Spring CyberSecurityDay 2023
17. jún 2023 Prírodovedecká fakulta, Jesenná 5, 040 01 Košice
RegistrationPraktické workshopy vychádzajúce z reálnych skúseností pri riešení počítačových bezpečnostných incidentov. Možnosť sa porozprávať s ľuďmi, ktorí sa profesionálne venujú informačnej a kybernetickej bezpečnosti, spoznať nových ľudí a zasúťažiť o zaujímavé ceny.
The event is carried out as part of the Information Security is not enough to be taught, it must be lived project with the financial support of the SK-NIC Foundation.



08:30 – 09:00 – Registrácia
09:00 – 09:05 – Úvodné privítanie
09:05 – 09:50 – Lecture: Bad advice and myths about cybersecurity (Miroslav Lukáč, ESET)
10:00 – 11:00 – 1st workshop (výber zo 4 paralelných workshopov)
11:00 – 11:10 – Prestávka
11:10 – 12:10 – 2nd workshop (výber zo 4 paralelných workshopov)
12:10 – 12:20 – Prestávka
12:20 – 13:00 – Pizza a Quiz (súťaž o zaujímavé ceny nielen z oblasti informatiky)
Prednáška: Zlé rady a mýty o kybernetickej bezpečnosti (Miroslav Lukáč, ESET)
At least one time someone in the media or on the internet has probably offered you advice on how to improve your security or protect your privacy . Some advice is better, some is worse, and the rest is just plain bad ideas. Will you really be anonymous with a VPN? Is it really dangerous to use public WiFi? What about charging your phone in public places? We'll talk a little more about this and other "advice" and finally, I'll mention some practical and useful advice that really works.
Workshop č. 1: Forenzná analýza operačnej pamäte: Získavanie cenných informácií pri riešení bezpečnostných incidentov (Eva Marková – ESET / CSL PF UPJŠ)
Using forensic memory analysis we can obtain a lot of important information related to a security incident, including records of running processes, open files, memory structures, and network connections. The goal of this interactive workshop is to practically demonstrate the procedures for extracting and analyzing this information. Participants will learn how to use the Volatility tool and also techniques that will allow them to detect potentially dangerous activity.
Workshop č. 2: Klasifikácia malvéru pomocou neurónových sietí – František Kurimský / Richard Staňa (CSL PF UPJŠ)
Malware classification helps analysts understand the behavior of malicious files. During the workshop we will look at ways to obtain a scored dataset. We will show several options for visual representation and proposals for neural network models for this classification problem.
Workshop č. 3: Bezpečnosť mobilných zariadení – Michal Šafranko (IstroSec / CSIRT-UPJS)
The theoretical part of the workshop will cover the most common attacks on mobile phones, including technical details and methods of protection against them. During the practical part, we will go through key settings related to privacy and security on mobile phones.
Workshop č. 4: Pasce na chytanie útočníkov – Pavol Sokol (CSIRT-UPJS)
From the point of view of protecting an organization, fraudulent systems represent an irreplaceable element. They allow the organization to obtain valuable information about attackers in the form of the attack vector, target of the attack, the tools used and the information sources used. The most famous fraudulent technique is honeypots – traps for attackers. During the workshop, we will take a closer look at what honeypots are, how they work and what benefits they bring to the organization.




