Hotel Sympozjum - Krakow
The speakers of the CONFidence 2007 were the most prestigious so far. And this is taking into account not only the previous editions of our meetings but also all other national conferences on network security.
This time we met at the Sympozjum Hotel on Kobierzyńska Street in Krakow. The city with magic, reputation and universality that definitely serves the internationality of CONFidence. We’ve planned some interesting competitions for participants but let’s talk about it later. First, let's take a look at our speakers and the talks they have prepared for the attendees. Anton Chuvakin, a security specialist with an international reputation, co-author of "Security Warrior", appeared with "System Network and Security Log Forensic" with a presentation introducing participants to the issue of log management, Chuvakin's main professional interest. Stefano Zanero has refuted the myths on the intrusion detection systems (IDS). Entrepreneur Henning Brauer, the owner of a hosting and security company, gave us a taste of the OpenBGPD project - his own version of the Border Gateway Protocol, used to announce the availability of networks managed by them. Joanna Rutkowska also returned to CONFidence.
We are proud to announce that the first conference in Poland with such a good cast has been successfully completed. We would like to thank all the sponsors, participants, speakers, guests for coming and creating a great atmosphere together. Amazing lectures, excellent participants and a touch of Krakow's magic contributed to the atmosphere of a perfect event.
Both the presentations of Polish speakers and guests from abroad aroused great interest of the participants. On the first day of CONFidence 2007, the biggest applause was raised by lectures of Dinis Cruz (amazing exploits of .NET), Raoul Chies (unforgettable protocol X.25) and Alexander Kornbrust (using Oracle errors). The most liked polish speakers were Grzegorz Flak with the company of Qumak and Robert Pająk on the subject of a professional approach to the problem of phishing and Paweł Pokrywka's lecture on the location of devices in the Ethernet network. Hot discussions on the topics discussed lasted a long time after the presentation was over!
The participants and speakers spent the evening together, enjoying the hospitality and the extraordinary atmosphere of countless Krakow’s pubs, clubs and restaurants. We talked a lot and even had a chance to listen to our speakers playing a concert (big shoutout to the drum performance by Dinis Cruz!). The second day of CONFidence, started punctually at 9:00(despite the fun last night). Alongside with lectures we’ve held some exciting competitions:
secure network configuration based on Cisco solutions - a sponsor of Cisco Polska, funded an award in the form of an XBOX console - the contest was prepared and led by Grzegorz Wróbel together with Łukasz Bromirski.
the first Capture the Flag competition in Poland - the task of the participants was to break into the servers - the competition was organised and led by Jarosław Sajko, the prize was funded by the Helion Publishing House and the PROIDEA Foundation.
The fierce struggle between the participants lasted until the last seconds of the competitions. Winners proudly returned home, and the defeated could get a chance for the rematch it they came to the CONFidence in 2008.
On the second day lectures the most popular were taks by Richard Bejtlich, Wojciech Świątek - Motorola's representative (corporate approach to security) and, traditionally, Łukasz Bromirski - Cisco Polska, who talked about security problems in our networks, was best evaluated.
|System Network and Security Log Forensic
|Shellcody a architektura MIPS ? na systemach IRIX
|Log analysis using ossec
|My IDS is better than yours… or is it?
|Radar w Ethernecie czyli jak określić lokalizację hosta w sieci LAN
|Oracle for pentesters 2007, how to hack Oracle databases
|Grzegorz Flak, Robert Pająk
|Czy z “phishingiem” można wygrać? Co banki mogą zrobić by rzadziej padać ofiarą
|Crypto Viruses: an Overview
|VoIP Security Tools and Attacks
|Buffer Overflows on .Net and Asp.Net
|X.25 (in)security in 2007: real-life experiences
|OWASP, the Open Web Application Security Project
|Calorie restricted OpenBSD
|Luca Carettoni, Claudio Merloni
|String Analysis for the Detection of Web Application Flaws
|Zakończenie dnia, rozlosowanie nagród
|The Self-Defeating Network
|Cisco Threat Control and Containment
|Luca Carettoni, Claudio Merloni
|Wirtualizacja sieci - bezpieczeństwo w sieciach MPLS i izolacja ruchu w sieciach lokalnych
|Secure roaming for the modern roadwarrior
|Current Security Issues in Corporate IT Environments
|A la carte
|Piotr Sasak, Bartosz Brodecki
|Obowiązkowa kontrola dostępu w systemie Linux
|Testowanie oprogramowania i jego bezpieczeństwo
|Analiza ryzyka podstawą wdrożenia Systemu Zarządzania Bezpieczeństwem Informacji
zgodnego z ISO/IEC 27001:2005
|“E-pracownik” - dofinansowane szkolenia, zakończenie konferencji, rozlosowanie nagród