the biggest IT security conference in CEE

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=8xQNf1C1bWc



Duration: 1:32
0 views
0


CONFidence - 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CONFidence

http://confidenceconference.com/

Life is about making choices that eventually put us somewhere between ‘ordinary’ and ‘legendary’. We started CONFidence 17 years ago hoping it would eventually grow into one of the most valued events for security experts and enthusiasts worldwide.

Finally we can announce that CONFidence 2022 will be OFFLINE again! Let’s meet at the Krakow Aviation Museum with hackers, security experts, and IT specialists from different backgrounds and regions. Book June 6th - 7th and buy your ticket now so you don't miss the best conference!

It’s 2022 and CONFidence is proud to be ever more ambitious in spreading awareness about cyber threats among European IT sec specialists, developers, managers, bankers and governmental representatives.

One of our top priorities has always been to deliver practical, relevant, and diverse content across the different fields of IT security. Thanks to our cooperation with experts representing a great variety of backgrounds, as well as active, security-focused IT communities, we know what it takes to offer our attendees both highly technical and state-of-the-art expertise.

- practical presentations packed with case studies and hands-on experiences,
- great workshops allowing you to test newly-acquired skills,
- solutions immediately applicable to your professional routine
- discussions with international experts focused on recent events (covering burning questions and timely challenges).

The best of the best from all over the world come to CONFidence every year to share their knowledge
Get to know new problems and solutions in cybersec.
Finally you will be able to talk with everyone, discuss new technology and enjoy time with other participants.
Prepare yourself for a whole night of networking and fun.
It will allow you to apply for points necessary for an expert certificate in the field of ICT security.




Other Videos By All Hacking Cons


2022-01-27Vulnerabilities for Sale The Good, the Bad and the Ugly Udo Schneider
2022-01-27How Neurodiversity can be Leveraged for an Excellent ROI Megan Roddie
2022-01-27Gdy umiera framework… Studium przypadku CVE 2018 12533 Daniel Kalinowski
2022-01-27Day One
2022-01-27Let's play a game challenges Konrad Antonowicz, Bartosz Dzirba, Dom Storey
2022-01-27Cyber Policja co to i z czym to sie je lukasz Pietrzyk
2022-01-27Latest Android threats and their techniques Lukas Stefanko
2022-01-27Utilizing YARA to Find Evolving Malware Jay Rosenberg
2022-01-27Breaking Extreme Networks WingOS How to own millions of Josep Pi Rodriguez
2022-01-27The magic of XSS not only in web applications Michal Bentkowski
2022-01-27the biggest IT security conference in CEE
2022-01-27Kradziez tozsamosci problemem spoleczenstwa informacyjnego XXI Jan Klima
2022-01-27A Monitoring Platform for Kubernetes Valentine Mairet, Vincent Ruijter
2022-01-27Security of the IVR systems and call centers Aleksandr Kolchanov
2022-01-27Sneaking Past Device Guard Philip Tsukerman
2022-01-27Is your browser secure Breaking cryptography in Michal Jarmolkowicz
2022-01-27Sandbox dla PowerShell'a zrob to sam Dawid Pachowski
2022-01-27Revenge of The Script Kiddies Current Day Uses Ophir Harpaz, Or Safran
2022-01-27Into the Fog The Return of ICEFOG APT Chi En Ashley Shen
2022-01-27SIEM wedlug potrzeb Elasticsearch, Energy Logserver, Wazuh, Bro
2022-01-27Vulnerabilities from a grave Forever dead or maybe alive Michal Sajdak



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering