZTV9@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-R8ZTV9</pentabarf:event-slug>
            <pentabarf:title>Don&#x27;t let them break you: a CTF infrastructure whitepaper</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T100000</dtstart>
            <dtend>20260321T102500</dtend>
            <duration>0.02500</duration>
            <summary>Don&#x27;t let them break you: a CTF infrastructure whitepaper</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/R8ZTV9/</url>
            <location>PA</location>
            
            <attendee>Rok Štular</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>YARFSQ@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-YARFSQ</pentabarf:event-slug>
            <pentabarf:title>How do we effectively communicate about INFOSEC?</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T103000</dtstart>
            <dtend>20260321T105500</dtend>
            <duration>0.02500</duration>
            <summary>How do we effectively communicate about INFOSEC?</summary>
            <description>I will talk about some recent experiences and about how, in our field, we seem to be constantly going for shock and awe, rather than lowering the blood pressure of everyman. We should also discuss people skills, when it comes to voncersing with fellow humans.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/YARFSQ/</url>
            <location>PA</location>
            
            <attendee>David  Modic</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>33KECY@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-33KECY</pentabarf:event-slug>
            <pentabarf:title>From Beginner to Pro Hacker: Practical Approach to Offensive Security Training</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T113000</dtstart>
            <dtend>20260321T115500</dtend>
            <duration>0.02500</duration>
            <summary>From Beginner to Pro Hacker: Practical Approach to Offensive Security Training</summary>
            <description>Transitioning from theoretical knowledge to practical offensive security skills remains a significant challenge for many learners. While concepts are widely documented, the ability to apply them in realistic environments is often missing.
This session presents a methodology for developing hands-on skills through controlled lab environments that simulate real-world infrastructures. The focus is on core offensive techniques, including enumeration, vulnerability identification, exploitation, and post-exploitation, with an emphasis on chaining weaknesses into meaningful attack paths.
Drawing from recent penetration testing experience, including the discovery of vulnerabilities, the session highlights how legacy systems and misconfigurations continue to introduce exploitable conditions in modern networks.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/33KECY/</url>
            <location>PA</location>
            
            <attendee>Žan Urbančič</attendee>
            
            <attendee>Danijela Šantak</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>NZGV7M@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-NZGV7M</pentabarf:event-slug>
            <pentabarf:title>Compliance of Electronic Products in the EU: From Electrical Safety and EMC to Cybersecurity under RED</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T120000</dtstart>
            <dtend>20260321T125000</dtend>
            <duration>0.05000</duration>
            <summary>Compliance of Electronic Products in the EU: From Electrical Safety and EMC to Cybersecurity under RED</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lecture</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/NZGV7M/</url>
            <location>PA</location>
            
            <attendee>Marko Jankovec</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>PLTQ8Z@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-PLTQ8Z</pentabarf:event-slug>
            <pentabarf:title>Zero to RCE in a Weekend: Fuzzing Old Games for Memory Corruption</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T143000</dtstart>
            <dtend>20260321T145500</dtend>
            <duration>0.02500</duration>
            <summary>Zero to RCE in a Weekend: Fuzzing Old Games for Memory Corruption</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/PLTQ8Z/</url>
            <location>PA</location>
            
            <attendee>Rick de Jager</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>9LETXX@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-9LETXX</pentabarf:event-slug>
            <pentabarf:title>Unfaithful Claims: Breaking 6 zkVMs</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T150000</dtstart>
            <dtend>20260321T152500</dtend>
            <duration>0.02500</duration>
            <summary>Unfaithful Claims: Breaking 6 zkVMs</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/9LETXX/</url>
            <location>PA</location>
            
            <attendee>Andraž Strgar</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>QWPGK3@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-QWPGK3</pentabarf:event-slug>
            <pentabarf:title>Anonymous Credentials for Next-Generation Rate Limiting: From Linear to Constant-Size Issuance</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T153000</dtstart>
            <dtend>20260321T155500</dtend>
            <duration>0.02500</duration>
            <summary>Anonymous Credentials for Next-Generation Rate Limiting: From Linear to Constant-Size Issuance</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/QWPGK3/</url>
            <location>PA</location>
            
            <attendee>Lena Heimberger</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>TNAZ7R@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-TNAZ7R</pentabarf:event-slug>
            <pentabarf:title>When Correct Code leaks Secrets: Side Channels Explained</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T163000</dtstart>
            <dtend>20260321T172000</dtend>
            <duration>0.05000</duration>
            <summary>When Correct Code leaks Secrets: Side Channels Explained</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lecture</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/TNAZ7R/</url>
            <location>PA</location>
            
            <attendee>Hannes Weissteiner</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>9EU38Y@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-9EU38Y</pentabarf:event-slug>
            <pentabarf:title>How can one do security in a fully modular kernel?</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T173000</dtstart>
            <dtend>20260321T175500</dtend>
            <duration>0.02500</duration>
            <summary>How can one do security in a fully modular kernel?</summary>
            <description>This talk will cover some of the classic methods of security when it comes to kernels and operating systems, then it will throw those backward ideas out of the window because basically none of them are compatible with my idea of a fully modular kernel! but then you might ask, a fully modular kernel? Well i&#x27;ve been working on this &quot;side&quot; project in my free time for quite a while, it&#x27;s a custom kernel where (almost) all components of the kernel are loadable modules, that means you can switch out parts of your kernel whenever you want! Which sounds perfectly awesome, but just so happens to be a security nightmare! In any other currently popular operating system allowing any user to load kernel modules is a terrible idea, but maybe it doesn&#x27;t have to be in my custom kernel?</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/9EU38Y/</url>
            <location>PA</location>
            
            <attendee>Andraž Rotar</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>ULRU9Q@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-ULRU9Q</pentabarf:event-slug>
            <pentabarf:title>Capture the Flag in SOC</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260321T180000</dtstart>
            <dtend>20260321T182500</dtend>
            <duration>0.02500</duration>
            <summary>Capture the Flag in SOC</summary>
            <description>What does cybersecurity look like in practice? Through the Capture the Flag approach, the lecture will show how threat detection, incident analysis, and finding the right answers under time pressure take place in a SOC environment. Participants will learn why these types of challenges are important for developing practical skills, analytical thinking, and effective teamwork.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf26/talk/ULRU9Q/</url>
            <location>PA</location>
            
            <attendee>Peter Hutinski</attendee>
            
            <attendee>Peter Pavkovič</attendee>
            
            <attendee>Matic Šebjan Ogrizek</attendee>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
