Siirry sisältöön
Hacker’s Corner

Hacker’s Corner

Tuesday 29.10. 10:30–13:00

Immerse yourself in the excitement of our Red Teaming Capture The Flag (CTF) competition. This is your chance to test your skills, collaborate with peers, and tackle real-world security scenarios.

Focus on Red Teaming CTF:
Test your skills, engage with top professionals, and tackle real-world challenges in our Red Teaming Capture The Flag (CTF) competition.

How to Participate:
Register for Cyber Security Nordic to secure your spot in the CTF. Don’t miss out—register now!

Tuesday 29.10. 14:45–15:15

Wednesday 30.10. 10:45–11:15 & 11:30–12:00

Don’t miss this eye-opening demonstration on how viruses can target and infect a Mac! Join us to learn valuable insights from real-world hacking techniques and how to protect your system. – WithSecure

Speakers:

Hannu Uchida
Ville Korhonen

Tuesday 29.10. 13:00–14:15
Wednesday 30.10. 14:30–15:15

Security breach in the defender’s point of view.

Demo in brief

1. Attack demonstration from the attacker’s view
• Initial breaching techniques
• Security breach demonstrating for example data leak

2. Simultaneous defender point of view
• How breach is seen in defender’s systems
• Possible defending actions

3. Wrap up – Lessons learned
• Why monitoring & response capability is important

Target audience: Semi-technical

Tuesday 29.10. 15:15–16:30

Discover how to demand more from the security of critical infrastructure and protect what matters most.

Wednesday 30.10. 12:00–13:00

In this demo you will see how Vectra AI works in close to real life scenario when attackers is using network, identity and O365 as an attack surface. Session is for security engineers, SOC analyst or anyone who like to see how Vectra AI really works

Wednesday 30.10. 13:00–14:15

Imagine if you could watch every step they taken… Unmasking a threat actor activity is sometime like deciphering an ancient manuscript, but what if you can see every move and control when to strike the pause.

This session is not about log analysis, or following the breadcrumbs left by an elusive adversary. It is about having a full timeline of the threat actors machine and knowing exactly what was done without assumptions or guessing!