Janko Kersnik

Head of Cybersecurity Department
09:30 - 09:50

Day one | 10. 10.

Securing DNS - why and how?

In today's digital world, DNS security is the cornerstone of business resilience. Cybercriminals know this, and they're relentlessly targeting DNS services to gain access to your most critical data.
Protecting your DNS requires a holistic approach that goes beyond securing the DNS itself. You also need to safeguard other IT resources using DNS protection.

 

This insightful presentation will delve into the threats that lurk in the DNS landscape, outline a comprehensive security strategy, and showcase the robust solutions offered by the Infoblox platform.

 

Don't miss this opportunity to learn how to fortify your DNS defenses and protect your business from the ever-evolving cyber threats.
09:00 - 10:30

Workshop: Security

Hands-on workshop: Applying VisionOne technology to cyber protection

Step into the shoes of an Incident Responder for a few hours and learn how they analyze incidents, piece together the puzzle, and defend against existing or future attacks. Additionally, you will see how with the right tools, this job can truly be done in such a short timeframe.

 

This will be a CTF-style workshop, with the curiosity that it is a defensive CTF, which is not common; typically, you can find Red Team tasks, i.e., offensive tasks, online. Through solving various tasks, participants will familiarize themselves with tactics and techniques that attackers use in targeted attacks, including phishing emails, script usage for system access, and running malicious code in RAM. How to detect, stop, and prevent such attacks.

 

To participate in the workshop, you need a laptop with an Internet browser installed.
11:00 - 12:00

Workshop: Security

Hands-on workshop - continued

Step into the shoes of an Incident Responder for a few hours and learn how they analyze incidents, piece together the puzzle, and defend against existing or future attacks. Additionally, you will see how with the right tools, this job can truly be done in such a short timeframe.

 

This will be a CTF-style workshop, with the curiosity that it is a defensive CTF, which is not common; typically, you can find Red Team tasks, i.e., offensive tasks, online. Through solving various tasks, participants will familiarize themselves with tactics and techniques that attackers use in targeted attacks, including phishing emails, script usage for system access, and running malicious code in RAM. How to detect, stop, and prevent such attacks.

 

To participate in the workshop, you need a laptop with an Internet browser installed.