– bidding preparation
– budget/forecast planning and implementation
– strategy development
– cybersecurity (SIEM,vulnerability scanning&assessment)
– malware analysis/development (eh)
– security systems architecture
– security analysis
– project implementation
– programming security applications (Public Key Infrastructure, cryptography, etc.)
Challenges in creating challenges
The presentation is focused on explaining the task of overcoming the difficulties encountered on creating a challenge. For instance, creating a crippled symmetric encryption algorithm which should have only one weakness is in itself difficult if not tested properly because it can introduce several different vulnerabilities which are maybe easier to exploit in order to get to the flag. Or creating a capture of a non-deterministic exploit such as it was at ECSC with Openssl heartbleed.
And of course some lessons learned.
Are you the next cyber security superstar?
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
Sponsors & Partners
They help us make this conference possible.
Orange „brings you closer to what matters to you”.
This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.