8:15 |
9:15 |
Registration |
| |
| | |
9:30 |
10:10 |
[KEYNOTE] Fueling the Future: Building Robust Engines for a Secure Digital World - Daniel Cuthbert |
| |
| | |
10:15 |
10:55 |
The Future is Trustless: How zkVMS and zkTLS Transform Bug - Anto Joseph |
| |
| |
Live Bug Bounty |
10:55 |
11:15 |
Coffee Break |
11:20 |
12:00 |
How Ecovacs robots got hacked and what we can learn from it - Dennis Giese |
Google Give Me Vulnz - Cameron Vincent |
[PANEL] AI in SecOps: Enhancing Incident Response with Intelligence |
Broken isolation - draining your credentials from popular macOS password managers - Wojciech Regula |
|
Live Bug Bounty |
12:05 |
12:45 |
Your Identity is Mine: Techniques and Insights from OS Identity Providers Research - Maor Abutbul |
What the PHUZZ?! Finding 0-days in PHP Apps with Coverage-guided Fuzzing - Sebastian Neef |
Fireside Chat - Software Supply Chain Security |
State of iOS Jailbreaking in 2025 - Lars Fröder |
|
12:45 |
14:00 |
Lunch Break |
14:00 |
14:40 |
The hidden ART of rolling shellcode decryption - Tijme Gommers |
MLOps Under Attack: Threat Modeling Modern AI Systems by Sandeep Singh |
[PANEL] Converging IT and OT security: Unified strategies for protection, detection, and response |
MacOS Lockdown Mode: A Forensic Deep Dive - Bhargav Rathod |
[WORKSHOP] Instrumenting the Unknown: Leveraging Frida for Binary Analysis on Linux by Bharath Kumar & Akshay Jain |
Live Bug Bounty |
14:45 |
15:25 |
Fuzzing Rust Smart Contracts: Writing A Bug Printer Engine From Scratch - Daniel Schmidt & Kevin Valerio |
Guilt by Association: Pwning Millions of Smart Weighing Machines with API and Hardware Hacking by Eugene Lim |
[PANEL] Navigating Data Protection in the age of globalisation |
Predator Malware: Trust Broken at the Core - Matthias Frielingsdorf |
15:30 |
16:10 |
How to Teach Threading to a Dolphin - Andras Tevesz |
[PANEL] Crowdsourced Cybersecurity: Should Companies Trust Ethical Hackers with Defense? |
[PANEL] AI versus AI : Reimagining Security Operation |
[WORKSHOP] Drawing parallels between iOS and MacOS Pentesting with DVMA - Vaibhav Lakhani |
16:10 |
16:25 |
Coffee Break |
16:25 |
17:05 |
Reversing Large Deep learning AI Models - Yashodhan Vivek Mandke |
Project Dusseldorf: finding out-of-band vulnerabilities at cloud scale - Michael Hendrickx |
[PANEL] Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense |
[WORKSHOP] Drawing parallels between iOS and MacOS Pentesting with DVMA - Vaibhav Lakhani |
|
Live Bug Bounty |
19:15 |
21:45 |
Corporate Networking Dinner Party |
END OF DAY 1 |