| 18 |  | IoT | The Ukraine Power-Grid Cyber Attack | Tel Aviv, Israel | Oct 24 | slides video |
| 17 |  | Security of Machine Learning | Offensive AI: “Some rules can be bent, others can be broken” | Rishon Lezion, Israel | Oct 18 | slides video |
| 16 |  | Linux Security | Containers are not virtual machines! | Tel Aviv, Israel | Sep 12 | |
| 15 |  | Research Management | What every hacker once knew, a walk down history’s lane | Tel Aviv, Israel | Sep 12 | |
| 14 |  | Research Management | The Threat Horizon: Preparing for the Future | San Jose, USA | Jun 28 | |
| 13 |  | Research Management | What every hacker once knew, a walk down history’s lane | Tel Aviv, Israel | Jun 28 | slides video |
| 12 |  | Malware | The Future of Malware | Haifa, Israel | Jun 1 | |
| 11 |  | Malware | The Future of Malware | Petach Tikva, Israel | Jun 1 | |
| 10 |  | Malware | The Future of Malware | Jerusalem, Israel | Jun 1 | |
| 9 |  | Malware | The Future of Malware | Kiryat Gat, Israel | Jun 1 | |
| 8 |  | Malware | The Future of Malware | Yakum, Israel | Jun 1 | |