Topics

The topic for Positive Hack Days 10 is "The Origin." In other words, developing the concept of future information security. To achieve that, we need to focus on practical aspects and issues of information security today.

This year, the topics include the following:

Vulnerability discovery and exploitation

Attack mitigation

Architectural issues of modern computing systems

Detecting and investigating attacks and incidents: practical findings

Threat intelligence and threat hunting

OSINT

Investigating activities of hacker groups

Arranging processes for securing information infrastructures: practical findings

Methods and ways of developing secure software, such as serverless apps, cloud-based apps, micro-service architectures, and AI systems

Formal security models of applications

Managing security risks in software development processes

Security of BIOS, UEFI, and other firmware

Methods of assessing informational risks for businesses

Methods of detecting sore spots in business processes

Methods of developing information security strategies for businesses

We will discuss the security of embedded systems, home and industrial IoT devices, telecommunication networks, smart homes, and CCTV, as well as the security of financial technologies and tools. We will also discuss faults and vulnerabilities in blockchain, talk about reverse engineering, applied cryptography, machine learning, malware, and exploit development.

If your research touches upon other areas of information security that you think will be interesting to forum participants, you are also welcome to send a submission.

For the second year in a row, we will have separate sections for offensive and defensive security, and will create a special section for software developers. Technical tracks will include presentations of various complexity. We want to collect information that would be of interest to both beginners and experienced specialists in information security.