UISGCON is the oldest and well-known Ukrainian conference on Information Security, driven by community and organized under the aegis of the NGO "Ukrainian Information Security Group" (UISG).
This is the place where cybersecurity vendors meet potential partners, customers, and people who are interested to know about their products and services, where it is possible to discuss current trends of the IT industry with specialists and prepare for new challenges. Among visitors there are a lot of those who consider cyber security as important and interesting topic, people who have questions and ones who have answers, those who look for experience and those who want to share it.
Many CEO's, CSO's, CISO's, CFO's of product companies, credit and banking system, transport industry, power engineering, engineering, communications, software developers, consulting companies, integrators, government regulators, freelancers, students and professors of profile universities and faculties, bloggers, IB journalists, and many others who are interested in UISGCON every year.
For many years, UISGCON remains at the forefront of innovation in information security. And this year there will be no exception.
UISGCON14 will open its doors on October 26, 2018 in the city center of Kyiv, the capital of Ukraine, to all those who wish to attend our event. Speakers from Ukraine and other countries will make presentations in full 45-60 minutes format and lightening-talks 15-20 minutes format. And those who want to obtain practical knowledge or test their hands-on skills are welcome to attend CTF-challenge and workshops. Keep up with the news on social networks . We are looking forward to seeing you in Kyiv!
The UISG CTF is happening this year!
The main benefits of any conference are opportunities to meet like-minded people, share and develop ideas, raise visibility and get inspired. That is why we have chosen the target audience of our conference CTF to be students who just recently became interested in information security and want to challenge themselves, but participation will be open to everybody. At the end of the competition there will be two rankings: for current students with awards and prizes, and overall scoreboard.
A wide variety of skills in searching for vulnerabilities and crafting exploits will be needed in order to capture the flags. The CTF tasks will have easy-to-medium complexity, but will be based on realistic scenarios. Thus, the UISG CTF is a an excellent opportunity to show your skills to prospective employers, as at the end of the competition we will identify the top students - young and promising employees.
Here are five facts about the UISG CTF:
Registration date will be announced soon! #FRD
|Registration, morning coffee|
|9:40||Māris Priekulis, How does GDPR influence business in Ukraine||Yan Kravchenko, Evolution of Application Security Programs||Nazar Tymoshyk and Igor Kchoroshenko. F*AWS means - Fuckups in AWS security||CTF|
|10:00||Paul Alderson, Is IPV6 killing your privacy?|
|10:20||Logan Hicks, Weaponizing GDPR for Destructive Purposes|
|10:30||Kostiantyn Korsun. System of Cybersecurity in Ukraine: reality or myth?|
|10:40||Oleksiy Semenyaka, Hidden threat or address space fraud|
|11:00||Dmytro Borovyk, “Bot Management as a critical part of layered security”|
|11:20||Maksym Litvinov, Andrii Okaievych and Serhii Mikhalap. Cyberwar in Ukraine. Collective defence.||Women in appsec Kyiv. Networking.|
|13:10||Oleg Muravskiy. Internet Routing Security and How RIPE NCC’s Tools Help You Cope with It||Oleksandr Tsaruk, Cyber threats and opportunities embedded in the Fourth Industrial Revolution||Andrey Voloshin and Sasha Olenyev. Reverse Engineering Hardware & Firmware|
|13:30||Alexander Adamov, Creating Ransomware Decryptors|
|13:50||Aleksandr Mezherytskyi, Docker in penetration testing|
|14:00||Eugene Pilyankevich. Usability vs security: operating security tools in large-scale infrastructures|
|14:10||Chris Pfoutz and Bence Szabo, New Application Vulnerability|
|14:30||UISGCON14 PANEL DISCUSSION. SPECIALISTS ABOUT CYBER SECURITY EDUCATION IN UKRAINE|
|14:50||Volodymyr Styran. Social-Engineer Your Security Budget (The White Hat Way)|
|16:00||Christopher Pfoutz. Application Pen Testing||Oleg Bondarenko, eCrime and IO Trends in EMEA for 2018||TBD|
|16:20||Logan Hicks and Thor Odinson, Hacking Customized Missiles, Rockets, and Hyper Sonic Projectiles|
|16:50||Dimitri van de Giessen. How MS responded when they were hacked - A real life POV story by Dimitri|