Vsebina predavanj

 

Advanced Threat Hunting: Staying One Step Ahead of Adversary

As cybersecurity defenders, our job is not just to react but to stay ahead of attackers. Yet, adversaries continue to evolve, refining their techniques to bypass defenses and infiltrate critical systems. To effectively hunt threats, we must understand how these attackers think and operate.

This session will explore real-world techniques used by malicious actors to breach security controls. We will examine how stolen data such as compromised session tokens and credentials are weaponized to gain unauthorized access to systems and supply chains. We’ll also uncover how attackers bypass restricted registration requirements, exploiting gaps in verification and automation processes. We will also analyze how logic flaws in authentication mechanisms allow threat actors to circumvent security controls, gaining entry where they shouldn’t. And much more.

By breaking down these attack strategies, you will learn how to identify, track, and neutralize emerging threats before they cause damage. This session will equip you with practical threat-hunting insights, showing you how to turn an attacker’s own methods against them before they strike.

Alex Holden
Hold Security, LLC
Četrtek, 12.02.2026
14:00 - 14:30
O predavatelju

Adversary Emulation: Simulating APTs, Ransomware, and Emerging Threats

While threat reports document advanced persistent threat (APT) activity, most red team simulations fail to capture the conditions, tool chains, and environmental assumptions adversaries relied upon—creating defensive gaps. This presentation demonstrates how to extract operational intent from cyber threat intelligence and translate it into authentic, repeatable simulations using frameworks like Atomic Red Team and CALDERA.
Using APT29 as a case study, we’ll walk through building actor-specific profiles and implementing tactics that reflect actual adversary constraints. Attendees will receive a threat actor profile template and framework configurations ready to customize for their specific threat landscapes.

Diogo Fernandes
SEG Automotive
Četrtek, 12.02.2026
10:40 - 11:10
O predavatelju

AI BYPASS: How to gain a physical access in 15 seconds

Despite the widespread adoption of AI-based security solutions, physical attacks on network infrastructure remain fast, effective, and dangerously underestimated.

The speaker will deliver a live demonstration showing how network security can be bypassed in as little as 15 seconds using a simple hardware tool. The presentation focuses on Layer 2 and Layer 3 attacks, revealing how physical access combined with low-level network exploitation can lead to immediate unauthorized entry.

The session will highlight why AI-driven security systems often fail to detect L2/L3 attacks, and will discuss practical ways to reduce the risk of physical breaches through improved monitoring, segmentation, and defensive controls.

By combining real-time exploitation with defensive insights, this talk demonstrates why physical access and low-level network attacks still play a critical role in modern cybersecurity, even in the age of AI.

Alessandro Vannini
Eclysse Cybersecurity
Sreda, 11.02.2026
12:10 - 12:40
O predavatelju

Artificial Intelligence for Hacking

In this talk, we will explore how AI can be used to automate vulnerability scanning, exploitation, and continuous security testing, including:

* Automated Vulnerability Scanning and Exploitation: AI detects vulnerabilities and autonomously selects or creates the appropriate exploit to validate them.
* Self-Updating Exploit Arsenal: AI retrieves, adapts, and standardizes public exploits from online sources without human input, maintaining an up-to-date library.
* Fuzzing and Injection Testing: AI performs intelligent fuzzing and injection (e.g., SQLi, XSS) to uncover and verify application vulnerabilities.
* Exploit Reprogramming: AI modifies and sanitizes exploit scripts to ensure safe execution and compatibility with the platform.
* Multi-Agent Orchestration: Multiple AI agents collaborate to coordinate scanning, exploitation, and refinement loops for more effective penetration tests.

Andrea Bodei
INFRA AI
Sreda, 11.02.2026
09:40 - 10:10
O predavatelju

Attack of the Clones: 80+ AI Agents Walk Into a SOC

What happens when you stop waiting for the next "AI SOC revolution" and just build your own clone army instead?

This talk tells the story of how one small SecOps team turned years of internal playbooks, tribal knowledge, and automation scripts into an Agentic Threat Management Framework — a swarm of 80+ AI agents that think, correlate, and report like seasoned analysts (with the added benefit of no coffee breaks).

We'll dive into the why behind building an in-house AI SOC — the frustration with black-box "AI security" hype, the need for transparency, and the joy of making something that actually works in a real, human lead environment, with all its inherent flaws and inconsistencies. We will share our own hard-won lessons:

- how to agentify your own security knowledge,
- orchestrate your agents on the battlefield,
- keep your AI explainable and traceable,
- and, the most important, transform the human SOC Analyst in an AI developer/prompt engineer.

By the end, you'll see how building your own AI SOC is about AI empowering humans and not the other way around.

Andrei Cotaie
UiPath
Četrtek, 12.02.2026
13:30 - 14:00
O predavatelju
Cristian Miron
UiPath
O predavatelju

CSRF attacks in modern Web applications

Cross-Site Request Forgery (CSRF) has long been a high severity threat to web applications, enabling attackers to execute unauthorized actions on behalf of authenticated users. While traditional CSRF mitigation techniques, such as anti-CSRF tokens and SameSite cookies, have improved web security, different application architectures and new research from the community introduced new challenges that can lead to overlooked vulnerabilities.
This talk explores the evolution of CSRF attacks in the context of modern web technologies, such as Single Page Applications. Additionally, the talk will assess how browser security mechanisms protect their users against CSRF attacks and how to potentially bypass them.

Mateo Hanžek
INFIGO IS
Sreda, 11.02.2026
14:30 - 15:00
O predavatelju

Cyber Threat Intelligence in action: From data to defensive decisions

This talk explains Operational Cyber Threat Intelligence (CTI) as a practical process that turns threat data into effective defensive actions. It introduces the strategic, tactical, and operational levels of CTI, outlines the CTI lifecycle from collection to dissemination, and highlights key intelligence sources such as OSINT, dark web, and automated telemetry.
The session shows how CTI is applied in SOC, SIRT/CSIRT, and Incident Response to improve detection and response, and concludes with an overview of standards and workflows like STIX/TAXII, emphasizing CTI as a repeatable, action-oriented capability rather than just a list of indicators.

Riccardo Cervelli
ITIS "G. Marconi" - Pontedera (PI)
Četrtek, 12.02.2026
15:10 - 15:40
O predavatelju

Exploiting Digital Energy at Level 0

The convergence of the digital and physical worlds has opened a physics-based attack surface that traditional cybersecurity does not address, particularly at the foundational Purdue Level 0. We define this new vulnerability through digital energy: the physical manifestation of computation. Our core argument is that manipulating this energy—through electromagnetic interference or mechanical force—allows attackers to side-step software defenses and compromise operational technology. Because advanced threats may exploit the physical environment to disrupt vital sensors and actuators, security must undergo a fundamental shift. The way forward is the urgent integration of physical layer security monitoring to protect critical infrastructure at its deepest level.

Paul Coggin
nou Systems, Inc
Sreda, 11.02.2026
11:40 - 12:10
O predavatelju

Isti ukaz, druga oblika: zakaj detekcije včasih ne vidijo ničesar

Z uvajanjem SIEM/EDR rešitev in uporabo standardiziranih detekcijskih pravil se pogosto ustvari občutek, da smo “pokriti”. V praksi pa zaznava pogosto stoji ali pade na tem, kako se ukazna vrstica in pot do procesa sploh zabeležita, pravilno prebereta in razumeta. Ker mnogi Windows programi sprejmejo več različnih zapisov istega ukaza, lahko napadalec doseže identičen rezultat z drugačno sintakso. Na predavanju bomo praktično demonstrirali tehnike, ki spremenijo “viden” niz, ne pa izvedbe.

Vid Grosek
Telprom d.o.o.
Sreda, 11.02.2026
10:10 - 10:40
O predavatelju

Meni se to ne more zgoditi

Nihče ni povsem varen pred hekerskimi napadi. Skozi konkretne primere iz vsakdanjega življenja si bomo pogladali, kako hitro lahko zaradi neprevidnosti (šibka gesla, lažna e-pošta, javni Wi-Fi, družbena omrežja) postanemo žrtev spletnih prevar ali kraje podatkov. Poudarek je na razbijanju mita, da so tarče napadov le “velika podjetja”.

Gregor Spagnolo
SSRD d.o.o.
Sreda, 11.02.2026
12:40 - 13:10
O predavatelju

Novosti na področju pravne ureditve in izzivov varstva zasebnosti ter umetne inteligence

S sprejemom Zakona o izvajanju uredbe (EU) o določitvi harmoniziranih pravil o umetni inteligenci (ZIUDHPUI) bo Informacijski pooblaščenec kot organ za nadzor trga pristojen za nadzor nad prepovedanimi sistemi in določenimi visoko tveganimi sistemi umetne inteligence, v EU pa spremembe tako na področju varstva osebnih podatkov kot umetne inteligence prinaša t.i. digitalni omnibus. Kaj nas torej čaka v bližnji prihodnosti - več ali manj regulacije in kakšna bo?

Andrej Tomšič
Informacijski pooblaščenec / Information Commissioner
Sreda, 11.02.2026
09:10 - 09:40
O predavatelju

Pomembni koraki pri zagotavljanju varne uporabe umetne inteligence v organizaciji

Umetna inteligenca (UI) prinaša številne priložnosti, a hkrati odpira nova varnostna tveganja, ki jih organizacije ne smejo spregledati. Predavanje bo predstavilo ključne izzive in rešitve za varno rabo UI – od strateškega upravljanja do tehničnih kontrol, zakaj UI ni privzeto varna, kako se braniti pred napadi ter preprečiti zlorabe modelov in podatkov. Udeleženci bodo spoznali orodja za testiranje in monitoring, praktične primere napadov ter nasvete za integracijo varnostnih mehanizmov.

Domen Hribar
Petrol d.d.
Sreda, 11.02.2026
15:00 - 15:30
O predavatelju
Jaka Bochl
Petrol d.d.
O predavatelju

Quantum-Proofing Images: Stopping Fake News in a Synthetic Media Age

The emergence of quantum computing threatens to invalidate current cryptographic mechanisms, creating urgent challenges for maintaining digital authenticity. Concurrently, deepfakes and manipulated imagery continue to erode public trust. We introduce Post-Quantum VerITAS, a provenance-preserving system engineered to remain secure in both classical and post-quantum threat models. Leveraging lattice-based hash constructions, post-quantum zero-knowledge proofs, and CRYSTALS-Dilithium signatures, the system maintains verifiable provenance even under quantum-capable adversaries.

In contrast to existing standards such as C2PA—which lack robustness against both image transformations and quantum cryptanalysis—Post-Quantum VerITAS offers a decentralized, quantum-resistant framework capable of verifying images after common edits. This presentation details the system’s cryptographic design, security guarantees, and resistance to quantum attacks, and discusses pathways for deploying quantum-secure provenance verification at scale.

Maksim Iavich
SCSA / Caucasus University
Četrtek, 12.02.2026
11:40 - 12:10
O predavatelju

Quishing Without Compromise: Scoping, Tools, Tricks, and Lessons Learned

Red teaming can be challenging especially when simulating real-world attacks like QR code phishing (“quishing”) within a tightly defined scope. How do you credibly launch a phishing campaign without wanting to know the specific targets, exposing sensitive information, or putting unintended users at risk? This session offers a behind-the-scenes look at how our team tackled these constraints. We will dig into some opensource tools that can be used and some custom tweaks that we made to make it more secure / believable and the pitfalls you can hopefully avoid. We will walk you through our attack chain:
(1) Redirector and how to filter the bots away
(1) Using a customized EvilGinx instance to verify the scope
(2) Creating a believable landing page for our targets,
(3) Lessons learned and possible automated attacks.

Bob van der Staak
Ignifexlabs
Četrtek, 12.02.2026
09:30 - 10:00
O predavatelju
Rutger Flohil
Ignifexlabs
O predavatelju

Secure-by-design: Building cyber-resilient products that meet UX, security, and emerging compliance standards

Security engineering isn’t enough anymore—products must now satisfy complex UX needs, evolving threat landscapes, and tightening compliance regimes. This talk unpacks how product managers and security teams can jointly build secure-by-design systems while aligning with frameworks like GDPR, the EU Cyber Resilience Act, and the upcoming EU AI Act.
We’ll cover secure defaults, data-minimization patterns, auditability requirements, model risk controls, and how to design security features that remain compliant as regulations shift, without slowing delivery or harming usability.

Kateryna Ovechenko
HBM.ai
Četrtek, 12.02.2026
09:00 - 09:30
O predavatelju

Securing Cloud-Native Supply Chains: Strategies for Fast, Resilient DevOps

This presentation addresses modern supply chain security in cloud-native engineering organizations, focusing on preventing incidents similar to SHA-1–related compromise events (e.g., “SHA1-Hulud”). Drawing from practical deployment experience with large PaaS providers, it outlines actionable mechanisms to ensure code integrity, artifact authenticity, and rapid detection and mitigation of malicious changes. Attendees will gain insights into securing CI/CD pipelines and maintaining rapid response capabilities without compromising development velocity. Emphasis is placed on aligning security practices with modern DevOps workflows to minimize risk while sustaining fast release cycles.

Matthias Luft
Supabase
Četrtek, 12.02.2026
13:00 - 13:30
O predavatelju

Smart Security: How Adaptive Authentication Is Changing the Game

Z naraščajočo kompleksnostjo digitalnih ekosistemov in porastom kibernetskih groženj postaja klasična avtentikacija vse manj učinkovita. Gesla, večfaktorska avtentikacija in statični varnostni mehanizmi pogosto ne zadostujejo proti naprednim napadom, kot so kraja identitete, napadi z izčrpavanjem poverilnic in socialni inženiring. Na predavanju bomo raziskali koncept adaptivne avtentikacije, ki dinamično prilagaja varnostne zahteve glede na kontekst uporabnika, tveganje in vedenjske vzorce. Analizirali bomo ključne komponente adaptivne avtentikacije, kot so ocena tveganja v realnem času, uporaba strojnega učenja za zaznavanje anomalij ter integracija biometričnih in kontekstualnih podatkov. Predstavili bomo primere napadov, ki jih lahko prepreči adaptivni pristop, ter o izzivih pri implementaciji.

Marko Hölbl
Univerza v Mariboru
Četrtek, 12.02.2026
11:10 - 11:40
O predavatelju

The Onion: Layered cyber security for corporations

Supply-chain attacks, red teaming, cyber resilience—these aren't buzzwords, they're your daily reality when your vendor's compromised server becomes your problem. In this talk, we'll dissect the real threats facing modern organizations, from sophisticated supply-chain infiltrations to the social engineering that bypasses your million-dollar security stack. You'll learn how to plan red team engagements that actually test your defenses against real-world attack scenarios, not just check compliance boxes. This isn't about passing audits—it's about building security that makes attackers move on to easier targets. Get ready for a rapid-fire dive into the mindset and methods that turn corporate networks from soft targets into hardened fortresses.

Tamás Bőhm
contractor
Sreda, 11.02.2026
15:30 - 16:00
O predavatelju

The Pentester’s shift: From Executor to Operator

Bi se morali etični hekerji in strokovnjaki za ofenzivno kibernetsko varnost bati, da bo umetna inteligenca prevzela njihovo vlogo?

Odgovor ni v upiranju spremembam, temveč v razvoju. Približujemo se prelomni točki, ko se vloga etičnega hekerja spreminja iz ročnega izvajalca v strateškega operaterja.

Vpliv umetne inteligence je nesporen. V naslednjih 2 do 5 letih bo ročno izvajanje zunanjih black-box penetracijskih testov, kot jih poznamo danes, po vsej verjetnosti izginilo, nadomestili ga bodo avtomatizirani procesi in delovni tokovi, ki jih poganja AI. Napadalci so že korak pred nami – vse več poročil kaže, kako izkoriščajo AI za širjenje obsega napadov in avtomatizacijo zunanjih napadov.

Toda kako daleč smo v resnici prišli? Kaj je danes dejansko mogoče, če odmislimo hype? V predavanju bo predstavljen praktični Proof of Concept (POC) AI agent, ki avtomatizira začetne faze zunanjega testa z zbiranjem OSINT podatkov, nato pa se prilagodi za samostojno eskalacijo privilegijev na Linux sistemu.

Danijel Grah
NIL d.o.o.
Sreda, 11.02.2026
10:40 - 11:10
O predavatelju

Unmasking the Shadows: Advanced Techniques for Dark Web Domain Deanonymization

The Dark Web’s promise of anonymity through technologies like Tor has long been considered its most defining characteristic—and its greatest shield for malicious actors. However, sophisticated adversaries, law enforcement agencies, and security researchers have developed increasingly advanced methodologies to pierce this veil of anonymity. This presentation will provide a comprehensive technical deep-dive into the operational techniques, methods, and procedures (TTPs) used to deanonymize Dark Web domains and their operators.

Drawing from real-world case operations, OSINT investigations, and cutting-edge research, this talk will explore the full spectrum of deanonymization vectors—from passive traffic analysis and timing correlation attacks to active fingerprinting techniques and operational security failures. Attendees will gain insight into how seemingly minor OPSEC mistakes, infrastructure misconfigurations, and behavioral patterns can cascade into complete identity exposure. We’ll examine the technical architecture of anonymity networks, identifying inherent weaknesses and attack surfaces that can be exploited.

This session is designed for penetration testers, threat intelligence analysts, red teamers, and security researchers who need to understand both offensive deanonymization capabilities and defensive countermeasures. By understanding how anonymity fails, defenders can better architect resilient infrastructure, while investigators can develop more effective methodologies for tracking threat actors. Attendees will leave with actionable knowledge, practical tools, and a realistic understanding of Dark Web anonymity’s true boundaries in 2025.

Jaime Esquivias
a.k.a Bash Bunny
Četrtek, 12.02.2026
14:40 - 15:10
O predavatelju

Zasebnost v dobi telemetrije, oblaka in regulirane digitalne prihodnosti

Predavanje obravnava, kako sodobni operacijski sistemi (Windows, macOS, deloma tudi Linux) zbirajo telemetrične podatke ter kakšen vpliv imajo oblačne storitve, kot sta Google Drive, OneDrive, iCloud in ostali, na zasebnost uporabnikov.

Osvetli nove izzive, ki jih prinaša AI-učenje podatkov v oblaku, ter razloži, kako lahko algoritmi dostopajo do dokumentov, fotografij in drugih zasebnih informacij.

V zaključku se predavanje dotakne aktualnih evropskih regulativ, kot sta Chat Control in preverjanje starosti na spletu, ter predstavi, kako te pobude vplivajo na svobodo, zasebnost in digitalne pravice posameznika.

Nejc Bajželj
Nemis, Nejc Bajželj s.p.
Sreda, 11.02.2026
14:00 - 14:30
O predavatelju

Zero Trust in the Era of AI: Why "Verify" is Broken

By 2026, "Never Trust, Always Verify" is no longer just a mantra; it's the baseline requirement for NIS2 and DORA compliance. But in an age of hyper-realistic AI deepfakes and autonomous agents, verification has become the hardest part of the equation.

How do you "verify explicitly" when a video call from your CEO might be a deepfake? How do you apply "least privilege" to an AI model that needs massive data access to function?

This session upgrades your Zero Trust architecture for the realities of 2026. We move beyond basic MFA and segmentation to explore the next frontier: Identity Assurance and Privacy Enhancing Technologies (PETs). We will break down how tools like Homomorphic Encryption and Zero-Knowledge Proofs are moving from academic theory to practical necessity - allowing you to verify data and users without ever exposing the raw secrets.

Join this session to learn how to shock-proof your Zero Trust strategy against AI-driven identity attacks and build a security model that protects not just access, but the data itself while it’s being used.

Tudor Damian
D3 Cyber
Četrtek, 12.02.2026
10:00 - 10:30
O predavatelju
11. - 12. 2. 2026
Ljubljana & online
HEK.SI
400 €

Osnovni paket: 11. - 12. 2. 2026

Prejmete le vstopnico za konferenco HEK.SI 2026!

HEK.SI & INFOSEK
850 €

Premium paket: 11. - 12. 2. 2026 in 2. - 4. 9. 2026

Ob prijavi na konferenco HEK.SI 2026, prejmete VSTOPNICO za konferenco INFOSEK 2026!

Zlati sponzorji

Sponzor tehnologije

Medijski sponzorji

Ta spletna stran uporablja piškotke. Z obiskom in uporabo spletne strani soglašate s piškotki.  DOVOLIM Več informacij o piškotkih najdete in nastavitve tukaj.