Agenda 2019

Image

Participation in the conference allows for 13 CPE points.
The agenda may change.

DAY 1 – 12 SEPTEMBER, THURSDAY


SYMPHONY HALL

8:00 – 8:45 – Registration

8:45 – 9:00 – Opening of conferenceMirosław Maj / Cybersecurity Foundation, Przemysław Krejza / Stowarzyszenie Instytut Informatyka Śledcza

09:00.  Quantum cryptography – chances and threats for cybersecurity – Andrzej Dragan / Uniwersity of Warsaw

09:35   Keynote Ron Bashar / FireEye

10:10 Keynote – TBA / F5 

10:45 Keynote – TBA / TBA

11:15 Coffee breakkawa

SCS-PRO – Concerto I SCS URDI- Oratorio SCS OPEN – Symphony SCS ElevatorPitch (20-minutes sessions) SCS DEBATA  – Concerto II
11:45 Ten symptoms when you think you’ve been hackedPaula Januszkiewicz / CQURE TBA CSP – what helped us and what did notWojciech Lesicki, Paweł Czubachowski / Allegro TBA Cybersecurity in Energy sectorRoman Bratek / PGE Systems, Andrzej Olsztyński / GAZ SYSTEM SA, Jarosław Sordyl / PERN, Andrzej Szyszko / Ministry of Energy
12:20 TBA WhatsApp Forensics. Advanced extraction and decryption techniquesTanya Pankova / Oxygen Forensics The Marriage Between SIEM and SOAR: Roles and Responsibilities in the Relationship – – Dario Forte / DFLabs Audit methodology of information security system in accordance with ISO 27001 i ISO 22301 Piotr Ubych, Tomasz Szczygieł / Dekra
12:55 Reconnaissance of It infrastructure live  – Michał Sajdak / Sekurak.pl Physical attacks against access devices for radio networksMarcin Kopeć Virtual security cybergeddon part II: how academic trainers duel their security pistols with professional trainers from the industryAdrian Kapczyński / Silesian University of Technology TBA
13:30 Lunch

14:25 What can we learn from APT groups, so we can make use of Cyber Threat Intelligence to build cyber security-Ireneusz Tarnowski / Santander Bank Polska Where is Wally? About challenges of incidents management process – Joanna Dąbrowska / TrendMicro TBA – Aatish Pattni/Century Link TBA – TrendMicro
15:00 Datascience on the example of phishing sites in Poland
 Kajetan Kupaj  / ComCERT.pl
USB as Unknown Security Breachwith the eye of computer forensics investigator side Jerzy Kosiński / Polish Naval Academy Security status of Members of Polish Parliament web pagesDawid Czarnecki, Łukasz Bromirski / Polska Obywatelska Cyberobrona Doomed to SOARPiotr Brogowski / Orion
15:35 Using web technologies to find malware among internet banking clientsAdam Lange / Standard Chartered Bank Informatyka śledcza – case study, Marcin Kulawik, SIIŚ Bank robbery – Piotr Szeptyński / ISEC TBA
SYMPHONY HALL
16:10

Debate on Act of National Cybersecurity System implementation status – invited organizationsNIK, MC, NASK, MON, Asseco (TBD)

17:00

Evening meeting

glasswine

DAY 2 – 13 SEPTEMBER, FRIDAY

SYMPHONY HALL

8:00 – Registration

8:45 – 9:00 – Opening of the 2nd day of conference

9:00 – 9:40 – Debate (TBA)

SCS-PRO – Concerto I SCS URDI- Oratorio SCS OPEN – Symphony SCS ElevatorPitch (20-minutes sessions) SCS DEBATE – Concerto II
09:40 Speaker refused to give of the speech title Adam Haertle / Zaufana Trzecia Strona

Digital investigations in the Dark Web – Antun Duranec

Attacks on the Bitcoin nodes network –  Krzysztof Surgut

TBA – F5

Session and debate on Cyberwarfare. Organizers: Fundacja Bezpieczna Cyberprzestrzeń, Ministerstwo Cyfryzacji, FireEye
10:15 They steal money via routers – Przemysław Dęba, Kamil Uptas / CERT Orange Polska Case Study: efektywne sposoby odczytywania tablic rejestracyjnych z nagrań CCTVMarcin Grzywacz/Amped Software Chinese program of citizens assessement Piotr Canowiecki / ChinskiRaport.pl TBA – FireEye
10:50 Anubis – old bankbot, new methods –  Michał Strzelczyk / CERT Polska, NASK One solution does not work miracles – multitools in Forensic Mobile Michał Kurzaj TBA – Wojciech Wiewiórowski / Zastępca Europejskiego Inspektora Ochrony Danych

 
11:20

Coffee break
kawa

12:00 TBA – Agnieszka Gryszczyńska Using OSINT in ForensicsJacek Grymuza / ICS2
ATT&CKing the gap – David Thejl-Clayton / JN DATA TBA – Media Recovery Session and debate on Cyberwarfare. Organizatorzy: Fundacja Bezpieczna Cyberprzestrzeń, Ministerstwo Cyfryzacji, FireEye
12:35

TBA – AlgoSec

Legal aspects of Forensics Jarosław Góra

Interesting cases from pentester live  – Łukasz Jachowicz / Rębacze.pl

TBA – ComCERT SA
13:10 Permissions as an indispensable work tool and deadly risk for the company, i.e. Schrödinger Employee – Paweł Kulpa / SimplySec Techniki hakerskie w informatyce śledczej w kilku przykładach – Krzysztof Bińkowski Atomic Threat Coverage: being Threat CentricDaniil Yugoslavskiy, Mateusz Wydra Another world of cybersecurity – OT systems – Jakub Plusczok / GREG PRINT
13:45

Lunch

14:40 BadWPAD attack and wpad.pl caseAdam Ziaja Using digital forensic tools to fullfill requirements of ACT
on the national cyber security system – Radosław Chinalski
random:streamPaweł Wilk (podcast live) TBA Cloud Security Alliance opening meeting  – Marcin Fronczak, Kamil Kowalczuk, Dariusz Czeniawski / CSA Polska
CSP – what helped us and what did not – Wojciech Lesicki, Paweł Czubachowski / Allegro SZURKOGADANIE.PL Kacper Szurek (podcast live)
TBA
15:50 TBA TBA Cyber, CyberAdam Haertle, Łukasz Jachowicz, Mirosław Maj (podcast live)  TBA
SYMPHONY HALL
16:00

Debate on the implementation status of the Act on the National Cyber Security System – invited organizations – NIK, MC, NASK, MON, Asseco Polska (TBD)