Journalists accreditation
For accreditation as a media, mail us [email protected], and tell representative name and the name of the media.
UISGCON is the oldest and well-known Ukrainian conference on Information Security, driven by community and organized under the aegis of the NGO "Ukrainian Information Security Group" (UISG).
UISGCON is the place where you can meet meet
- security vendors and customers;
- some who has questions and some who has answers;
- someone who want to find and others who want to want to share experience.
UISGCON is a platform for sharing knowledge and experience, as well as for attracting new enthusiasts, disseminate cyber hygiene practices and inform the public about the most pressing issues in the field of information and cyber security. UISGCON is the birthplace of the infosec community and place for its meetings in a wide format.
UISGCON aims to combine information security with business and public policy, practice and training. The principle of the conference remains the same - the absense of product advertising in participant reports, because we strive for universal approaches to solving of information security problems. At the same time, businesses are provided with the best opportunities - from placement of stands and information materials to open communication with potential customers, employees and contractors.
You can be a part of UISGCON and join as a partner. If you need more information mail us [email protected]
08:30 | Registration, Morning coffee | |
09:00-09:30 | Conference opening | |
09:30-10:20 | ![]() |
Kostiantyn Korsun, Berezha Security, CEO & Co-founder "Fear and Loathing of Cybersecurity Reform" As former deputy head of Cybercrime Department at Security Service of Ukraine (colonel ret.), Kostiantyn was one of the founders and the first head of CERT-UA. After resigning from the service, Kostiantyn acted as Regional Director for Ukraine Research Office of iSIGHT Partners, international cyber threat intelligence company (now is a part of FireEye). Then he cooperated with Symantec Corp. as an official vendor of Threat Intelligence services. |
10:30-11:10 | ![]() |
Mykola Koval, Cybersecurity expert "Cyberthreats investigation and prevention. Based on a true story" Talk will traditionally cover existing and emerging trends in cyber-security as well as analysis of several incidents. Audience is suggested to get acquainted with practical aspects of detection, investigation and prevention of cyber-threats. It's planned to discuss cyber-espionage cases, which is most relevant for goverment agencies, and targeted activity directed at financial gain, which is potentially interested for broader audience in the context of corporate information security. |
11:20-12:00 | ![]() |
Yuri Rozhansky, FireEye Intel From The Frontlines - Case study from the Middle East Building a modern integrated cyber defense is difficult job. We believe that in today’s threat environment, when the threat actors are getting better, more aggressive and cooperating with each other, there is no one magic solution for defense. |
12:00-13:00 | Lunch | |
13:00-13:40 | ![]() |
Maksym Litvinov, Andrii Okaievych |
13:50-14:30 | ![]() |
Viktor Kirchev "Game of Threats: A peak under the hood of Threat Intelligence" The plan is to keep the presentation product neutral, while explain how our Cisco’s Threat Intelligence teams works, along with some recent examples of threats we have detected and investigated. |
14:40-15:30 | ![]() |
Oleksandr Adamov, Ph.D., the head of the research laboratory NioGuard Security Lab "Ransomware vs. AI" A modern cybersecurity solution cannot be imagined without using Artificial Intelligence and Machine Learning for detecting cyberattacks. In this regard, two main approaches are typically used: finding patterns of known cyberattacks and anomaly detection for unknown ones. |
15:30-16:00 | Coffee | |
16:00-16:50 | ![]() |
Vlad Kucher, Security Engineer, Betta Security "Almost Silver Bullet" or Ideal automated security system Have you ever had a fantasy about having unlimited budget and resources on your security, so you can implement everything you just say or wish? Sounds like a heaven-dream, right? |
17:00-17:30 | ![]() |
Paul Alderson, FireEye Intelligence team, Senior Manager Magecart Plumbing, TTPs and Insights Breaches related to Magento and “Magecart” have been in the news for the past several years. Large public breaches such as British Airways and TicketMaster have all been associated with this activity/group with the number of victims rising above 500K as of this writing. The attackers have been credited with using and potentially developing zero-day vulnerability against several Magento plugins. What hasn’t publicly reported is the plumbing behind the scenes and where all of that data goes. This talk will focus on the network of proxies setup used to collect the data and push that data back to a centralized database. We’ll examine and present the automation they use for deployment of their toolset as well as the manual setup pieces and the pitfalls (typos, etc.) observed from those efforts. We’ll see that their knowledge and obsession of PHP doesn’t at the E-commerce level but extends into their toolsets for deployment. And they aren’t just planning for today – we’ll take a look at the orchestration they’ve setup for backup VPN connections to the mother-ship. |
17:30 | Closing ceremony (Hall А) |
08:30 | Registration, Morning coffee | |
09:00-09:30 | Conference opening (Hall А) | |
09:30-10:20 | (Hall A) | |
10:20-10:50 | ![]() |
Myhailo Kalin, Сo-founder, CISO R&B team LLC "ICS Ukrainian style" |
11:00-12:00 | Round table "Ukrainian critical infrastructure security" |
|
12:00-13:00 | Lunch | |
13:00-13:30 | ![]() |
Oleksii Baranovskyi, PhD "Evolution of cybersecurity education: from F to CR" |
13:30-14:00 | ![]() |
Aleksandr Mezherytskyi "Army 2.0" |
14:00-14:30 | ![]() |
Микола Семакин, Sales engineer, NWU "Перехід на мережу з нульовим рівнем довіри" Як надавати тільки той доступ, якій мінімально потрібен |
14:30-15:30 | Round table |
15:30-16:00 | Coffee | |
15:50-15:50 | ![]() |
Vitalii Susukailo, Digitally Inspired CompTIA CySA+ Yevhenii Kurii, ELEKS CCSK "What does a "privacy-friendly system" mean?" |
17:00-17:30 | (Hall А) | |
17:30 | Closing ceremony (Hall А) |
For accreditation as a media, mail us [email protected], and tell representative name and the name of the media.
UISGCON is conference driven by information security community for the information security community. Our goal is to provide comfortable and safe communication for all participants. If you decide to attend our conference, you are agree with our Code of Conduct, which is obligated to all participants.
You can buy ticket on uisgcon15.2event.com