Skip to content

Latest commit

 

History

History
61 lines (32 loc) · 2.01 KB

2018-10-26-UISGCON14.md

File metadata and controls

61 lines (32 loc) · 2.01 KB

UISGCON14

Загальні відомості

Дата проведення: 26 жовтня 2018

Офіційний веб-сайт: https://14.uisgcon.org/

Архів презентацій:

Архів відео:

Фотоальбом:

Відгуки та нотатки:

Програма

Māris Priekulis. How does GDPR influence business in Ukraine

Kostiantyn Korsun. System of Cybersecurity in Ukraine: reality or myth?

Maksym Litvinov, Andrii Okaievych and Serhii Mikhalap. Cyberwar in Ukraine. Collective defense.

Oleg Muravskiy. Internet Routing Security and How RIPE NCC’s Tools Help You Cope with It Eugene Pilyankevich. Usability vs security: operating security tools in large-scale infrastructures

Volodymyr Styran. Social-Engineer Your Security Budget (The White Hat Way)

Christopher Pfoutz. Application Pen Testing

Dimitri van de Giessen. How MS responded when they were hacked - A real life POV story by Dimitri

Yan Kravchenko, Evolution of Application Security Programs

Paul Alderson, Is IPV6 killing your privacy?

Logan Hicks, Weaponizing GDPR for Destructive Purposes

Oleksiy Semenyaka, Скрытая угроза, или мошенничество с адресным пространством

Dmytro Borovyk, “Bot Management as a critical part of layered security”

OWASP WIA Kyiv

Oleksandr Tsaruk, Cyber threats and opportunities embedded in the Fourth Industrial Revolution

Alexander Adamov, Creating Ransomware Decryptors

Aleksandr Mezherytskyi, Docker in penetration testing

Chris Pfoutz and Bence Szabo, New Application Vulnerability

UISGCON14 Панельна дискусія. Погляд галузі на стан освіти в сфері кібербезпеки в Україні

Oleg Bondarenko, eCrime and IO Trends in EMEA for 2018

Logan Hicks and Thor Odinson, Hacking Customized Missiles, Rockets, and Hyper Sonic Projectiles

Nazar Tymoshyk and Igor Kchoroshenko. F*AWS means - Fuckups in AWS security

Andrey Voloshin and Sasha Olenyev. Reverse Engineering Hardware & Firmware