Track Schedule

Security BSides Athens 2024

Track 1 - Main Track


Time Details Info
9:45 - 10:00 Intro Dr. Grigorios Fragkos  
10:00 - 10:45 Keynote - Generational Cyber Campbell Murray  
10:45 - 11:15 Talk 1 - Evilginx for Red Teamers Andrei Grigoras  
11:15 - 11:30 Coffee Break
11:30 - 12:00 Talk 2 - Showing Off Their SCILz: Sandworm Disrupts Power in Ukraine Using Novel Attack Against OT Daniel Kapellmann Zafra  
12:00 - 12:30 Talk 3 - Gridlock: The Dual-Edged Sword of EV and Solar APIs in Grid Security Vangelis Stykas  
12:30 - 13:00 Talk 4 - Attacking Wireless Enterprise Networks Foivos Kouroutsalidis  
13:00 - 13:45 Lunch Break
13:45 - 14:15 Talk 5 - The hackers guide to AI: malicious use cases for LLMs Mackenzie Jackson  
14:15 - 14:45 Talk 6 - From Ghidra to Frida: How to train your dragon and enchance your dynamic instrumentation skills Konstantinos Mitropoulos  
14:45 - 15:15 Talk 7 - Cloud Convergence: Exploring the Interconnected World of Cloud, DevOps and AD in Penetration Testing N. Niskopoulos & M. Gyftos  
15:15 - 15:45 Talk 8 - Cyber Shadows in the Sky: The Impact of Hacking on Space Technology Eleftherios Athousakis  
15:45- 16:00 Coffee Break
16:00 - 16:30 Talk 9 - Sigma: Decoding the Future of Detection Alex Sinnott  
16:30 - 17:00 Talk 10 - Home Labs for fun and !profit (Put your home lab on your resume!) Kat Fitzgerald  
17:00 - 17:30 Talk 11 - Local Admin in less than 60 seconds [My guilty pleasure] Nikos Vourdas  
17:30 - 17:45 CTF Announcement Hack The Box CTF Team  
17:45 - 18:00 Closing Remarks

Track 2


Time Details Info
9:45 - 10:00 Go to Stream 1 (Intro) Stream 1
10:00 - 10:45 Go to Stream 1 (Keynote) Stream 1
10:45 - 11:15 Talk 13 - Recent Advances in Malicious Cryptography/Mathematics and Their Potential Impact on Malware Activity Eric Filiol  
11:15 - 11:30 Coffee Break
11:30 - 12:00 Talk 14 - From Data Deluge to actionable Insights with LLMs: Introducing "TI Mindmap" Antonio Formato  
12:00 - 12:30 Talk 15 - Deep Dive into Clouded Waters - An overview in Digital Ocean's Pentest and Security Bleon Proko  
12:30 - 13:00 Talk 16 - AI: Double-edged sword in Cyber Security Shilpa Singh  
13:00 - 13:45 Lunch Break
13:45 - 14:15 Talk 17 - Expanding Security Horizons: SIMD-Based Threats Andrii Mytroshyn  
14:15 - 14:45 Talk 18 - Stretching the Boundaries: Hunting for Elasticsearch Leaks Viktor Markopoulos  
14:45 - 15:15 Talk 19 - Securing Your Software Supply Chain: Insights from a Hacker's Perspective Yannis Folias  
15:15 - 15:45 Talk 20 - REWIRE – Cybersecurity Skills Alliance, A New Vision for Europe M. Athanatos & F. Georga  
15:45- 16:00 Coffee Break
16:00 - 17:30 Talk 21 - UNLOCKING ECHO A NEW PERSPECTIVE ON PHISHING ATTACKS - Workshop George Sotiriadis  
17:30 - 17:45 Go to Stream 1 Stream 1
17:45 - 18:00 Go to Stream 1 (Closing Remarks) Stream 1

Special Sessions


Time Details Info
9:45 - 10:00 Go to Stream 1 (Intro) Stream 1
10:00 - 10:45 Go to Stream 1 (Keynote) Stream 1
10:45 - 11:15 Go to Stream 1 Stream 1
11:15 - 11:30 Coffee Break
11:30 - 13:00 Special Session 1 - The Corporate Espionage Case: A Digital Forensics Adventure D.Georgiou, S.Pitikaris, K.Kiriakos  
13:00 - 13:45 Lunch Break
13:45 - 15:45 Special Session 2 - Block By Block: Building Your CTI Program Andreas Sfakianakis  
15:45 - 16:00 Coffee Break
16:00 - 17:00 Special Session 3 - Rising to the Challenge: Cyber Security in Greece Konstantinos Papanagnou  
17:00 - 17:30 Lightning talk - EDR Evasion Basics Panagiotis Fiskilis  
17:30 - 18:00 Go to Stream 1 (Closing Remarks) Stream 1

Lab


Time Details Info
9:45 - 10:00 Go to Stream 1 (Intro) Stream 1
10:00 - 10:45 Go to Stream 1 (Keynote) Stream 1
10:45 - 11:15 Soldering Session Georgios Roumeliotis  
11:15 - 11:30 Coffee Break - Soldering Session
11:30- 13:00 Soldering Session Georgios Roumeliotis  
13:00 - 13:45 Lunch Break - Soldering Session
13:45 - 14:00 Soldering Session Georgios Roumeliotis  
14:00 - 17:45 Go to Stream 1 or 2 Stream 1
17:45 - 18:00 Go to Stream 1 (Closing Remarks) Stream 1

Pre-Events


URL Details Info
Pre Event 1 - Leveraging Large Language Models for Advanced AI Applications: A Comprehensive Guide Satyanand Kale  
Pre Event 2 - Breaking Barriers: A Deep Dive into Bypassing Next-Gen 2FA and MFA Security Measures Muhammad Shahmeer  
Pre Event 3 - Trust me, I got this: Dumping LSASS when Debug Privilege is disabled Bleon Proko  

Network

Educate

Participate


Further information about the conference

network - educate - participate

Meet the Team