Version pre_release

Events

  Title Track Speakers
Event small
BoF (birds of a feather) talks
Event small
Challenges and pitfalls of modern deep learning computer vision models
- Evolution of Computer Vision models (from hand-crafted to powerful deep...
Main_Track
Event small
Consequences of lack of security in the hospitals
Event small
Controlling Shadow IT with Symantec Cloud Access Security Broker
Symantec Cloud SOC enables you to confidently use cloud applications and...
Main_Track
Event small
Cryptoparty
Event small
DDoS? Detected. Mitigated. Protected. Automated.
Advanced flow-based DDoS detection and mitigations techniques with a focus on...
Event small
Delivery and Monitoring of Internet and Mobile Transactions
TLS/SSL is the security protocol which provides confidentiality,...
Main_Track
Event small
Designing a private blockchain
How and why design a private blockchain? What are the requirements and...
Event small
DLP - a flagship in your data protection strategy
How do you safeguard business sensitive and personal data? By using your...
Main_Track
Event small
Fingerprint authentication mobile banking applications
By adding the fingerprint reader, a new way to authenticate users has been...
Event small
From incident to threat response
"Structural threats cannot be handled incidentally". Having a good incident...
Event small
FSec2017 opening ceremony
Event small
Future of Payments in EU - PSD2
PSD2 (Payment Service Directive) introduce new players in payment arena (AISP...
Main_Track
Event small
Gateway as a single point security platform
Event small
GDPR Round Table
- Moderated by doc.dr.sc. Goran Vojković - Intro talk by doc.dr.sc. Marija...
The old hunters bloodborne scej
Gender inequality in Computer Science
Short study on origins of gender inequality and ways improve things in the...
Event small
General Data Protection Regulation Workshop
GDPR was approved by the EU Parliament on 14 April 2016. GDPR will be...
Event small
Glimpse into apps that support sending 300+ million messages daily
Every great company’s success starts with having a great product. To write...
Main_Track
Event small
Hiding malware payloads with Autoit
Attackers take advantage of richness of Autoit language to develop fully...
Event small
How (not) to fail as a security professional
Cyber security jobs are growing significantly faster than information...
Event small
How secure is eduroam?
In this talk we give a detailed desription of security flaws when using the...
Event small
HTTP for the Good or the Bad
Today, the classic infection vectors remain SMTP and HTTP. Many spam &...
Event small
JobFair CoAdria
Event small
JobFair InfoBip
Event small
JobFair Njuskalo
Event small
Keynote: Alan Duric
Event small
Keynote: Jaya Baloo
Event small
Lunch #1
Event small
Lunch #2
Event small
MaliO teaching a machine to detect malware
MaliO is a machine learning framework that successfully detects new malware...
Event small
Metasploit 5
<p>This year, we provided a public roadmap of where Metasploit was heading....
Event small
NIS Directive - what is it all about?
EU adopted NIS Directive more than a year ago. Deadlines for transposition...
Main_Track
Event small
Orga team rant, CTF Results and Ending ceremony
Event small
OWASP Meetup
OWASP meetup at FSec
Event small
Party on the Northern balcony
Event small
Party - Rogoz (Near the Fountain)
Play ctf
Play CTF!
With this talk I want to motivate you to play CTFs and showcase various...
Event small
p≡p ≡ pretty Easy privacy
p≡p motivates a new standard to securely encrypt and verify written...
Event small
PSD2 Round table
Moderated by: Alen Beganović - CEO - Ethernaut Attendees: - Milan Parat...
Event small
"Public" data in AWS S3/EBS
Cloud computing permeates many aspects of our lives, and it’s going to be a...
Event small
Pwn HiSilicon DVR devices
Presenting technical details of a 0-day (2017) vulnerability and exploit PoC...
Main_Track
Event small
Ransomware
Ransomware is in present everywhere. There are continuous news about...
Main_Track
Event small
Registration
Event small
Secure telco voice design
Telecom voice network systems are a bit different from typical IT systems due...
Main_Track
Event small
Security Operations Center (SOC)
What is a SOC, why do we need it and how to implement it. The lecture will...
Main_Track
Event small
State of infosec in Croatia
Kraken red full
Submarines having a heart attack
Main_Track
Event small
Targeted attacks in 2017, what's up ? What's next?
- An overview of some attacks occured since the last conf (and not...
Event small
The state of web browsers vs. DOM fuzzing in 2017
Historically, DOM implementations have been one of the largest sources of...
Event small
The Trouble with Updates
Efficient and automated software update and patch infrastructure is one of...
Main_Track
Event small
TLS/SSL Transactions and PCI DSS, 3-D Secure, PSD2 & GDPR
TLS/SSL is the security protocol which provides confidentiality,...
Main_Track
Event small
Trying to run SSL HSM farm on the budget
HSM is expensive piece of equipment so we tried to circumvent this by using...
Main_Track