CONFidence 2025 schedule is out! A walkthrough
This year’s CONFidence lineup is stronger than ever, covering everything from red teaming and car hacking to cyberwarfare and the future of AI in security. Whether you’re in offensive security, blue teaming, or just passionate about tech, there’s something here for you. Let’s dive into the core areas and what you can expect to learn!
Check the hottest examples of upcoming lectures and review the complete CONFidence 2025 program on our website!
Offensive security & live hacking demos
“QuickShell: Sharing is caring about an RCE attack chain on Quick Share”
Or Yair
Witness a real-world remote code execution exploit and see how attackers chain vulnerabilities to take control of systems. Learn practical mitigation strategies.
“Interesting vulnerabilities in network devices / live hacking”
Michał Sajdak
A live showcase of fresh bugs in firewalls, IoT, and VPN appliances. Great for those hunting
for 0-days or looking to understand how these flaws are found and exploited.
“Hack your Kubernetes cluster and secure it properly”
Tomasz Cholewa
Watch a live Kubernetes breach – from initial foothold to full compromise, and leave with concrete steps to harden your clusters.
“Zero day w Twojej kieszeni – atakowanie budżetowych Androidów”
Szymon Chadam
Learn how vulnerable budget Androids can be, and how attackers can exploit their weaknesses to gain control over your device.
“YouPot – where the attacker is the honeypot”
Jacek Lipkowski
See how attackers become the prey in this clever honeypot setup, with live analysis of captured bot traffic and attack patterns.
Red teaming, pentesting & programming
“Czy programowanie jest przydatne podczas red teamingu i pentestów?”
Paweł Maziarz
How much coding does a modern red teamer need? This talk combines storytelling and hands-on examples to answer that question engagingly.
“Kiedy konkurs staje się exploitowalny – historie z życia wzięte”
Łukasz Gaweł
Learn how seemingly innocent online contests can be exploited – perfect for those interested in bug bounty, logic flaws, and unconventional attack surfaces.
Defensive strategies & incident response
“Test dojrzałości. Czy Twój zespół monitorowania i reagowania na incydenty jest gotowy go przejść?”
Krystian Paszek
Evaluate your team’s maturity using the SIM3 model, and discover practical ways to improve your incident response and SOC operations.
“Anatomy of Attack. Silent techniques used by APT Group”
Maciej Zarski, Aleksander Pawlicki
Explore stealthy attack methods used by advanced actors, including ways they bypass MFA and evade detection tools.
“Pułapki autoryzacji transakcji – Jak ulepszyć obecne aplikacje finansowe, płatnicze i e-commerce?”
Wojciech Dworakowski
Examine how mobile payment methods open new attack vectors and what can be done to secure financial systems against social engineering and fraud.
Threat intelligence & cybercrime trends
“Rzut o(szczepem|kiem) na ostatnie kampanie cyberprzestępców”
Agata Ślusarek, Adam Lange
A sharp look at recent cybercriminal blunders – what went wrong, how they were caught, and what we can learn from their failures.
“LummaC2 infostealer in-depth analysis and evolution over the year”
Fabian Bobicz, Mateusz Półtorak
Track the evolution of one of today’s most sophisticated infostealers and uncover how it bypasses modern defenses.
“Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures”
Rahul Vashisht, Himanshu Sharma
See how attackers craft phishing campaigns that outsmart AI-based detection, and how to fight back with smarter tech.
“Klasyczny phishing jest już nudny, o rozwoju metody Fake-Captcha”
Kamil Kicka
Understand how attackers use fake CAPTCHA pages to bypass security filters and trick users, plus defense techniques.
Cyberwarfare & geopolitics
“Akuku, Mam Cię! – Jak Namierzyć Operatora Drona w Sercu Wojny”
Michał Kłaput
Step into the battlefield with real-world drone-hunting techniques used in Ukraine, and the crossover between cyber and kinetic warfare.
“New Dimension of War: Cyberwarfare Between Israel and Hamas”
Krzysztof Dziamski
Examine how cyberattacks play a strategic role in modern warfare, using the Israel-Hamas conflict as a case study.
Automotive security
“Car Hacking: Two Decades of Evolution and Exploitation”
Thomas Fischer
Travel through 20 years of automotive security research, featuring live demos and the tools used to break into modern vehicles.
AI, automation & the future of security
“Evolution of Threat Modeling – how AI may shape its future?”
Marta Rusek, Grzegorz Kmita
Can AI generate threat models better than humans? Find out how LLMs compare to traditional methods in identifying and mitigating risks.
“Local LLMs in Action: Automating CTI to Connect the Dots”
Kai Iyer
Discover how offline AI models can supercharge threat intelligence analysis, improve SOC workflows, and maintain privacy.
Hardware & Infrastructure
“TPMs and the Linux Kernel: unlocking a better path to hardware security”
Ignat Korchagin
Get a clear, practical understanding of how to integrate Trusted Platform Modules (TPMs) with Linux to build secure, hardware-backed applications.
“Clientless Torification: Ukrywanie ruchu sieciowego bez klienta Tor na endpointach”
Bartosz Wawrzyniak
Explore creative techniques to anonymize traffic using Tor without a local client—great for privacy pros and network security enthusiasts.
Across two packed days, you’ll also experience:
- Practical workshops to practice and test your newly acquired skills
- Flag Hunt to keep you alert during the conference (with cool prizes)
- Community Corner for discussions with security organizations
- Exec Track exclusively for senior executives from directors up to C-Level
- Representatives of leading tech companies with great opportunities
- After Party and an immense dose of networking
CONFidence 2025 isn’t just a conference – it’s where the future of cybersecurity unfolds.
Make sure to secure your seat and prepare for two unforgettable days of knowledge, inspiration, and networking!