2023
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
60 | Incident Response | Closing the Gap - IR Expectations and Technical Reality | Helsinki, FI | 30 Apr | ||
59 | Cytactic | Healthcare | Tel-Aviv, IL | 6 Mar | ||
58 | IsraelClouds | Incident Response | LastPass Breach – What went wrong | Tel-Aviv, IL | 1 Mar | |
57 | Incident Response | LastPass Breach – What went wrong | Tel-Aviv, IL | 1 Mar |
2022
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
56 | Incident Response | The Log4J Rollercoaster – from an incident response perspective | London, UK | 18 Sep | ||
55 | Incident Response | The Log4J Rollercoaster - from an incident response perspective | Las Vegas, USA | 13 Aug | link | |
54 | Incident Response | Hundreds of incidents, what can we share? | Las Vegas, USA | 12 Aug | link | |
53 | Incident Response | The Log4J Rollercoaster – from an incident response perspective | Las Vegas, USA | 11 Aug | ||
52 | Finish Inst. | Incident Response | Hundereds of Incidents | online webinar | 29 Aug | |
51 | Cyber Crisis Management | IR Expert, Panel | Tel Aviv, Israel | 27 Jun |
2021
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
50 | Cyber Crisis Management | IR Expert, Panel | Tel Aviv, Israel | Jul 19 |
2020
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
49 | Artificial Intelligence | On artificial intelligence and human wisdom | Glilot, Israel | Jan 15 | ||
48 | Security | MoH Application | Online Webinar | Mar 24 | link | |
47 | Security | MoH Application | Online Meetup | Mar 24 | slides video | |
46 | Cryptography | Crypto Fails – from basics to advanced stuff | Tel Aviv, Israel | Jan 28 | slides |
2019
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
45 | IoT | The Ukraine Power-Grid Cyber Attack | Tel Aviv, Israel | Dec 11 | slides | |
44 | Research Exe IL | Research Management | Security Research Teams - How to Manage, Grow and Retain them | Tel Aviv, Israel | Oct 30 | |
43 | Security of Machine Learning | Using Machines to exploit Machines - harnessing AI to accelerate exploitation | Helsinky, Finalnd | Oct 25 | ||
42 | Linux Security | Linux Hardening - Made Easy | Herzliya, Israel | Sep 24 | slides slideshare | |
41 | Research Management | Security Research Teams - How to Manage, Grow and Retain them | London, UK | Sep 13 | slides video | |
40 | Cryptography | Crypto failiures - and not just in bitcoin… | Las Vegas, USA | Aug 9 | slides video | |
39 | Linux Security | Linux Hardening - Made Easy | Las Vegas, USA | Aug 7 | slides (Workshop) | |
38 | Security of Machine Learning | Using Machines to exploit Machines - harnessing AI to accelerate exploitation | Las Vegas, USA | Aug 7 | slides video | |
37 | Security of Machine Learning | Using Machines to exploit Machines - harnessing AI to accelerate exploitation | Paris, France | Jun 17 | slides video | |
36 | Cryptography | Cryptofailiures-andnotjustinbitcoin… | Tel Aviv, Israel | May 31 | slides video | |
35 | Security of Machine Learning | Using Machines to exploit Machines - harnessing AI to accelerate exploitation | Singapore, Singapore | Apr 10 | slides video whitepaper |
2018
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
34 | Security of Machine Learning | Intelligent systems, but are they secure? | Petach Tikva, Israel | Dec 10 | ||
33 | Security of Machine Learning | Intelligent systems, but are they secure? | Tel Aviv, Israel | Nov 5 | ||
32 | Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Helsinky, Finalnd | Oct 24 | slides video | |
31 | Security of Machine Learning | Intelligent systems, but are they secure? | Bucharest, Romania | Oct 4 | slides | |
30 | Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | London, UK | Sep 13 | slides video | |
29 | Research Management | CV Workshop | Tel Aviv, Israel | Sep 6 | ||
28 | Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Tel Aviv, Israel | Sep 6 | video | |
27 | Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Las Vegas, USA | Aug 12 | underground talk, no publications | |
26 | Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Las Vegas, USA | Aug 9 | slides video | |
25 | Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Las Vegas, USA | Aug 7 | slides video | |
24 | Security of Machine Learning | Intelligent systems, but are they secure? | Tel Aviv, Israel | Aug 1 | ||
23 | Security of Machine Learning | JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else | Tel Aviv, Israel | Jul 31 | slides | |
22 | Security of Machine Learning | Intelligent systems, but are they secure? | Herzliya, Israel | Jun 18 | slides | |
21 | Security of Machine Learning | Intelligent systems, but are they secure? | San Jose, USA | May 21 | ||
20 | Security of Machine Learning | Intelligent systems, but are they secure? | Hod Hasharon, Israel | Mar 14 | ||
19 | Research Management | Enterpranurship, Technology and the road between them | Tel Aviv, Israel | Mar 2 | slides |
2017
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
18 | IoT | The Ukraine Power-Grid Cyber Attack | Tel Aviv, Israel | Oct 24 | slides video | |
17 | Security of Machine Learning | Offensive AI: “Some rules can be bent, others can be broken” | Rishon Lezion, Israel | Oct 18 | slides video | |
16 | Linux Security | Containers are not virtual machines! | Tel Aviv, Israel | Sep 12 | ||
15 | Research Management | What every hacker once knew, a walk down history’s lane | Tel Aviv, Israel | Sep 12 | ||
14 | Research Management | The Threat Horizon: Preparing for the Future | San Jose, USA | Jun 28 | ||
13 | Research Management | What every hacker once knew, a walk down history’s lane | Tel Aviv, Israel | Jun 28 | slides video | |
12 | Malware | The Future of Malware | Haifa, Israel | Jun 1 | ||
11 | Malware | The Future of Malware | Petach Tikva, Israel | Jun 1 | ||
10 | Malware | The Future of Malware | Jerusalem, Israel | Jun 1 | ||
9 | Malware | The Future of Malware | Kiryat Gat, Israel | Jun 1 | ||
8 | Malware | The Future of Malware | Yakum, Israel | Jun 1 |
2014
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
7 | Reverse Engineering | Reverse Engineering Workshop | San Jose, USA | Oct 23 | ||
6 | Research Management | Security Development Lifecycle - how did we get so lost along the way? | London, UK | May 6 |
2013
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
5 | Research Management | It worked on my computer! | Monaco | Dec 20 | ||
4 | Research Management | Think like a hacker | San Jose, USA | Nov 28 |
2011
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
3 | Security of Machine Learning | Ambiguous Facial Recognition | Holon, Israel | Oct 21 |
2010
# | Event | Topic | Title | Location | Date | Links |
---|---|---|---|---|---|---|
2 | Machine Learning | Detecting Thalassemia using Neural Networks | Ramat Gan, Israel | Oct 13 | ||
1 | Security of Machine Learning | Ambiguous Facial Recognition | Airport City, Israel | Jan 28 | 0 |