Home

#OWASP​PolandDay

OWASP Poland Day is the only conference dedicated to application and software security in Poland, aimed at developers, testers, architects, product designers, and managers – in short, anyone involved with securing software lifecycle!

save the date 16.06.2023

The Guido Coal Mine, Zabrze City
TBA

Conference

conference

OWASP Poland Day is the largest annual security conference in Poland focused on topics related to application security. The conference brings together developers, penetration testers and CISOs responsible for ensuring application security. Apart from great presentations delivered by leading application security professionals and researchers the conference will be fantastic networking opportunity.

Agenda

Agenda
There are 2 paths fully packed with great speakers and interesting presentations. The full agenda will be presented soon, but here you have the snapshot of what you can see and here:

 

 

8:15 – 9:45
Registration

 

 

9:45 – 10:25
Krzysztof Kotowicz – Google – “Hitting the Jackpot with Google VRPs: How to win in a bug bounty game”

 

 

10:30 – 11:00
Michael Montoya – Equinix – “TBD”

 

 

11:10 – 11:40
Michał Bentkowski – Google – “Small steps to improve the security of the web platform”

 

 

11:44 – 12:15
Grzegorz Niedziela – Bug Bounty Reports Explained – “Different styles of bug bounty hunting – finding your way in a sea of methodologies”

 

 

12:15 – 13:00
Maciej Kofel – Szkoła Security – “Be HAI(A)PI – API hacking with a pinch of AI”

 

 

13:00 – 13:30
Wojciech Reguła – SecuRing – “macOS Red Teaming in 2023”

 

 

13:35 – 14:05
Piotr Cebulski – KPMG – “Typical issues and extremely rare vulnerabilities – what can we find in applications nowadays?”

 

 

14:15 – 14:45
Błażej Boczula – Łukasiewicz – PORT Polish Center for Technology Development – “OWASP Machine Learning Security Top Ten`.replace(“Machine Learning”,”Human Being”)”

 

 

14:50 – 15:20
Jacek Marmuszewski – Let’s Go DevOps – “Why do we need security headers?”

 

 

15:30 – 16:00
Iwona Polak – Securitum – “Web cache juggling”

 

 

16:00 – 16:45
Piotr Szydłowski – Efento – “Secure firmware over the air update for IoT devices – algorithm and findings based on updates performed on thousands of cellular IoT sensors”

 

 

16:45 – 17:15
Idan Elor – Apiiro – “API security”

 

 

17:15 – 17:45
Adam Nowak – EY

 

 

TRACK 1
9:50 – 10:25
Adam Lange – “Is your data leaking? Cyber-plumber for the rescue!”

 

 

10:30 – 11:15
Glenn Ten Cate – “Mastering holistic appsec talk”

 

 

11:15 – 11:35
Coffee Break

 

 

11:35 – 12:10
Pascal Geenens – “Top 10 immutable security facts of 2019”

 

 

12:15 – 12:50
Dariusz Czerniawski – “Governance – missing part of security architecture”

 

 

12:55 – 13:30
Daniel Krasnokucki – “.NET Core security”

 

 

13:30 – 14:40
Lunch

 

 

14:40- 15:15
Jakub Kałużny – “Let’s get evil – threat modelling at scale”

 

 

15:20 – 15:55
Jakub Sendor – “⚡Storm Busters⚡ Auditing & Securing AWS Cloud Infrastructure”

 

 

15:55 – 16:15
Coffee Break

 

 

16:15 – 16:50
Tom Van Goethem – “Side-channels on the Web: Attacks and Defences”

 

 

16:55 – 17:30
Artur Balsam – “Life after pentest”

 

 

TRACK 2
9:50 – 10:25
Krzysztof Kotowicz – “Trusted Types and the end of DOM XSS”

 

 

10:30 – 11:15
Mateusz Kocielski – “Anykernels meet fuzzing”

 

 

11:15 – 11:35
Coffee Break

 

 

11:35 – 12:10
Michał Bentkowski – “Prototype Pollution – why can it be scary?”

 

 

12:15 – 12:50
Kacper Szurek – “Programmer as a key to the company – GIT servers exploitation”

 

 

12:55 – 13:30
Arkadiusz Warzyński, Piotr Stróż, Agnieszka Kwiecień, Jacek Oko – “Advanced Data Analysis in RegSOC project”

 

 

13:30 – 14:40
Lunch

 

 

14:40 – 15:15
Oleksandr Tsar – “Attacking JWT tokens”

 

 

15:20 – 15:55
Uria Ankorion – “AST platform – The benefits of multi layered protection”

 

 

15:55 – 16:15
Coffee Break

 

 

16:15 – 16:50
Marcin Szydlowski – “Inter-application” vulnerabilities – hunting for bugs in secure applications.”

 

 

16:55 – 17:30
Viacheslav Viniarskyi – “Automated Defense with Serverless computing”

 

 

 

 

END OF CONFERENCE
17:45 – 18:00
Conference Wrap Up

 

 

18:00 –
After Party

 

 

 

 

 

Contact

Contact


The Guido Coal Mine

Zabrze City
Write to us

Contact Form