Keynote
A Conventional, Yet Unconventional Law Enforcement Career...
by Craig Jones, @Twitter
Abstract: The evolution of digital and cybercrime over the past four decades has been shaped by rapid technological advancements, shifting threat landscapes, and evolving defensive strategies. This presentation offers a firsthand perspective on navigating a career in this dynamic field from the early 1980s—when cyber threats were emerging alongside personal computing—to the complex, AI-driven cybercrime ecosystem of 2025. Key milestones in digital forensics, threat intelligence, and cybercrime will be highlighted, along with lessons learned from working on the frontlines of cyberspace. Attendees will gain insights into the skills, adaptability, and strategic thinking required to combat cyber threats across eras, as well as predictions for the future of cybercrime and defence.
Bio: Craig Jones is an international cybersecurity and law enforcement expert with over four decades of experience. As INTERPOL’s Director of Cybercrime (2019–2024), he led global operations, strengthened cyber resilience, and disrupted transnational criminal networks. Craig expanded INTERPOL’s Global Cybercrime Programme, fostering real-time cooperation across its 196 member countries and addressing emerging digital threats through innovative operational models. He also played a pivotal role in INTERPOL’s contributions to international cybercrime negotiations, including the UN Ad Hoc Committee on Cybercrime and OEWG.
Previously, Craig held senior roles in UK law enforcement, focusing on cybercrime at local, regional, and national levels. Since retiring from the National Crime Agency in 2024, he continues to collaborate with industry leaders, academic institutions, and policymakers worldwide. Recognized globally as a thought leader and strategic advisor, Craig is committed to building resilient cyber ecosystems and advancing global efforts to combat cyber threats.


Talk #1
Talk 1 TBA
by Speaker 1a, Speaker 1b, @Twitter1a , @Twitter1b
Abstract: Speaker Abs
Bio: Speaker a
Bio: Speaker b

Talk #2

Talk #3

Talk #4

Talk #5

Talk #6

Talk #7

Talk #8

Talk #9

Talk #10

Talk #11

Talk #12

Talk #13

Talk #14

Talk #15

Talk #16

Talk #17

Talk #18

Talk #19

Talk #20

Talk #21

Talk #22

Talk #23


Workshop #1



Special Ses. #1
Paint it... Purple: Wireless Security at the Operating Table. A workshop not for the Faint-of-Heart
by D.Georgiou, K. Kiriakos, S.Pitikaris, @Twitter , @Twitter , @Twitter
Abstract: This hands-on workshop explores offensive (Red Team) and defensive (Blue Team) wireless security techniques, culminating in a Purple Team approach for proactive defense. Through live demonstrations of Wi-Fi attacks (e.g., WPA2 cracking, Evil Twin) and countermeasures (WIDS/WIPS, secure configurations), participants will gain practical skills to enhance cybersecurity posture and mitigate evolving wireless threats.
Learning Outcomes
• Master Wireless Attack Techniques: Participants will learn to identify, scan, and exploit wireless network vulnerabilities by capturing WPA2 handshakes and setting up rogue access points using industry-standard tools like Aircrack-ng, Wifite, Kismet, Bettercap, WiFi Pineapple etc..
• Build Robust Wireless Defenses: Attendees will gain hands-on skills to configure secure Wi-Fi setups (e.g., WPA3, Enterprise 802.1x authentication, MFA and strong encryption, Walled Garden Guest portals) and deploy detection/prevention strategies (WIDS/WIPS and hardening) to counter attacks like Evil Twins and unauthorized access attempts.
• Apply Purple Team Synergy: Participants will understand how to bridge Red and Blue Team efforts, using attack insights to enhance defensive measures and foster a proactive, collaborative approach to wireless security.
Notes for Participants
The instructors will provide a detailed handout to guide you through the session. Expect:
• A list of tools (Aircrack-ng, Kismet, Bettercap) with download links and setup instructions for the Kali Linux lab.
• Step-by-step guides for key demos: capturing a WPA2 handshake, launching an Evil Twin attack, and configuring a secure router.
• Online resources for further exploration (e.g., WPA3 specs, WIDS/WIPS tools).
• Log analysis tips and sample configs to spot and stop wireless threats.
Bio: Dimitris GEORGIOU is a senior consultant with more than 20 years of experience in IT and Cybersecurity. He is Chief Security Officer and Partner at Alphabit Cybersecurity, a cybersecurity firm in Athens, Greece. He has diverse studies in the humanities and Computer Science and holds professional certifications in Information Security, Digital Forensics and Payment Security. He is member of BCS, IEEE, ACM and ISC2. He participates at the ISC2 Chapter Advisory Committee and volunteers as a Member of the Audit Committee of the ISC2 Hellenic Chapter and the BCS Hellenic Section. He consults organizations on how to effectively reduce cyber risk, conducts security audits and digital forensics investigations. He is a registered Judicial Expert, and Negotiator for the Athens Chamber of Commerce and Industry on cases pertaining to digital technologies.
Bio: Konstantinos KIRIAKOS, a computer science engineering graduate, transitioned from the world of software development to pursue his dream in Cybersecurity. Drawn to the intricate challenges and complexities of Cybersecurity, he embarked on this journey by earning the CC certification from ISC2. Today, he specializes in diverse areas like digital forensics, penetration testing, and consulting. His focus goes beyond identifying vulnerabilities; he actively contributes to evolving organizational defenses in all aspects by building robust security postures and empowering staff through comprehensive training sessions.
Bio: Spiros PITIKARIS is a Cyber Security Consultant and has been a part of Alphabit Cybersecurity for 4 years. With a BSc and Msc in Cyber Security he also holds professional certifications in Information Security, Digital Forensics and Penetration Testing. He combines a passion for the offensive side of cybersecurity with a keen interest in the defensive realms of digital forensics and incident response. His expertise and interests span various technologies, including application security, threat hunting and malware analysis.


Special Ses. #2
Cyber Security Challenge: Redefining CTFs
by K.Papanagnou, C.Pliatsikas, @Twitter , @Twitter
Abstract: Join us in a cumulative talk around the Cyber Security Challenge Greece. We will explore how we have addressed outreach challenges and enhanced the CTF experience with our real-life scenario CTF approach, moving away from the traditional Jeopardy style. Additionally, we will examine trends in participant preferences based on skill levels, as well as provide a walkthrough of the scenarios presented in the 2025 edition.
Bio: Konstantinos is a Senior Penetration Tester at NVISO Security and the Technical Director of the Cyber Security Challenge Greece.
Bio: Christopher is a former NVISO Expert Security Engineer, currently working as an ICS/OT Cyber Security Engineer at Powerfactors. He is a Linux enthusiast, an LPI-approved Instructor, and a strong advocate for FOSS. Passionate about home lab projects, he continuously explores and experiments with new technologies. On the academic side, he holds an MSc in Cyber Security and is currently pursuing a second MSc in Computer Networks & IoT. He has earned several certifications, including GCIH, GDSA, GICSP, LPIC-3 Security, CCSK, and CCNA, among others.

Special Ses. #3

Special Ses. #4


Pre Event #1
PreEvent1 TBA
by PrEv1a, PrEv1b, @Twitter , @Twitter
Abstract: PrEv1 Abs
Bio: PrEv1a Bio
Bio: PrEv1b Bio

Pre Event #2

Pre Event #3

Pre Event #4

Pre Event #5

Pre Event #6