Matija Mandarić

Sales Engineer
From a security engineer to presales and consulting, enterprise security architecture and education. Matija has been in security for almost 15 years now, in various roles and various organisations with various responsibilities, from a user through an integrator to a vendor. He likes to joke that it made him ''jack of all trades but master of none'' (although the continuation of that saying is very indicative). But hey, as an SF author Robert Heinlen once wrote, ''specialization is for insects".
09:00 - 10:30

Delavnica: varnost

'Hands-on' delavnica: Uporaba tehnologije VisionOne pri kibernetski zaščiti

Na delavnici Capture the Flag (CTF) – Trend Micro VisionOne se boste za nekaj ur postavili v vlogo tistega, ki se odziva na incidente in se naučili, kako analizirati incidente, sestaviti sestavljanko in se braniti pred obstoječimi ali prihodnjimi napadi (z vidika nalog Blue Team ekipe). Poleg tega boste videli, kako je s pravimi orodji, kot je VisionOne, naloge resnično mogoče opraviti v tako kratkem času.
Skozi reševanje različnih nalog se boste seznanili s taktikami in tehnikami, ki jih napadalci uporabljajo pri ciljanih napadih, vključno s lažnim predstavljanjem preko elektronske pošte, uporabo skript za dostop do sistema in izvajanje zlonamerne kode v RAM-u. Kako odkriti, zaustaviti in preprečiti takšne napade.
Delavnica bo ponudila edinstven, zabaven in privlačen način učenja varnostnih konceptov in pridobivanja novih veščin.
Za udeležbo na delavnici potrebujete prenosni računalnik, na katerem imate nameščen internet brskalnik.
11:00 - 12:00

Delavnica: varnost

'Hands-on' delavnica - nadaljevanje

Na delavnici Capture the Flag (CTF) – Trend Micro VisionOne se boste za nekaj ur postavili v vlogo tistega, ki se odziva na incidente in se naučili, kako analizirati incidente, sestaviti sestavljanko in se braniti pred obstoječimi ali prihodnjimi napadi (z vidika nalog Blue Team ekipe). Poleg tega boste videli, kako je s pravimi orodji, kot je VisionOne, naloge resnično mogoče opraviti v tako kratkem času.
Skozi reševanje različnih nalog se boste seznanili s taktikami in tehnikami, ki jih napadalci uporabljajo pri ciljanih napadih, vključno s lažnim predstavljanjem preko elektronske pošte, uporabo skript za dostop do sistema in izvajanje zlonamerne kode v RAM-u. Kako odkriti, zaustaviti in preprečiti takšne napade.
Delavnica bo ponudila edinstven, zabaven in privlačen način učenja varnostnih konceptov in pridobivanja novih veščin.
Za udeležbo na delavnici potrebujete prenosni računalnik, na katerem imate nameščen internet brskalnik.
09:00 - 10:30

Workshop: Security

Hands-on workshop: Applying VisionOne technology to cyber protection

Step into the shoes of an Incident Responder for a few hours and learn how they analyze incidents, piece together the puzzle, and defend against existing or future attacks. Additionally, you will see how with the right tools, this job can truly be done in such a short timeframe.

 

This will be a CTF-style workshop, with the curiosity that it is a defensive CTF, which is not common; typically, you can find Red Team tasks, i.e., offensive tasks, online. Through solving various tasks, participants will familiarize themselves with tactics and techniques that attackers use in targeted attacks, including phishing emails, script usage for system access, and running malicious code in RAM. How to detect, stop, and prevent such attacks.

 

To participate in the workshop, you need a laptop with an Internet browser installed.
11:00 - 12:00

Workshop: Security

Hands-on workshop - continued

Step into the shoes of an Incident Responder for a few hours and learn how they analyze incidents, piece together the puzzle, and defend against existing or future attacks. Additionally, you will see how with the right tools, this job can truly be done in such a short timeframe.

 

This will be a CTF-style workshop, with the curiosity that it is a defensive CTF, which is not common; typically, you can find Red Team tasks, i.e., offensive tasks, online. Through solving various tasks, participants will familiarize themselves with tactics and techniques that attackers use in targeted attacks, including phishing emails, script usage for system access, and running malicious code in RAM. How to detect, stop, and prevent such attacks.

 

To participate in the workshop, you need a laptop with an Internet browser installed.