13
3rd eSecurity Conference 2019 ## HACK OR BE HACKED ## April 3 - 5 Hotel Holiday Inn, Belgrade

3rd eSecurity Conference 2019

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 3rd eSecurity Conference 2019

3rd eSecurity Conference

2019

## HACK OR BE HACKED ##

April 3 - 5

Hotel Holiday Inn, Belgrade

Page 2: 3rd eSecurity Conference 2019

3rd eSecurity Conference

2019

## HACK OR BE HACKED ## April 3 - 5

Hotel Holiday Inn, Belgrade

Dear Colleagues,

Welcome to our Third eSecurity Conference!

The international eSecurity Conference is one of the most significant IT events in the region,

which gathers a large number of experts in the field of information security. Every year the confer-

ence brings a big number of educators, hands-on demonstrations, workshops that are about pre-

sent threats, sophisticated attack methods, digital life, the internet of things, as well as advanced

defense systems.

The eSecurity Conference follows the latest trends in the field of information security. The

presentations on the conference are grouped into panels. A section of the presentations is dedicat-

ed to banking security and includes electronic and mobile payments, payment cards security,

as well as new trends of payment, blockchain technology and digital currency. There will be

presentations specially dedicated to information system security, standards and regulations, mo-

bile device security and the internet of things (IoT). Additionally, there will be talk about social

engineering, phishing attacks and the unavoidable ransomware threats. Also, our friends will talk

about the topics that come after the problem: digital forensics, data recovery systems and

backups.

On the first day of the conference, there will be workshops (hands-on training) that teach ethi-

cal hacking, digital forensics and blockchain security. The workshops are dedicated to people

who want to know what and how something is attacking them and also how to detect the attacks

and stop them from spreading.

Our attendees are mostly IT managers, information security managers, experts in the field of cyber

-crime and digital forensics etc.

Meeting new people and socializing is a big aspect of the conference. During three days of the our

conference you will be able to spend quality time exchanging experiences and knowledge with ex-

perts from different companies.

In addition to lectures, the conference includes a dinner and similar socializing activities.

eSecurity Association

Page 3: 3rd eSecurity Conference 2019

3rd eSecurity Conference

2019

## HACK OR BE HACKED ## April 3 - 5

Hotel Holiday Inn, Belgrade

www.esecurity.rs www.esigurnost.org

[email protected]

30+ SPEAKERS

Earn up to

18 CPE

points

20+ LECTURES

150+ PARTICIPANTS

PANEL

DISCUSSION

GIFTS FOR ALL

Page 4: 3rd eSecurity Conference 2019

#ACK4LIFE GAME powered by

Trusted Cyber Security Solutions

eSecurity Conference 2019, Belgrade

#ack4Life game is designed for all of the eSecurity conference participants and those who are not. The main purpose of the game is to think like a hacker and have fun while waiting for the greatest information security conference eSecurity 2019. As a player you will have to pass a few levels of this game to get into the finales. Finale level will be held on the conference in front of all of the attendees.

THINK LIKE A HACKER...

Have fun, be a hacker for a while and win some nice prizes. Only the fastest and meanest hack-ers will be rewarded... If you are not a participant you can win a free participation to the confer-ence. If you are a participant you can win some nice gadgets from Association eSigurnost and our conference sponsor.

THE THREE BEST COMPETITORS WILL RECEIVE SPECIAL HARDWARE PRIZES FROM OUR SPONSOR

TRUSTED CYBER SECURITY COLUTIONS Level 1 Hardcode-ing passwords is always a mistake, especialy if youdo it on a web page, even if it is not in clear text. To pass this level you will have to send your email address and "THE PASSWORD" to [email protected] Level 2 We set up a password protection script for login to website. We made it load the real password from an unencrypted text file called password.txt and compare it to the password the user enters. It turned out that it was not a good idea. everyone can read passwords. Send us password for user Administrator. to [email protected] Level 3 Our friend Stacy accidently erased some files from her USB. We made an image of the USB with some of our forensics tools. There was an archive on the disk that holds a very important account password. Archive is protected with the password made of our friends phone number. If you could recover that password for us, please. Here is the image of the erased USB. ***IMAGE*** https://esecurity.rs/image.tar.gz

Page 5: 3rd eSecurity Conference 2019

#ACK4LIFE HANDS-ON TRAINING Wednesday, April 3

rd, 2018

eSecurity Conference 2019, Belgrade

Information and information system security is one of the most important topics today. In the era of more frequent and always different attacks, malware, ransomware, it's increasingly diffi-cult to find the right way to defend. In order to determine the techniques and technologies needed for defending the organization, you need to know what is attacking you and how it at-tacks you. What hackers use, how they think and how they come to us are just some of the questions that are constantly being asked and the answer is difficult to find. This training introduces you to all types of attacks and demonstrates the techniques and how ease is to perform them, with the goal of demystifying hacking and defying the mode of de-fending.

“Walt the attendees through all the steps of one attack, from zero point to com-plete control. Explain all techniques and demonstrate attacks and some of the most used tools. Defining and explaining defence techniques for each of the at-tacks, and parts of the attack.”

Content

Introduction and basic concepts

The evolution of hacktivism

Identifying the target Pasive Reconnaissance (OpenSource Inteligence, WhoIS, Metagoofil, GoogleHacking) Active Reconnaissance (PortScanning, Footprint, Vulnerability Scanning)

Network scanning and enumeration

Social engineering Phishing attacks

Eavesdropping MiTM Session Hijecking

System hacking Metasploit Creation and distribution of Trojans, Viruses Stealth trojans

Denial Of Service attacks

Post exploitation activities Keylogger Backdoor

Wireless hacking Training is designed for everyone who wants to learn how hackers do some of the most com-mon attack methods, how they create malicious software and how to do analisys of malware activities, and after all how to protect from it. Prerequisites for attending the training: Network infrastructure and operating system knowledge (elementary to advanced level)

Page 6: 3rd eSecurity Conference 2019

ZERO DAY Wednesday, April 3

rd, 2019

eSecurity Conference 2019, Belgrade

09:00 Registration

09:15 #ACK4LIFE Hands-on Training

11:00 Coffee Time

11:15 #ACK4LIFE Hands-on Training

14:00 Lunch Time

14:45 #ACK4LIFE Hands-on Training

16:30 Q&A

Page 7: 3rd eSecurity Conference 2019

DAY 1 Thursday, April 4

th, 2019

eSecurity Conference 2019, Belgrade

08:00 Welcome Coffee and Registration

08:45 Opening

08:45 Opening Ceremony Igor Franc

President of eSecurity Association

09:00 #ACK4LIFE Game

powered by Trusted Cyber Security Solutions

09:10 Keynote speech Chris Kubecka

Security Researcher, Security Evangelist, CEO at HypaSec

09:45 Our Security, Delivery Your Way Michael Haas

Area Sales Director, Central EMEA at WatchGuard

Jonas Spieckermann

Senior Sales Engineer at WatchGuard

10:25 Coffee Time

10:40 Cyber Security

10:40 Aleksandra Butulija

Sales Director Adriatic at Trusted Cyber Security Solutions

11:10 Srđan Vranić

E4S

11:50 National CSIRT, Establishing, Activities, Services And Challenges Aleksandar Acev

Ibis Instruments

Page 8: 3rd eSecurity Conference 2019

DAY 1 Thursday, April 4

th, 2019

eSecurity Conference 2019, Belgrade

12:30 Coffee Time

12:45 Information Security & New Technology

12:45 Protect Your Data in Smart Way Thanks to Risk Adaptive Protection Nick Nicolescu

Regional Sales Manager at Forcepoint

Krzysztof Górowski

Senior Security Engineer at Clico

13:25 How to Recognize a Good CISO Milan Visinski

Owner, Consultant at Kivi Consulting

13:50

14:30 Lunch Time

15:15 White Hat vs. Black Hat

15:15 Lock Picking and Locksport Jovan Šikanja

Fraud and Security Administrator at Limundo

16:00 Reverse Engineering of Malware Mane Piperevski,

IT Security Researcher, CEO at Piperevski & Associates

Filip Simeonov

Cyber Security Consultant & Senior Penetration Tester at P&A

20:00 eSecurity Dinner & Networking

powered by Clico

Page 9: 3rd eSecurity Conference 2019

eSecurity Networking & Dinner powered by

Clico

eSecurity Conference 2019, Belgrade

Thursday, April 4th

, 2019

19:30 Stara Srpska Kuća

eSecurity

Networking & Dinner

from 19:30 to 23:00

Page 10: 3rd eSecurity Conference 2019

DAY 2 Friday, April 5

th, 2019

eSecurity Conference 2019, Belgrade

08:00 Welcome Coffee and Registration

08:45 Information Security & New Technology

08:45 Love Story About Artificial Intelligence? Aleksandar Mirković

CISO at Sberbank

09:20 Darko Šehović

CISO at Association of Serbian Banks

09:55 A New Dimension of AI World-attacks on Machine Learning

Agorithms By Input Data Manipulation Vladan Todorović

CTO, CoFounder at Sauron Security

10:30 Coffee Time

10:45 Cyber Security

10:45 Milan Gabor

CEO at Viris

11:20 How to See All Malware Activities With Just One Tool

Vladimir Petrović

Security Consultant at Unicom Telecom

11:55

Page 11: 3rd eSecurity Conference 2019

DAY 2 Friday, April 5

th, 2019

eSecurity Conference 2019, Belgrade

12:30 Coffee Time

12:45 Data & Network Protection

12:45 MiTM - Man in the MAIL Boris Mutina

Security Analyst at Excello s.r.o.

13:20

13:55 Mind Hacking - Social Engineering in Practice Luka Milinković

Senior IS Auditor at NLB Bank

14:30 Lunch Time

15:15 White Hat vs. Black Hat

15:15 Pentesting Microsoft Active Directory Dejan Levaja

Owner, Lead Penetration Tester at RAS-IT

Nenad Vijatov

Cyber Security Professional

16:00 Smart Homes And Un-smart Owners Igor Franc, PhD

Assistant Professor at Faculty of Information Technology (FIT)

CEO & Founder at SECIT Security Consulting

15:45 #ACK4LIFE Game Presents

powered by Trusted Cyber Security Solutions

16:55 Closing Ceremony

Page 12: 3rd eSecurity Conference 2019

SPONSORS & PARTNERS We thank our sponsors & partners for their support.

eSecurity Conference 2019, Belgrade

PLATINUM SPONSORS

GOLD SPONSORS

SILVER SPONSORS

MEDIA SPONSORS

PARTNERS

Page 13: 3rd eSecurity Conference 2019

eSecurity Conference April 2020

to be continued...