Participation in the conference allows for 13 CPE points.
The agenda may change.
DAY 1 – 12 SEPTEMBER, THURSDAY
SYMPHONY HALL
8:00 – 8:45 – Registration
8:45 – 9:00 – Opening of conference – Mirosław Maj / Cybersecurity Foundation, Przemysław Krejza / Stowarzyszenie Instytut Informatyka Śledcza
09:00. Quantum cryptography – chances and threats for cybersecurity – Andrzej Dragan / Uniwersity of Warsaw
09:35 Keynote – Ron Bashar / FireEye
10:10 Keynote – TBA / F5
10:45 Keynote – TBA / TBA
11:15 Coffee break
…
SCS-PRO – Concerto I | SCS URDI- Oratorio | SCS OPEN – Symphony | SCS ElevatorPitch (20-minutes sessions) | SCS DEBATA – Concerto II | ||
11:45 | Ten symptoms when you think you’ve been hacked – Paula Januszkiewicz / CQURE | TBA | CSP – what helped us and what did not – Wojciech Lesicki, Paweł Czubachowski / Allegro | TBA | Cybersecurity in Energy sector – Roman Bratek / PGE Systems, Andrzej Olsztyński / GAZ SYSTEM SA, Jarosław Sordyl / PERN, Andrzej Szyszko / Ministry of Energy | |
12:20 | TBA | WhatsApp Forensics. Advanced extraction and decryption techniques – Tanya Pankova / Oxygen Forensics | The Marriage Between SIEM and SOAR: Roles and Responsibilities in the Relationship – – Dario Forte / DFLabs | Audit methodology of information security system in accordance with ISO 27001 i ISO 22301 – Piotr Ubych, Tomasz Szczygieł / Dekra | ||
12:55 | Reconnaissance of It infrastructure live – Michał Sajdak / Sekurak.pl | Physical attacks against access devices for radio networks – Marcin Kopeć | Virtual security cybergeddon part II: how academic trainers duel their security pistols with professional trainers from the industry – Adrian Kapczyński / Silesian University of Technology | TBA | ||
13:30 | Lunch | |||||
14:25 | What can we learn from APT groups, so we can make use of Cyber Threat Intelligence to build cyber security-Ireneusz Tarnowski / Santander Bank Polska | Where is Wally? About challenges of incidents management process – Joanna Dąbrowska / TrendMicro | TBA – Aatish Pattni/Century Link | TBA – TrendMicro | ||
15:00 | Datascience on the example of phishing sites in Poland – Kajetan Kupaj / ComCERT.pl |
USB as Unknown Security Breachwith the eye of computer forensics investigator side – Jerzy Kosiński / Polish Naval Academy | Security status of Members of Polish Parliament web pages– Dawid Czarnecki, Łukasz Bromirski / Polska Obywatelska Cyberobrona | Doomed to SOAR – Piotr Brogowski / Orion | ||
15:35 | Using web technologies to find malware among internet banking clients – Adam Lange / Standard Chartered Bank | Informatyka śledcza – case study, Marcin Kulawik, SIIŚ | Bank robbery – Piotr Szeptyński / ISEC | TBA | ||
SYMPHONY HALL | ||||||
16:10 |
Debate on Act of National Cybersecurity System implementation status – invited organizations – NIK, MC, NASK, MON, Asseco (TBD) |
|||||
17:00 |
Evening meeting |
DAY 2 – 13 SEPTEMBER, FRIDAY
SYMPHONY HALL
8:00 – Registration
8:45 – 9:00 – Opening of the 2nd day of conference
9:00 – 9:40 – Debate (TBA)
SCS-PRO – Concerto I | SCS URDI- Oratorio | SCS OPEN – Symphony | SCS ElevatorPitch (20-minutes sessions) | SCS DEBATE – Concerto II | ||
09:40 | Speaker refused to give of the speech title – Adam Haertle / Zaufana Trzecia Strona |
Digital investigations in the Dark Web – Antun Duranec |
Attacks on the Bitcoin nodes network – Krzysztof Surgut |
TBA – F5 |
Session and debate on Cyberwarfare. Organizers: Fundacja Bezpieczna Cyberprzestrzeń, Ministerstwo Cyfryzacji, FireEye | |
10:15 | They steal money via routers – Przemysław Dęba, Kamil Uptas / CERT Orange Polska | Case Study: efektywne sposoby odczytywania tablic rejestracyjnych z nagrań CCTV – Marcin Grzywacz/Amped Software | Chinese program of citizens assessement – Piotr Canowiecki / ChinskiRaport.pl | TBA – FireEye | ||
10:50 | Anubis – old bankbot, new methods – Michał Strzelczyk / CERT Polska, NASK | One solution does not work miracles – multitools in Forensic Mobile – Michał Kurzaj | TBA – Wojciech Wiewiórowski / Zastępca Europejskiego Inspektora Ochrony Danych |
|
||
11:20 |
Coffee break |
|||||
12:00 | TBA – Agnieszka Gryszczyńska | Using OSINT in Forensics – Jacek Grymuza / ICS2 |
ATT&CKing the gap – David Thejl-Clayton / JN DATA | TBA – Media Recovery | Session and debate on Cyberwarfare. Organizatorzy: Fundacja Bezpieczna Cyberprzestrzeń, Ministerstwo Cyfryzacji, FireEye | |
12:35 |
TBA – AlgoSec |
Legal aspects of Forensics – Jarosław Góra |
Interesting cases from pentester live – Łukasz Jachowicz / Rębacze.pl |
TBA – ComCERT SA | ||
13:10 | Permissions as an indispensable work tool and deadly risk for the company, i.e. Schrödinger Employee – Paweł Kulpa / SimplySec | Techniki hakerskie w informatyce śledczej w kilku przykładach – Krzysztof Bińkowski | Atomic Threat Coverage: being Threat Centric – Daniil Yugoslavskiy, Mateusz Wydra | Another world of cybersecurity – OT systems – Jakub Plusczok / GREG PRINT | ||
13:45 |
Lunch |
|||||
14:40 | BadWPAD attack and wpad.pl case – Adam Ziaja | Using digital forensic tools to fullfill requirements of ACT on the national cyber security system – Radosław Chinalski |
random:stream – Paweł Wilk (podcast live) | TBA | Cloud Security Alliance opening meeting – Marcin Fronczak, Kamil Kowalczuk, Dariusz Czeniawski / CSA Polska | |
CSP – what helped us and what did not – Wojciech Lesicki, Paweł Czubachowski / Allegro | SZURKOGADANIE.PL – Kacper Szurek (podcast live) |
TBA | ||||
15:50 | TBA | TBA | Cyber, Cyber – Adam Haertle, Łukasz Jachowicz, Mirosław Maj (podcast live) | TBA | ||
SYMPHONY HALL | ||||||
16:00 |
Debate on the implementation status of the Act on the National Cyber Security System – invited organizations – NIK, MC, NASK, MON, Asseco Polska (TBD) |