Welcome to Mälarsalen at Münchenbryggeriet in Stockholm.
You are greeted by a Truesec colleague by the registration desk and will have coffee before we take off. Welcome!
The Red Team and the Blue Team will be joining forces to improve your organization's cybersecurity capacity. Which team will you play for?
All sessions will be based on actual events and the experiences of our expert teams during real-world incidents.
Select your preferred talks from either of the tracks. There will be enough time to switch rooms between sessions if you want to mix it up a bit.
All sessions will be presented in English unless otherwise indicated.
Welcome to Mälarsalen at Münchenbryggeriet in Stockholm.
You are greeted by a Truesec colleague by the registration desk and will have coffee before we take off. Welcome!
Our CTO Fabio will present the current cyber threat landscape, the trends, and insights from the Truesec teams.
Speaker: Fabio Viggiani
It's time for you to choose which session from the two tracks you would like to attend.
Enjoy a 30-minute break, visit our partners in the exhibit, and grab a cup of coffee and load up with some energy.
Ask the speakers anything in our Experts-corner, challenge yourself in our Purple Team War Room, or listen to our partner Svenska Röda Korset in our Speakers Corner.
The war in Ukraine has galvanized the attention of world. Yet, few organizations could foresee the escalation of an ongoing five-year conflict.
Engaged on the front lines in Eastern Ukraine since the onset in 2014, the Red Cross continues to respond to a wide range of emergency needs in an extremely challenging environment.
This session will give you a deeper insight on the work of the Red Cross Movement in Ukraine.
Speaker: Andrei Engstrand-Neacsu
Head of Ukraine and impacted countries crisis response, Swedish Red Cross
Are you ready to battle a severe incident, and collaborate with a dedicated incident response team?
When you are the target of a cyber attack, do you know what to do? How to behave? When to act? Simply put, are you prepared to manage an attack against your organization?
Rasmus will with real cases as examples cover multiple methods of how you can prepare for and manage severe attacks against your organization. The dos and don’ts, as well as how to include, collaborate and work together with a dedicated incident response team.
Speaker: Rasmus Grönlund
In the last few years, many organizations have suffered from ransomware attacks. Recovering from a ransomware attack usually requires backups, but in some cases, there are other ways.
Alexander is a Principal Forensic Consultant in Truesec CSIRT. In this session, he will showcase his team’s latest research in ransomware decryption capabilities. The research breaks an entire family of ransomware variants and allows victims to restore encrypted data without obtaining the private keys.
Speaker: Alexander Andersson
Join us on a winding journey where we investigate what has happened during a cyberattack, and who might be behind it.
Threat actors often try to hide where they come from, and it's our job not to be fooled by false leads.
Speaker: David Lilja and Hasain Alshakarti
Network security philosophy and firewalls as the primary enforcer of solid IT security have historically been many organizations' sole and major strategy. As traffic patterns change and threats evolve, this strategy is no longer successful.
In this session, network security expert Heresh will share insights about common mistakes from a real-life cyber-incident perspective.
Speakers: Heresh Zaremand
How do VMware vSphere platforms get attacked and encrypted?
We will go through real-world examples from attacks and give you recommendations on how you can protect your environment from getting breached by the new wave of ESXi-targeting ransomware.
Speaker: Anders Olsson
Most backup solutions are not designed for today’s real threat, cybercrime.
Join this session to learn how you should architect your existing solution to protect you from cyberattacks, ransomware, and other threats.
Speaker: Mikael Nyström
By combining reverse engineering of the different malware used and studying the actual war, we can see how the code was affected by different requirements.
Gain deep insight into the technical details of three Russian Wiper malware used in cyberattacks against Ukraine during the conflict, how they were employed, how they differ, and how this relates to the physical war in Ukraine. We will show how the Russian Cyberwar in Ukraine was integrated into the kinetic war, where it succeeded, where it failed, and maybe why we haven’t seen more written about it.
Speakers: Mattias Wåhlén and Nicklas Keijser
Enjoy a long lunch in the exhibit area and listen to our partners presentations in our "Speakers Corner".
AI, ML, and Data Science have become buzzwords, and are often misunderstood and misused when trying to understand attacker behavior. In this session, Vectra will reveal the true meaning of AI when applied to threat detection. Learn how, with the use of AI, we can reveal a true attack signal that becomes prioritized intelligence helping security teams get ahead and stay ahead of attacks.
Speaker: Stijn Rommens
Director Security Engineering, Vectra AI
By building on EDR, XDR can make all telemetry accessible and actionable — incorporating data from across endpoints, cloud workloads, identity, email, network traffic, virtual containers, sensors and more to generate XDR detections.
Speaker: Per Ă–sterberg
Partner Solutions Architect, CrowdStrike
In this talk, we will look at the sequence of events following a ransom DDoS attack
against a Swedish company and how Baffin Bay Networks, through its Threat Data, could
identify all companies globally targeted by the same group.
Speaker: Joakim Sundberg
CTO / Founder Baffin Bay Networks
Get the highly appreciated talk from Def Con.
CSRF is (really) dead. SameSite killed it. Browsers protect us. Lax by default!
Sounds a bit too good to be true, doesn't it? We live in a world where browsers get constantly updated with brand-new web features and new specifications. The complexity abyss is getting wider and deeper. How do we know web technologies always play perfectly nice with each other? What happens when something slips?
Speaker: Dongsung "Donny" Kim
Modern IT environments offer passwordless authentication to improve security. Certificate and key-based authentication makes the user's life easier and gives the offensive side an excellent opportunity to obtain versatile credentials.
This technical session will provide detailed demos and discussions about the different attacks and using certificate- and key-based authentication in a Windows environment ranging from certificate services misconfigurations and abuse to Windows Hello for Business keys and sessions.
Speakers: Hasain Alshakarti and Carlo Alberto Scola
Grab a cup of coffee and something sweet and hang out in the exhibition. Ask the Experts anything, challenge yourself in our Purple Team War Room, or listen to our partner Dustin in the Speakers Corner.
Managing and securing a device in its full lifecycle is made easy. It all starts with a touch of one button and ends by securing the device with takeback.
We talk about how managed services can help small and medium-sized companies stay at the forefront by securing the environment, and in cooperating with Truesec, monitoring the device. Ultimately, we ensure that the data is securely handled and recycled sustainably.
Speaker: Rasmus Burkal
Service Product Manager Security, Dustin
Join in on this hands-on, step-by-step demo on how to deploy a complete Remote Access Trojan (RAT) with no detection in a fully monitored Microsoft Defender for Endpoint environment.
Speaker: Mikkel Ole Rømer
In modern software development, CI/CD platforms such as GitHub are often used to store code, test changes, and even deploy to production. This introduces fantastic possibilities in visibility and productivity for the development pipeline. It also means that the platform must have high privileged access to the production environment.
We may have restricted the developers’ direct access to the production environment and be confident we’ve introduced protections in CI/CD to ensure no malicious deploys can happen.
In this session, we’ll look at abusing insecure defaults and common misconfigurations to bypass protections and gain production access from lower privileged access to the platform. Examples are focused on GitHub Actions.
Speaker: Sebastian Olsson
How do we secure Azure AD administration in a Tiering manner?
Join this session to learn the why, how, and when you should implement this mindset towards the cloud.
Speaker: Viktor Hedberg
Join this session to learn the new cool things about Windows Server 2022 and System Center 2022 features you need to know.
Speakers: Mikael Nyström
Want to know about the features you already have in your Windows Enterprise setup? What can help you prevent ransomware and protect users even without them knowing?
Get to know features like AppLocker, Credential Guard, and Attack Surface Reduction rules. Learn how to use the tools you already have to increase your security posture.
Speakers: Peter Löfgren
Grab a cup of coffee and something sweet and hang out in the exhibition. Ask the Experts anything, challenge yourself in our Purple Team War Room, or listen to our partner Dustin in the Speakers Corner.
Managing and securing a device in its full lifecycle is made easy. It all starts with a touch of one button and ends by securing the device with takeback.
We talk about how managed services can help small and medium-sized companies stay at the forefront by securing the environment, and in cooperating with Truesec, monitoring the device. Ultimately, we ensure that the data is securely handled and recycled sustainably.
Speaker: Rasmus Burkal
Service Product Manager Security, Dustin
Prompt abuse is a real threat. In this session we will cover how to safeguard the MFA registration in Azure AD and stop threat actors from entering their own MFA credentials.
Speakers: Marcus Pettersson and Viktor Hedberg
If your Active Directory gets breached by threat actors, you need to make sure your underlying infrastructure doesn’t also get breached. We will show you how to design and implement segmentation that is both secure and manageable.
Speakers: Jörgen Brandelius and Anders Olsson
A problem with "Oceans 11" and other heist movies is that they make it seem like robbing a bank is hard. Human nature does not allow us to be alarmed adequately at threats that seem advanced or extreme. Simply because we like to tell ourselves that would never happen in real life, or they are not worth that kind of effort.
In this closing session, Jayson E Street will execute attacks with minimum effort, technique, or tools. You may not feel the need to worry about a nation-state attacker, but you should be concerned by a random person walking off the street and compromising your systems in less than 30 seconds.
Jayson will take you through a bank robbery in real-time via a hidden camera and show you that people can still be victims of their wrong assumptions even in high-security areas. Most of us have biases, but we may not even be aware of them. Yet, we can still gain skills to spot suspicious behavior. Learn how untrained workers are a severe threat. However, workers educated in Security Awareness can be the biggest asset to a company's security posture.
Speaker: Jayson E. Street
To sum up the day and hang out with attendees, speakers, partners, friends, collegues and exhibitors.