BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.dragonsec.si//dctf26//GAWLRY
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-dctf26-R8ZTV9@cfp.dragonsec.si
DTSTART;TZID=CET:20260321T100000
DTEND;TZID=CET:20260321T102500
DESCRIPTION:Most infrastructure is built to be used\; CTF infrastructure is
  built to be abused. When your user base consists of hundreds of hackers a
 rmed with weaponized 1-days and a competitive drive to bypass your guardra
 ils\, "standard" scalability and security models fall apart.\n\nDrawing fr
 om two years of organizing on-site jeopardy competitions for several hundr
 ed participants\, this talk deconstructs the unique intersection of high-c
 oncurrency DevOps and aggressive hardening. We will explore the "war stori
 es" of managing real-time exploits\, mitigating flag-sharing\, and maintai
 ning a satisfactory user experience in this unique and challenging environ
 ment.
DTSTAMP:20260501T105949Z
LOCATION:PA
SUMMARY:Don't let them break you: a CTF infrastructure whitepaper - Rok Št
 ular
URL:https://cfp.dragonsec.si/dctf26/talk/R8ZTV9/
END:VEVENT
END:VCALENDAR
