-
Welcome & Lunch
Sep. 03
-
Operating at the Edge of Chaos: The CISO Lessons the War Forced Upon Us
Olivier BusoliniSep. 03
-
Talk Slot 1 1 (Request for Proposal)Sep. 03
-
Panel DiscussionSep. 03
-
Coffee Break
Sep. 03
-
Talk Slot 1 2 (Request for Proposal)Sep. 03
-
Talk Slot 1 3 (Request for Proposal)Sep. 03
-
Masterclass: 100 Days to Credibility: How New CISOs Build Trust, Culture, and Strategic Impact
Olivier BusoliniSep. 03
-
Apero
Sep. 03
-
Dinner
Sep. 03
Modern security threats no longer originate only from software vulnerabilities or online attacks - increasingly, they are enabled by physical access and inexpensive hardware tools that can silently compromise systems within seconds. In this hands‑on masterclass, participants step directly into the attacker’s perspective and explore how real‑world hardware attacks are executed and how they can be prevented.
Using a fully equipped mobile hardware lab with six dedicated stations, participants work with preconfigured laptops, attack tools, and guided exercises that simulate insider threats, manipulation of devices, and covert data exfiltration. The session provides a practical introduction to the tools, techniques, and tactics used by adversaries, enabling participants to recognize suspicious devices, understand common attack vectors, and apply effective countermeasures.
By the end of the workshop, attendees will be able to identify hardware threats, evaluate their impact, and implement concrete defensive actions to protect their organization from physical-layer compromises. This masterclass is designed for practitioners who want to deepen their technical skillset and gain real, operational insight into hardware-based attacks.