@@ -18,4 +18,112 @@ description: Schedule, topics, and trainers for this year's edition.
1818
1919## Topics
2020
21- {{ read_csv('topics.csv', colalign=("left","left",)) }}
21+ {{ read_csv('topics.csv', colalign=("left","left",)) }}
22+
23+ ## Schedule
24+
25+ === "DAY 1"
26+
27+ 2026-03-21 09:00 – 16:00 +0100 (CET)
28+
29+ |Time |Lecture |
30+ |---------------------------|-----------------------------------------------------------------------------------|
31+ |09:00 - 09:30<br>(30m) |**Kickoff meeting**<br>Damian Krawczyk, Łukasz Jankowski<br>{++5 minutes break++} |
32+ |09:35 - 10:35<br>(1h) |**Keynote session** :material-new-box:{ style="color: red" }<br>Debbie Janeczek, <b>Global CISO</b><br>(45 minutes sessions, 15 minutes Q&A)<br>{==(This session is in English)==}<br>{++5 minutes break++} |
33+ |10:40 - 11:40<br>(1h) |**Cyber awareness**<br>Sławomir Staciwa<br>{++5 minutes break++} |
34+ |11:45 - 12:45<br>(1h) |**Cyber awareness**<br>Sławomir Staciwa<br><span style="color: red">{++**20** minutes break++} |
35+ |13:10 - 14:10<br>(1h) |**Password vaults - dive into**<br>Mateusz Kozieł<br>{++5 minutes break++} |
36+ |14:15 - 15:45<br>(1h 30m) |**SIEM + SOAR + Proxy**<br>Daniel Jeczeń |
37+
38+ === "DAY 2"
39+
40+ 2026-03-28 09:00 – 15:00 +0100 (CET)
41+
42+ |Time |Lecture |
43+ |---------------------------|---------------------------------------------------------------------------------------------------|
44+ |09:00 - 10:00<br>(1h) |**Compliance - Data Protection**<br>Dagmara Adamczyk<br>{++5 minutes break++} |
45+ |10:05 - 11:05<br>(1h) |**IT Risk Management - Basics**<br>Askaniusz Ferens<br>{++5 minutes break++} |
46+ |11:10 - 12:10<br>(1h) |**IT Risk Management - Governance**<br>Anna Maszybrocka<br><span style="color: red">{++**20** minutes break++} |
47+ |12:30 - 13:30<br>(1h) |**IT Risk Management - On-prem vs Cloud** <br>Piotr Czarnik<br>{++5 minutes break++} |
48+ |13:35 - 14:00<br>(1h 25m) |**IT Risk Management - Analysis, Monitoring & Reporting** <br>Daniel Leon<br>{==(This session is in English)==} |
49+
50+ === "DAY 3"
51+
52+ 2026-04-11 09:00 – 16:00 +0100 (CEST)
53+
54+ |Time |Lecture |
55+ |---------------------------|---------------------------------------------------------------------------------------------------|
56+ |09:00 - 10:00<br>(1h) |**Legal aspects of cyber security** <br>Judyta Berc<br>{++5 minutes break++} |
57+ |10:05 - 11:05<br>(1h) |**Identity and Access management**<br>Paweł Matyszok<br>{++5 minutes break++} |
58+ |11:10 - 12:10<br>(1h) |**Identity and Access management**<br>Paweł Matyszok<br><span style="color: red">{++**20** minutes break++} |
59+ |12:30 - 13:30<br>(1h) |**Risk Management - Compliance**<br>Kamila Juszczyk<br>{++5 minutes break++} |
60+ |13:35 - 14:35<br>(1h) |**Risk Management - Operational Risk Management**<br>Oskar Marszalik<br>{++5 minutes break++} |
61+ |14:40 - 15:40<br>(1h) |**Risk Management - Audits**<br>Kamila Juszczyk |
62+
63+ === "DAY 4"
64+
65+ 2026-04-18 09:00 – 16:00 +0100 (CEST)
66+
67+ |Time |Lecture |
68+ |---------------------------|---------------------------------------------------------------------------------------------------|
69+ |09:00 - 10:00<br>(1h) |**Introduction to offensive tooling**<br>Michał Kucharski<br>{++5 minutes break++} |
70+ |10:05 - 11:05<br>(1h) |**OSINT in the service of Offensive Security**<br>Maciej Pypeć<br>{++5 minutes break++} |
71+ |11:10 - 12:10<br>(1h) |**Offensive Cybersecurity – DDOS**<br>Gerard Żmuda<br><span style="color: red">{++**20** minutes break++} |
72+ |12:30 - 13:30<br>(1h) |**Offensive Cybersecurity – Red Teaming theory**<br>Jakub Plusczok<br>{++5 minutes break++} |
73+ |13:35 - 14:35<br>(1h) |**Offensive Cybersecurity – Red Teaming workshop**<br>Jakub Plusczok<br>{++5 minutes break++} |
74+ |14:40 - 15:40<br>(1h) |**Offensive Cybersecurity – Red Teaming workshop**<br>Jakub Plusczok |
75+
76+ === "DAY 5"
77+
78+ 2026-04-25 09:00 – 16:00 +0100 (CEST)
79+
80+ |Time |Lecture |
81+ |---------------------------|---------------------------------------------------------------------------------|
82+ |09:00 - 10:00<br>(1h) |**Malware Analysis**<br>Mirosław Koczenasz<br>{++5 minutes break++} |
83+ |10:05 - 11:05<br>(1h) |**Malware Analysis**<br>Mirosław Koczenasz<br>{++5 minutes break++} |
84+ |11:10 - 12:10<br>(1h) |**Cryptography - basics**<br>Jacek Kocyba<br><span style="color: red">{++**20** minutes break++} |
85+ |12:30 - 13:30<br>(1h) |**Shadow IT**<br>Jacek Kocyba<br>{++5 minutes break++} |
86+ |13:35 - 14:35<br>(1h) |**CISSP – Introduction** <br>Krystian Tokarz<br>{++5 minutes break++} |
87+ |14:40 - 16:00<br>(1h 20m) |**Introduction to secret scanning** <br>Patryk Zachnik, Mateusz Majstrak. |
88+
89+ === "DAY 6"
90+
91+ 2026-05-09 09:00 – 16:00 +0200 (CEST)
92+
93+ |Time |Lecture |
94+ |---------------------------|---------------------------------------------------------------------------------------|
95+ |09:00 - 10:00<br>(1h) |**Introduction to Azure Public Cloud**<br>Rafał Nowakowski<br>{++5 minutes break++} |
96+ |10:05 - 11:05<br>(1h) |**Secure Configuration Monitoring**<br>Maciej Wróbel<br>{++5 minutes break++} |
97+ |11:10 - 12:10<br>(1h) |**Secure SDLC**<br>Maciej Wróbel<br><span style="color: red">{++**20** minutes break++} |
98+ |12:30 - 13:30<br>(1h) |**Secure SDLC**<br>Maciej Wróbel<br>{++5 minutes break++} |
99+ |13:35 - 14:35<br>(1h) |**C2 & exfiltration** :material-new-box:{ style="color: red" }<br>Mirosław Koczenasz<br>{++5 minutes break++} |
100+ |14:40 - 15:40<br>(1h) |**C2 & exfiltration** :material-new-box:{ style="color: red" }<br>Mirosław Koczenasz |
101+
102+ === "DAY 7"
103+
104+ 2026-05-16 09:00 – 16:00 +0200 (CEST)
105+
106+ |Time |Lecture |
107+ |---------------------------|---------------------------------------------------------------------------------------------------------------|
108+ |09:00 - 10:00<br>(1h) |**Vulnerability Assessment – introduction**<br>Damian Krawczyk<br>{++5 minutes break++} |
109+ |10:05 - 11:05<br>(1h) |**Vulnerability Assessment – demo**<br>Łukasz Jankowski<br>{++5 minutes break++} |
110+ |11:10 - 12:10<br>(1h) |**Vulnerability Assessment – demo**<br>Łukasz Jankowski<br><span style="color: red">{++**20** minutes break++} |
111+ |12:30 - 13:30<br>(1h) |**Vulnerability Assessment – practice**<br>Damian Krawczyk<br>{++5 minutes break++} |
112+ |13:35 - 14:35<br>(1h) |**Vulnerability Assessment for containers - theory**<br>Krzysztof Kozak, Łukasz Galos<br>{++5 minutes break++} |
113+ |14:40 - 15:40<br>(1h) |**Vulnerability Assessment for containers - demo/lab**<br>Krzysztof Kozak, Łukasz Galos |
114+
115+ === "DAY 8"
116+
117+ 2026-05-23 09:00 – 14:00 +0200 (CEST)
118+
119+ |Time |Lecture |
120+ |---------------------------|---------------------------------------------------------------------------------------------------|
121+ |09:00 - 10:00<br>(1h) |**Security data processing automation**<br>Piotr Furmaniak, Adam Majstrak<br>{++5 minutes break++} |
122+ |10:05 - 11:05<br>(1h) |**Security data processing automation**<br>Piotr Furmaniak, Adam Majstrak<br>{++5 minutes break++} |
123+ |11:10 - 12:10<br>(1h) |**Building ETL for Security data**<br>Michał Kocur<br><span style="color: red">{++**20** minutes break++} |
124+ |12:30 - 13:30<br>(1h) |**Building ETL for Security data**<br>Michał Kocur<br>{++5 minutes break++} |
125+ |13:35 - 14:00<br>(25min) |**Closing session**<br>Damian Krawczyk, Łukasz Jankowski |
126+
127+ === "EXAM"
128+
129+ 2026-05-30 10:00 – 11:00 +0200 (CEST)
0 commit comments