About CONFidence

18 years of experience in creating an extraordinary tech event for the IT security community. An international cybersecurity conference that combines deep-dive technical lectures and workshops with networking and open skill-sharing. This is CONFidence!

We spread awareness about cyber threats among infosec specialists, developers, managers, bankers and governmental representatives. One of our top priorities has always been to deliver practical, relevant, and diverse content across the different fields of IT security.

Thanks to our cooperation with experts representing a great variety of backgrounds, as well as active, security-focused IT communities, we know what it takes to offer our attendees both highly technical and state-of-the-art expertise.

Join us for a physical event in Krakow on 5-6 June 2023. Meet hackers, security experts, and IT specialists from different regions. During the 22nd edition of CONFidence you’ll discover:

- practical presentations packed with case studies and hands-on experiences,
- great workshops allowing you to test newly-acquired skills,
- solutions immediately applicable to your professional routine,
- discussions with international experts focused on recent events (covering burning questions and timely challenges).

Can’t wait to see you there!

Join Us

CFP

Would you like to participate as a speaker? Apply now and join Confidence 2023!

APPLY NOW

TICKETS

Buy a ticket for the stationary edition of Confidence 2023.
See you in Krakow!

BUY IT

What do we offer?

TOP SPEAKERS

The best of the best from all over the world come to CONFidence every year to share their knowledge

HOT TALKS

Get to know new problems and solutions in cybersec.

MEET US FACE TO FACE

Finally you will be able to talk with everyone, discuss new technology and enjoy time with other participants.

AFTER PARTY

Prepare yourself for a whole night of networking and fun.

HANG OUT WITH SPEAKERS

You will be able to speak with them directly during the conference

CERTIFICATE OF ATTENDANCE

It will allow you to apply for points necessary for an expert certificate in the field of ICT security.

Agenda

5th June
6th June

Track 1

Track 2

Track 3

The times of lectures in the agenda may be subject to change.

LIVE ONLY - THE LECTURE WILL NOT BE RECORDED


Workshops*

*Available only to conference attendees - advance registration required, number of seats is limited.

05.06.2023


10:00 - 12:00

PL] WARSZTAT: Poznaj tajniki honeypotów - wirtualne pułapki w świecie cyberbezpieczeństwa

Warsztat "Poznaj tajniki honeypotów" jest przeznaczony dla osób zainteresowanych tematyką cyberbezpieczeństwa oraz chcących zgłębić wiedzę na temat skutecznych metod wykrywania i monitorowania zagrożeń w środowiskach sieciowych. Honeypoty są narzędziami, które pozwalają na przyciągnięcie, monitorowanie i analizę ataków prowadzonych przez potencjalnych intruzów. Podczas tego warsztatu uczestnicy będą mieli okazję zapoznać się z różnymi typami honeypotów oraz dowiedzieć się, jak je skonfigurować i wykorzystać w celu zabezpieczenia infrastruktury sieciowej. Przez praktyczne ćwiczenia i studium przypadków, uczestnicy będą mogli zdobyć wiedzę na temat technik wykrywania zagrożeń, analizy logów i identyfikacji nieznanych ataków. Główne tematy omawiane podczas warsztatu:

1. Wprowadzenie do honeypotów: czym są i jak działają.
2. Typy honeypotów: interaktywne, low-interaction i high-interaction.
3. Konfiguracja i wdrażanie honeypotów w środowisku sieciowym.
4. Analiza logów i wykrywanie nieznanych ataków.
5. Wykorzystanie danych z honeypotów w celu zwiększenia poziomu bezpieczeństwa sieciowego.
6. Studium przypadków: prawdziwe historie odkrytych zagrożeń dzięki honeypotom.
7. Warsztat będzie skupiał się na praktycznych aspektach, dlatego uczestnicy powinni posiadać podstawową wiedzę na temat sieci komputerowych oraz zabezpieczeń informatycznych.

Będzie to interaktywne wydarzenie, które zachęca do zadawania pytań i dyskusji na temat różnych technik i strategii związanych z wykorzystaniem honeypotów. Celem tego warsztatu jest dostarczenie uczestnikom wiedzy i umiejętności, które będą mogli wykorzystać w swojej pracy zawodowej jako analitycy bezpieczeństwa, administratorzy sieci, czy specjaliści ds. cyberbezpieczeństwa. Po zakończeniu warsztatu uczestnicy będą w stanie zrozumieć potencjał honeypotów oraz skutecznie wykorzystywać je w celu ochrony sieci przed atakami.

SIGN UP
15:00 - 17:00

[EN] Speed up your Reverse Enginnering investigations in Ghidra with AskJOE and OpenAI

Reverse engineering is a complex skill that requires specialized knowledge and experience to master, and beginners may find it overwhelming. However, it has become increasingly important in the cyber security industry due to the rise of cyber attacks relying on malware artifacts since 2010. With the advancement of AI systems, reverse engineering can be aided and improved, allowing for faster analysis and skill development without sacrificing effectiveness. Join us to learn how to easily leverage a complete AI-enforced reverse engineering laboratory using Ghidra and OpenAI, to develop and practice your reverse engineering skills while you analyze real malicious artifacts.
Level: Beginner

SIGN UP

06.06.2023


10:00 - 12:00

[EN] One SMALI step for man, one giant step for researchers

With more and more people using their phones as the primary device, mobile malware's prevalence skyrocketed. People nowadays store their money, memories and digital identities in their pockets, making their phones a ripe avenue for attackers. From the high level threat landscape, down to the nitty gritty of every specific actor, understanding the basics of Android reverse engineering can give an analyst the necessary cutting edge. This is what this workshop wants to deliver: taking people from zero to hero in order to give them a more thorough understanding of the Android malware landscape.
Level: Beginner

SIGN UP
13:00 - 15:00

[EN] Talking to Windows drivers

After you realize you cannot run your code in the kernel mode, you usually think about talking to the code already running there. In most cases it is about sending IOCTLs and FSCTLs to the proper device or filesystem. The workshop explains how to do it, how reality differs from the documentation, what you can win, and what can go wrong. You can expect a lot of C, and low-level digging, but in real world someone needs to do it.
Level: Intermediate

SIGN UP

CONFIDENCE 2022 IN NUMBERS

  

Attendees

Tracks

Lectures

Partners

News

25.05

2023

Flag Hunt at CONFidence 2023

In the heart of Krakow, where history and technology intertwine, an intriguing question arises: "Was the sheep of the shoemaker Dratewka the first exploit in Polish history?"

The participants of the CONFidence conference will confront a challenge strikingly similar to a tale from long ago.

READ MORE

23.05

2023

CONFidence 2023 Afterparty

Don’t leave us right after the last lectures on the first day of the conference!

Grab a beer and some pizza, catch up with your friends from the security community or make new ones.

READ MORE

28.04

2023

Workshops at CONFidence 2023

We’re all about hands-on experience, sharing tips and tools, and pragmatic knowledge. That’s why this year you will also have a chance to participate in practical workshops organized by our expert trainers.

READ MORE

Partners