2023
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
60 | ![]() |
Incident Response | Closing the Gap - IR Expectations and Technical Reality | Helsinki, FI | 30 Apr | |
59 | Cytactic | Healthcare | Tel-Aviv, IL | 6 Mar | ||
58 | IsraelClouds | Incident Response | LastPass Breach – What went wrong | Tel-Aviv, IL | 1 Mar | |
57 | ![]() |
Incident Response | LastPass Breach – What went wrong | Tel-Aviv, IL | 1 Mar |
2022
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
56 | ![]() |
Incident Response | The Log4J Rollercoaster – from an incident response perspective | London, UK | 18 Sep | |
55 | ![]() |
Incident Response | The Log4J Rollercoaster - from an incident response perspective | Las Vegas, USA | 13 Aug | link |
54 | ![]() |
Incident Response | Hundreds of incidents, what can we share? | Las Vegas, USA | 12 Aug | link |
53 | ![]() |
Incident Response | The Log4J Rollercoaster – from an incident response perspective | Las Vegas, USA | 11 Aug | |
52 | Finish Inst. | Incident Response | Hundereds of Incidents | online webinar | 29 Aug | |
51 | ![]() |
Cyber Crisis Management | IR Expert, Panel | Tel Aviv, Israel | 27 Jun |
2021
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
50 | ![]() |
Cyber Crisis Management | IR Expert, Panel | Tel Aviv, Israel | Jul 19 |
2020
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
49 | ![]() |
Artificial Intelligence | On artificial intelligence and human wisdom | Glilot, Israel | Jan 15 | |
48 | ![]() |
Security | MoH Application | Online Webinar | Mar 24 | link |
47 | ![]() |
Security | MoH Application | Online Meetup | Mar 24 | slides video |
46 | ![]() |
Cryptography | Crypto Fails – from basics to advanced stuff | Tel Aviv, Israel | Jan 28 | slides |
2019
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
45 | ![]() |
IoT | The Ukraine Power-Grid Cyber Attack | Tel Aviv, Israel | Dec 11 | slides |
44 | Research Exe IL | Research Management | Security Research Teams - How to Manage, Grow and Retain them | Tel Aviv, Israel | Oct 30 | |
43 | ![]() |
Security of Machine Learning | Using Machines to exploit Machines - harnessing AI to accelerate exploitation | Helsinky, Finalnd | Oct 25 | |
42 | ![]() |
Linux Security | Linux Hardening - Made Easy | Herzliya, Israel | Sep 24 | slides slideshare |
41 | ![]() |
Research Management | Security Research Teams - How to Manage, Grow and Retain them | London, UK | Sep 13 | slides video |
40 | ![]() |
Cryptography | Crypto failiures - and not just in bitcoin… | Las Vegas, USA | Aug 9 | slides video |
39 | ![]() |
Linux Security | Linux Hardening - Made Easy | Las Vegas, USA | Aug 7 | slides (Workshop) |
38 | ![]() |
Security of Machine Learning | Using Machines to exploit Machines - harnessing AI to accelerate exploitation | Las Vegas, USA | Aug 7 | slides video |
37 | ![]() |
Security of Machine Learning | Using Machines to exploit Machines - harnessing AI to accelerate exploitation | Paris, France | Jun 17 | slides video |
36 | ![]() |
Cryptography | Cryptofailiures-andnotjustinbitcoin… | Tel Aviv, Israel | May 31 | slides video |
35 | ![]() |
Security of Machine Learning | Using Machines to exploit Machines - harnessing AI to accelerate exploitation | Singapore, Singapore | Apr 10 | slides video whitepaper |
2018
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
34 | ![]() |
Security of Machine Learning | Intelligent systems, but are they secure? | Petach Tikva, Israel | Dec 10 | |
33 | ![]() |
Security of Machine Learning | Intelligent systems, but are they secure? | Tel Aviv, Israel | Nov 5 | |
32 | ![]() |
Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Helsinky, Finalnd | Oct 24 | slides video |
31 | ![]() |
Security of Machine Learning | Intelligent systems, but are they secure? | Bucharest, Romania | Oct 4 | slides |
30 | ![]() |
Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | London, UK | Sep 13 | slides video |
29 | ![]() |
Research Management | CV Workshop | Tel Aviv, Israel | Sep 6 | |
28 | ![]() |
Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Tel Aviv, Israel | Sep 6 | video |
27 | ![]() |
Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Las Vegas, USA | Aug 12 | underground talk, no publications |
26 | ![]() |
Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Las Vegas, USA | Aug 9 | slides video |
25 | ![]() |
Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Las Vegas, USA | Aug 7 | slides video |
24 | ![]() |
Security of Machine Learning | Intelligent systems, but are they secure? | Tel Aviv, Israel | Aug 1 | |
23 | ![]() |
Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Tel Aviv, Israel | Jul 31 | slides |
22 | ![]() |
Security of Machine Learning | Intelligent systems, but are they secure? | Herzliya, Israel | Jun 18 | slides |
21 | ![]() |
Security of Machine Learning | Intelligent systems, but are they secure? | San Jose, USA | May 21 | |
20 | ![]() |
Security of Machine Learning | Intelligent systems, but are they secure? | Hod Hasharon, Israel | Mar 14 | |
19 | ![]() |
Research Management | Enterpranurship, Technology and the road between them | Tel Aviv, Israel | Mar 2 | slides |
2017
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
18 | ![]() |
IoT | The Ukraine Power-Grid Cyber Attack | Tel Aviv, Israel | Oct 24 | slides video |
17 | ![]() |
Security of Machine Learning | Offensive AI: “Some rules can be bent, others can be broken” | Rishon Lezion, Israel | Oct 18 | slides video |
16 | ![]() |
Linux Security | Containers are not virtual machines! | Tel Aviv, Israel | Sep 12 | |
15 | ![]() |
Research Management | What every hacker once knew, a walk down history’s lane | Tel Aviv, Israel | Sep 12 | |
14 | ![]() |
Research Management | The Threat Horizon: Preparing for the Future | San Jose, USA | Jun 28 | |
13 | ![]() |
Research Management | What every hacker once knew, a walk down history’s lane | Tel Aviv, Israel | Jun 28 | slides video |
12 | ![]() |
Malware | The Future of Malware | Haifa, Israel | Jun 1 | |
11 | ![]() |
Malware | The Future of Malware | Petach Tikva, Israel | Jun 1 | |
10 | ![]() |
Malware | The Future of Malware | Jerusalem, Israel | Jun 1 | |
9 | ![]() |
Malware | The Future of Malware | Kiryat Gat, Israel | Jun 1 | |
8 | ![]() |
Malware | The Future of Malware | Yakum, Israel | Jun 1 |
2014
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
7 | ![]() |
Reverse Engineering | Reverse Engineering Workshop | San Jose, USA | Oct 23 | |
6 | ![]() |
Research Management | Security Development Lifecycle - how did we get so lost along the way? | London, UK | May 6 |
2013
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
5 | ![]() |
Research Management | It worked on my computer! | Monaco | Dec 20 | |
4 | ![]() |
Research Management | Think like a hacker | San Jose, USA | Nov 28 |
2011
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
3 | ![]() |
Security of Machine Learning | Ambiguous Facial Recognition | Holon, Israel | Oct 21 |
2010
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
2 | ![]() |
Machine Learning | Detecting Thalassemia using Neural Networks | Ramat Gan, Israel | Oct 13 | |
1 | ![]() |
Security of Machine Learning | Ambiguous Facial Recognition | Airport City, Israel | Jan 28 | 0 |