Jan Kopriva
Team Leader ALEFs Computer Security Incident Response Team (CSIRT)
BIOGRAPHY
Jan works as a Team Leader of ALEFs Computer Security Incident Response Team (CSIRT). He spends most of his working hours dealing with security incidents, malware analyses and other traditional Blue Team activities, although more and more of his time is taken by penetration tests, security reviews and teaching security-related courses. In his free time, Jan likes to delve into independent security research and write articles and talk at conferences to further awareness of security issues among both IT professionals and the general public.
OSSTMM: The “Measure, Don’t Guess” Security Testing Methodology
The Open Source Security Testing Methodology Manual (OSSTMM) is – as it names suggests – a security testing methodology. Although almost anyone who deals with IT security testing has at least heard of it, not many use it in its original form. Most penetration testers, for example, usually take parts of it and incorporate them in their own methodologies. While this is not a bad approach, OSSTMM is quite powerful when used as a whole because then it allows us to test and/or audit security controls in a way which gives us a good and repeatable measure of the attack surface for any assets we are trying to protect. This gives us similar benefits for determining a size of an attack surface which CVSS gives us for measuring the severity of a specific vulnerability.
With version 4.0 of OSSTMM about to hit the metaphorical shelves, it is a good time to have a closer look at what the methodology can offer both when used as a whole and when only some parts are utilized during a security test. Which is what we’ll do in this talk.
Open Directories: Sensitive data (not) hiding in plain sight
As a part of long-term research into the security of Czech and Slovak Internet (.CZ and .SK domains and/or IP addresses geolocated within CZ or SK), ALEF CSIRT conducted an analysis of data from several thousand freely accessible open directories. Many files from these directories turned out to be quite interesting as Jan will discuss during his talk.
Are you the next cyber security superstar?
If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.
Other speakers joining this year
Stefan Tanase
Principal Security Researcher, Application and Threat Intelligence Ixia, a Keysight business
Ionut-Cristian Bucur
Security Research Intern, Application & Threat Intelligence Ixia, a Keysight Business
Leo Neagu
InfoSec Team Lead SecureWorks
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
COMPETITIONS
Sponsors & Partners
They help us make this conference possible.
POWERED BY
Orange Business is a key division of Orange Romania, specializing in providing cutting-edge communication, technology, and digital transformation solutions tailored to businesses of all sizes. With a strong emphasis on innovation, Orange Business offers a wide array of services, including high-speed connectivity, cloud computing, cybersecurity, Internet of Things (IoT), and managed services. Their mission is to support organizations in their digital transformation journey by enhancing operational efficiency, improving customer experience, and maintaining a competitive edge in a rapidly changing digital environment.
Orange Business combines deep technological expertise with a customer-centric approach, ensuring that each solution is customized to meet the specific needs of their clients. Their commitment to innovation and excellence makes them a trusted partner for businesses seeking to thrive in the digital age.