You can download the official event poster, the family program, and the auditorium map.
You can download the official event poster, the family program, and the auditorium map.
Come to the Virtual Reality area, put on the glasses and immerse yourself in the world of virtual reality together with our pet Botillo; with him you will experience incredible adventures while learning about cybersecurity.
Immerse yourself in this adventure with our protagonist and learn about cybersecurity by playing! Solve the fun mini-games and advance each mission to prevent the evil Cybercrook from achieving its goal. Play son Sergio and save your father's secret!
If you can dream it, then you can build it. With these four workshops on cybersecurity you will learn about the process of digital production and develop your creativity and invention skills:
- Tailoring and Password Creation: Make your t-shirt with your ideal password and check if it is safe. Wear your own design! Recommended age: 8+ or accompanied by an adult
- Sail Safely, Captain: Create the necessary items to protect your ship from the attacks of software pirates and hackers. You will obtain your protection shield! Recommended age: 8+ or accompanied by an adult
- Nerdy Derby: Send your Message: Build your original and exclusive car, part by part. Aim: to reach the end of the track in safety optimum conditions to deliver the message without it being intercepted. Recommended age: 8+ or accompanied by an adult
- Little Bits: Internet of things: Find out how the Internet of Things works, creating a smart object capable of connecting to the Internet. It will surprise you! Recommended age: 12+
It is the place where CyberCamp visitors will receive customized advisory provided by experienced consultants in human resources. Each session consits of:
- Curricular revision (Curriculum review) in order to improve the (quality of the) CV. This includes guidance on how to build the Personal Brand and the key strategies for finding employment on Social Network.
- Job interview simulations to successfully overcome future selection processes.
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
During this workshop, we will explain current methods and the most popular tools to carry out a penetration test on an iOS app. With regard to methodology, for both those aiming to assess the app's security features as well as secure development of the app, we will discuss the resources proposed by the OWASP project at their Mobile Security Project.
In CyberScouts competitions the whole family will be able to compete and enjoy different challenges that show who knows the most about cybersecurity and, most importantly: learn how to safely use Internet services. The winners of each competition will receive a prize.
NOTE: No seats available
Spying and counterintelligence has existed for many years, however, with the emergence of new technologies the techniques used have changed to adapt to the digital age. We explain some of the spying techniques that exist and also how to protect you.
Ages 12 and over.
A love story about two teenagers in which the absolute dedication, the loss of individuality and blind trust to each other can be felt. The problem arises when the relationship deteriorates, as both of them will use all the personal information shared to hurt each other...
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
Sr. D. Antonio Silván,Alcalde de León
Sr. D. José María Lassalle Ruiz Secretario de Estado para la Sociedad de la Información y la Agenda Digital.
Sr. D. Alberto Hernández, Director General de INCIBE
Ages 12 and over.
A love story about two teenagers in which the absolute dedication, the loss of individuality and blind trust to each other can be felt. The problem arises when the relationship deteriorates, as both of them will use all the personal information shared to hurt each other...
Immerse yourself in this adventure with our protagonist and learn about cybersecurity by playing! Solve the fun mini-games and advance each mission to prevent the evil Cybercrook from achieving its goal. Play son Sergio and save your father's secret!
If you can dream it, then you can build it. With these four workshops on cybersecurity you will learn about the process of digital production and develop your creativity and invention skills:
- Tailoring and Password Creation: Make your t-shirt with your ideal password and check if it is safe. Wear your own design! Recommended age: 8+ or accompanied by an adult
- Sail Safely, Captain: Create the necessary items to protect your ship from the attacks of software pirates and hackers. You will obtain your protection shield! Recommended age: 8+ or accompanied by an adult
- Nerdy Derby: Send your Message: Build your original and exclusive car, part by part. Aim: to reach the end of the track in safety optimum conditions to deliver the message without it being intercepted. Recommended age: 8+ or accompanied by an adult
- Little Bits: Internet of things: Find out how the Internet of Things works, creating a smart object capable of connecting to the Internet. It will surprise you! Recommended age: 12+
Come to the Virtual Reality area, put on the glasses and immerse yourself in the world of virtual reality together with our pet Botillo; with him you will experience incredible adventures while learning about cybersecurity.
In CyberScouts competitions the whole family will be able to compete and enjoy different challenges that show who knows the most about cybersecurity and, most importantly: learn how to safely use Internet services. The winners of each competition will receive a prize.
NOTE: No seats available
Spying and counterintelligence has existed for many years, however, with the emergence of new technologies the techniques used have changed to adapt to the digital age. We explain some of the spying techniques that exist and also how to protect you.
In this workshop, we will carry out the whole auditing process for Android applications, testing the points established in OWASP Mobile Top 10 Risks. Learn to analyse any APK, its permits, source code, potential attack vectors such as SQL injections, bypassing of internal authentications, password cracking inside an app, information leakages, etc. Learn how to get inside an Android app and find all of its vulnerabilities. During the workshop, we will analyse, among other things, the Pokemon Go app that has become so popular and check out what information it provides.
Ages 12 and over.
A love story about two teenagers in which the absolute dedication, the loss of individuality and blind trust to each other can be felt. The problem arises when the relationship deteriorates, as both of them will use all the personal information shared to hurt each other...
Practical workshops of 2 hours, with the aim of training teachers in teaching units to the students.
The main risks related to the use of ICTs by children will be addressed from a general point of view, in order to be able to recognise them and know how to act, promoting best practice for safe and responsible use of technology.
The goal of this presentation is to go over several Machine Learning and Deep Learning techniques so as to detect fraud.
Some of the algorithms and technologies that we intend to explain are, for instance, graphs, Neo4J, Apache Spark or Deep Learning libraries such as H2O.
1-hour workshop with the aim of providing families with strategies and recommendations so that they may adopt an integral role which promotes a safe and responsible use of technology by children, avoiding alarmist or permissive positions, promoting safe and responsible use of digital technologies among children and teenagers, in both family and school environments.
Activity addressed to parents, limited spaces and subject to prior registration by sending the following information before 25 November.
While the parents are attending the workshop, children may enjoy the different activities such as workshops, theatre, gymkhanas or competitions!
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
One of the biggest challenges the industry faces nowadays are threats brought from other settings into cybersecurity, as is the case with ransomware.
This presentation aims to warn against this type of threat and to see first-hand their potential impact on the industry.
In CyberScouts competitions the whole family will be able to compete and enjoy different challenges that show who knows the most about cybersecurity and, most importantly: learn how to safely use Internet services. The winners of each competition will receive a prize.
It is the place where CyberCamp visitors will receive customized advisory provided by experienced consultants in human resources. Each session consits of:
- Curricular revision (Curriculum review) in order to improve the (quality of the) CV. This includes guidance on how to build the Personal Brand and the key strategies for finding employment on Social Network.
- Job interview simulations to successfully overcome future selection processes.
As companies increasingly use VoIP, fraud cases are also growing. A good solution to protect our communications is to install a device that will provide users with an additional security layer.
Some products on the market that act as a firewall can also analyse SIP frames in our communications, blocking access attempts, creating consumption filters, blacklisting IPs, etc.
This talk will analyse the security features of one of these devices. We will see the failures in common designs which mean that even though they work well on VoIP communication analysis, they fail to focus on the security of the device itself which can give rise to vulnerabilities in the company's network.
Immerse yourself in this adventure with our protagonist and learn about cybersecurity by playing! Solve the fun mini-games and advance each mission to prevent the evil Cybercrook from achieving its goal. Play son Sergio and save your father's secret!
If you can dream it, then you can build it. With these four workshops on cybersecurity you will learn about the process of digital production and develop your creativity and invention skills:
- Tailoring and Password Creation: Make your t-shirt with your ideal password and check if it is safe. Wear your own design! Recommended age: 8+ or accompanied by an adult
- Sail Safely, Captain: Create the necessary items to protect your ship from the attacks of software pirates and hackers. You will obtain your protection shield! Recommended age: 8+ or accompanied by an adult
- Nerdy Derby: Send your Message: Build your original and exclusive car, part by part. Aim: to reach the end of the track in safety optimum conditions to deliver the message without it being intercepted. Recommended age: 8+ or accompanied by an adult
- Little Bits: Internet of things: Find out how the Internet of Things works, creating a smart object capable of connecting to the Internet. It will surprise you! Recommended age: 12+
NOTE: No seats available
Viruses, worms, trojans ... can be pasted into our computer and perform malicious actions, or turn our computer into a zombie and an attacker use it for their own benefit. Here you will know how malware works, how botnets work - webs of zombie computers - and also how to protect yourself.
Come to the Virtual Reality area, put on the glasses and immerse yourself in the world of virtual reality together with our pet Botillo; with him you will experience incredible adventures while learning about cybersecurity.
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
El objetivo de esta conferencia es mostrar cómo el Ciberespacio afecta a las operaciones militares. En ella se expondrán los cometidos y capacidades del Mando Conjunto de Ciberdefensa, así como los condicionantes que afectan a las operaciones en este nuevo entorno.
Ages 12 and over.
A love story about two teenagers in which the absolute dedication, the loss of individuality and blind trust to each other can be felt. The problem arises when the relationship deteriorates, as both of them will use all the personal information shared to hurt each other...
iOS is considered by the industry as one of the safest platforms. That’s true?
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
Ages 12 and over.
A love story about two teenagers in which the absolute dedication, the loss of individuality and blind trust to each other can be felt. The problem arises when the relationship deteriorates, as both of them will use all the personal information shared to hurt each other...
The goal of this workshop is to demystify some of the information given by the media on the TOR network, providing the audience with realistic information obtained directly by INCIBE, UIT and TOR Project. Practical examples of the use of TOR will be provided.
In CyberScouts competitions the whole family will be able to compete and enjoy different challenges that show who knows the most about cybersecurity and, most importantly: learn how to safely use Internet services. The winners of each competition will receive a prize.
Immerse yourself in this adventure with our protagonist and learn about cybersecurity by playing! Solve the fun mini-games and advance each mission to prevent the evil Cybercrook from achieving its goal. Play son Sergio and save your father's secret!
If you can dream it, then you can build it. With these four workshops on cybersecurity you will learn about the process of digital production and develop your creativity and invention skills:
- Tailoring and Password Creation: Make your t-shirt with your ideal password and check if it is safe. Wear your own design! Recommended age: 8+ or accompanied by an adult
- Sail Safely, Captain: Create the necessary items to protect your ship from the attacks of software pirates and hackers. You will obtain your protection shield! Recommended age: 8+ or accompanied by an adult
- Nerdy Derby: Send your Message: Build your original and exclusive car, part by part. Aim: to reach the end of the track in safety optimum conditions to deliver the message without it being intercepted. Recommended age: 8+ or accompanied by an adult
- Little Bits: Internet of things: Find out how the Internet of Things works, creating a smart object capable of connecting to the Internet. It will surprise you! Recommended age: 12+
Come to the Virtual Reality area, put on the glasses and immerse yourself in the world of virtual reality together with our pet Botillo; with him you will experience incredible adventures while learning about cybersecurity.
NOTE: No seats available
Spying and counterintelligence has existed for many years, however, with the emergence of new technologies the techniques used have changed to adapt to the digital age. We explain some of the spying techniques that exist and also how to protect you.
Ages 12 and over.
A love story about two teenagers in which the absolute dedication, the loss of individuality and blind trust to each other can be felt. The problem arises when the relationship deteriorates, as both of them will use all the personal information shared to hurt each other...
Practical workshops of 2 hours, with the aim of training teachers in teaching units to the students.
The approach to this issue starts from the need to preserve privacy on the Internet and to know the benefits and the risks associated with digital identity. It will be focused on learning to respect personal privacy and others privacy and in understanding the importance of learning to manage a positive digital identity.
How the Spanish team won the European Cyber Security Challenge (ECSC) 2016.
It is a unique event designed in order to let Talents connect and share experiences openly. On one hand, professionals with a large experience in the area of Cybersecurity or recruiters will meet those who could become their future collaborators. On the other hand, Cyber young talents will have the opportunity to meet firsthand the best professionals.
Enrique Serrano will inspire young talents and explain his professional career in the world of cybersecurity. His talk will open the Networking Game, an event that favors the direct interaction between recruiters and future employees.
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
1-hour workshop with the aim of providing families with strategies and recommendations so that they may adopt an integral role which promotes a safe and responsible use of technology by children, avoiding alarmist or permissive positions, promoting safe and responsible use of digital technologies among children and teenagers, in both family and school environments.
Activity addressed to parents, limited spaces and subject to prior registration by sending the following information before 25 November.
While the parents are attending the workshop, children may enjoy the different activities such as workshops, theatre, gymkhanas or competitions!
It is the place where CyberCamp visitors will receive customized advisory provided by experienced consultants in human resources. Each session consits of:
- Curricular revision (Curriculum review) in order to improve the (quality of the) CV. This includes guidance on how to build the Personal Brand and the key strategies for finding employment on Social Network.
- Job interview simulations to successfully overcome future selection processes.
Start guide which explains to parents how to use such a useful tool like the parental control on mobile devices and computers.
In CyberScouts competitions the whole family will be able to compete and enjoy different challenges that show who knows the most about cybersecurity and, most importantly: learn how to safely use Internet services. The winners of each competition will receive a prize.
NOTE: No seats available
Any website is susceptible to attack, so it is important that the pages are not only visually attractive, but also developed and designed in a secure way. Here we will show you how to do it in a practical way.
Come to the Virtual Reality area, put on the glasses and immerse yourself in the world of virtual reality together with our pet Botillo; with him you will experience incredible adventures while learning about cybersecurity.
Recently, one of the main content providers on the Internet surpassed the psychological barrier of 50% of visits received through IPv6. In some countries, the amount of mobile devices that use IPv6 to navigate has also exceeded 50%. In Spain, one of the main Internet operators will start to deploy corporate and personal Internet lines in IPv6 by 2017, and soon this will be a widespread practice in our country.
This massive IPv6 deployment is also bringing about, as could be expected, certain unsafe practices by companies and individuals.
Immerse yourself in this adventure with our protagonist and learn about cybersecurity by playing! Solve the fun mini-games and advance each mission to prevent the evil Cybercrook from achieving its goal. Play son Sergio and save your father's secret!
If you can dream it, then you can build it. With these four workshops on cybersecurity you will learn about the process of digital production and develop your creativity and invention skills:
- Tailoring and Password Creation: Make your t-shirt with your ideal password and check if it is safe. Wear your own design! Recommended age: 8+ or accompanied by an adult
- Sail Safely, Captain: Create the necessary items to protect your ship from the attacks of software pirates and hackers. You will obtain your protection shield! Recommended age: 8+ or accompanied by an adult
- Nerdy Derby: Send your Message: Build your original and exclusive car, part by part. Aim: to reach the end of the track in safety optimum conditions to deliver the message without it being intercepted. Recommended age: 8+ or accompanied by an adult
- Little Bits: Internet of things: Find out how the Internet of Things works, creating a smart object capable of connecting to the Internet. It will surprise you! Recommended age: 12+
Workshop addressing the main risks for minors in online games, explaining how to avoid them and how to act in a situation in which the minor has been affected through these games
Los ataques a través de Amenazas Persistentes Avanzadas (APT) representan actualmente la amenaza más significativa para las empresas y los organismos públicos de todo el mundo y continuarán siéndolo en el futuro. La mejora en la sofisticación de las amenazas sugiere una creciente profesionalización de los atacantes, con independencia de sus objetivos. La enorme disponibilidad de herramientas informáticas y la incesante aparición de servicios e infraestructuras para la perpetración de ciberataques supone que las dificultades para acometer tales acciones son cada vez menores y propicia la aparición de nuevos actores.
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
Show your artistic skills and participate by drawing a strip on cybersecurity, the winner will take a prize. You will have the help of Javi de Castro, Author Revelation Award 2016 in the Barcelona Comic Hall.
HOW? Create a strip with at least 3 bullets about cybersecurity; Network risks, threats, fraud, protection, privacy, cyberbullying ...
Indicate a Nick, age and phone in the back ... and give it to the promoter.
AWARDS for the modality under 14 years a Minidron, for modality from 14 years an eReader.
At 19:30 the winners will be announced
In this workshop the main aspects defining cyberbullying will be discussed: definition of the phenomenon, parties involved, how it is carried out. We will also discuss how to suspect it and detected it and how to act in these situations.
Sharpen your throat and come close to singing about safety, privacy and responsible use of the Internet. Songs composed by David "Insonusvita" that will sing along with the children who attend the workshop. The meaning of each stanza will be explained by Angel Pablo Avilés, belonging to the Telematic Crime Group of the Civil Guard, and co-founder of the X1RedMasSegura initiative.
Ages 9 and over.
A boy and a girl who are addicted to their phones share everything as best friends. The friendship and trust they share is unquestionable for them, to the point of sharing their passwords through instant messaging. The consequences, however, are unexpected...
In this talk, I will discuss the changes the cybersecurity industry has experienced over the past decade and the challenges it will face in the near future.
As an industry, there are many new opportunities and hard problems that we need to solve. Whether you are a student, a researcher or a cybersecurity expert, I invite you to join us in our journey to discover how to make a difference.
We will analyse the concept of sexting and why the children practise it, what the main issues associated with sexting are, why it is a phenomenon which is increasingly popular and what guidelines the family must give and we will discuss dating apps and services.
Suitable for all audiences.
Two children come across a message on their computer informing about an alarming situation that is about to happen. Without questioning it or sharing the message with those around them (father, mother, siblings, etc.) they start acting unthinkingly.
Antonio Ramos will share the guidelines so that young talents can develop a successful professional career in the world of cybersecurity. His talk will open the Networking Game, an event that favors the direct interaction between recruiters and future employees.
It is a unique event designed in order to let Talents connect and share experiences openly. On one hand, professionals with a large experience in the area of Cybersecurity or recruiters will meet those who could become their future collaborators. On the other hand, Cyber young talents will have the opportunity to meet firsthand the best professionals.
In this workshop we will discuss the advantages and disadvantages of allowing children to have their own mobile device at a certain age. We will address key aspects such as the maturity of the minor, main use of the mobile phone, risks and risk prevention and how to teach them to use it in a responsible way.
A Smartphone allows us to perform many actions with just one hand but which also entails a degree of responsibility and risks for its owner if it is not used appropriately. In this workshop we will learn to use these devices in a safe way and to identify and avoid potential risks.
Some devices are completely isolated from the rest of the world. This includes any Internet, wireless, Bluetooth, USB, external storage and even loudspeaker connections. This isolation in critical equipment is called "air gapping".
This presentation will focus on how Morse code signals were transmitted through an updated OSX device and received by a simple AM medium wave receiver, providing an explanation of the source code and the process carried out to transmit EMWs.
Sharpen your throat and come close to singing about safety, privacy and responsible use of the Internet. Songs composed by David "Insonusvita" that will sing along with the children who attend the workshop. The meaning of each stanza will be explained by Angel Pablo Avilés, belonging to the Telematic Crime Group of the Civil Guard, and co-founder of the X1RedMasSegura initiative.
Come to the Virtual Reality area, put on the glasses and immerse yourself in the world of virtual reality together with our pet Botillo; with him you will experience incredible adventures while learning about cybersecurity.
In CyberScouts competitions the whole family will be able to compete and enjoy different challenges that show who knows the most about cybersecurity and, most importantly: learn how to safely use Internet services. The winners of each competition will receive a prize.
Immerse yourself in this adventure with our protagonist and learn about cybersecurity by playing! Solve the fun mini-games and advance each mission to prevent the evil Cybercrook from achieving its goal. Play son Sergio and save your father's secret!
If you can dream it, then you can build it. With these four workshops on cybersecurity you will learn about the process of digital production and develop your creativity and invention skills:
- Tailoring and Password Creation: Make your t-shirt with your ideal password and check if it is safe. Wear your own design! Recommended age: 8+ or accompanied by an adult
- Sail Safely, Captain: Create the necessary items to protect your ship from the attacks of software pirates and hackers. You will obtain your protection shield! Recommended age: 8+ or accompanied by an adult
- Nerdy Derby: Send your Message: Build your original and exclusive car, part by part. Aim: to reach the end of the track in safety optimum conditions to deliver the message without it being intercepted. Recommended age: 8+ or accompanied by an adult
- Little Bits: Internet of things: Find out how the Internet of Things works, creating a smart object capable of connecting to the Internet. It will surprise you! Recommended age: 12+
NOTE: No seats available
Spying and counterintelligence has existed for many years, however, with the emergence of new technologies the techniques used have changed to adapt to the digital age. We explain some of the spying techniques that exist and also how to protect you.
HSTS and HPKP have become, over a short period of time, website security mechanisms that programmers, auditors and users must be familiar with. This workshop will focus on the history of HSTS and HPKP and how their parallel lives, very much like Batman and Robin, help us feel safe when we are online. During the workshop, explanations will be provided on what they are, how they work and what kind of attacks they handle, providing examples of attacks and helping reach conclusions. The workshop will be strongly practical.
Show your artistic skills and participate by drawing a strip on cybersecurity, the winner will take a prize. You will have the help of Javi de Castro, Author Revelation Award 2016 in the Barcelona Comic Hall.
HOW? Create a strip with at least 3 bullets about cybersecurity; Network risks, threats, fraud, protection, privacy, cyberbullying ...
Indicate a Nick, age and phone in the back ... and give it to the promoter.
AWARDS for the modality under 14 years a Minidron, for modality from 14 years an eReader.
At 19:30 the winners will be announced
We will discuss privacy for ICTs , the importance of safeguarding the privacy of minors, giving reasons and specific examples so that the parents may evaluate how this can affect them now and in their future, and we will also discuss the importance of not sharing images of minors online.
We will address the importance of parental mediation and digital education from the family in the prevention of dangers of ICT tools for minors. We will discuss the differences between digital education and parental espionage defining the appropriate limit in digital education, emphasizing the rights to privacy of minors regarding their electronic communications.
Start guide which explains to parents how to use such a useful tool like the parental control on mobile devices and computers.
Suitable for all audiences.
Two children come across a message on their computer informing about an alarming situation that is about to happen. Without questioning it or sharing the message with those around them (father, mother, siblings, etc.) they start acting unthinkingly.
Workshop addressing the main risks for minors in online games, explaining how to avoid them and how to act in a situation in which the minor has been affected through these games
Ages 12 and over.
A love story about two teenagers in which the absolute dedication, the loss of individuality and blind trust to each other can be felt. The problem arises when the relationship deteriorates, as both of them will use all the personal information shared to hurt each other...
This presentation aims to explain the risks of cybersquatting and the ways to detect it before it becomes a threat to any brand or institution.
A demonstration will be made on different techniques such as typosquatting, bitsquatting or IDN Homograph, among others, as well as generic open-source tools that enable the detection of such attacks.
Once the basics are explained, the goal of the study on TLDs will be presented: obtaining data from open sources to work with them and then analyse them to create a tool that will allow work to be automatized.
Once the presentation is over, its effectiveness and operation will be demonstrated by trying to detect actual threats in this field.
Sharpen your throat and come close to singing about safety, privacy and responsible use of the Internet. Songs composed by David "Insonusvita" that will sing along with the children who attend the workshop. The meaning of each stanza will be explained by Angel Pablo Avilés, belonging to the Telematic Crime Group of the Civil Guard, and co-founder of the X1RedMasSegura initiative.
In this workshop the main aspects defining cyberbullying will be discussed: definition of the phenomenon, parties involved, how it is carried out. We will also discuss how to suspect it and detected it and how to act in these situations.
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
Basic Windows exploit development.
We will analyse the concept of sexting and why the children practise it, what the main issues associated with sexting are, why it is a phenomenon which is increasingly popular and what guidelines the family must give and we will discuss dating apps and services.
NOTE: No seats available
Viruses, worms, trojans ... can be pasted into our computer and perform malicious actions, or turn our computer into a zombie and an attacker use it for their own benefit. Here you will know how malware works, how botnets work - webs of zombie computers - and also how to protect yourself.
Come to the Virtual Reality area, put on the glasses and immerse yourself in the world of virtual reality together with our pet Botillo; with him you will experience incredible adventures while learning about cybersecurity.
Research is one of the fundamental pillars of computer security. This talk will delve into how this aspect can be developed, both for personal growth and its usefulness in other areas such as social or business.
Likewise, technical results of unpublished research will be presented, highlighting faults in Entertainment Systems on board aircraft.
We will discuss privacy for ICTs , the importance of safeguarding the privacy of minors, giving reasons and specific examples so that the parents may evaluate how this can affect them now and in their future, and we will also discuss the importance of not sharing images of minors online.
In CyberScouts competitions the whole family will be able to compete and enjoy different challenges that show who knows the most about cybersecurity and, most importantly: learn how to safely use Internet services. The winners of each competition will receive a prize.
It is the place where CyberCamp visitors will receive customized advisory provided by experienced consultants in human resources. Each session consits of:
- Curricular revision (Curriculum review) in order to improve the (quality of the) CV. This includes guidance on how to build the Personal Brand and the key strategies for finding employment on Social Network.
- Job interview simulations to successfully overcome future selection processes.
Immerse yourself in this adventure with our protagonist and learn about cybersecurity by playing! Solve the fun mini-games and advance each mission to prevent the evil Cybercrook from achieving its goal. Play son Sergio and save your father's secret!
If you can dream it, then you can build it. With these four workshops on cybersecurity you will learn about the process of digital production and develop your creativity and invention skills:
- Tailoring and Password Creation: Make your t-shirt with your ideal password and check if it is safe. Wear your own design! Recommended age: 8+ or accompanied by an adult
- Sail Safely, Captain: Create the necessary items to protect your ship from the attacks of software pirates and hackers. You will obtain your protection shield! Recommended age: 8+ or accompanied by an adult
- Nerdy Derby: Send your Message: Build your original and exclusive car, part by part. Aim: to reach the end of the track in safety optimum conditions to deliver the message without it being intercepted. Recommended age: 8+ or accompanied by an adult
- Little Bits: Internet of things: Find out how the Internet of Things works, creating a smart object capable of connecting to the Internet. It will surprise you! Recommended age: 12+
We will address the importance of parental mediation and digital education from the family in the prevention of dangers of ICT tools for minors. We will discuss the differences between digital education and parental espionage defining the appropriate limit in digital education, emphasizing the rights to privacy of minors regarding their electronic communications.
Show your artistic skills and participate by drawing a strip on cybersecurity, the winner will take a prize. You will have the help of Javi de Castro, Author Revelation Award 2016 in the Barcelona Comic Hall.
HOW? Create a strip with at least 3 bullets about cybersecurity; Network risks, threats, fraud, protection, privacy, cyberbullying ...
Indicate a Nick, age and phone in the back ... and give it to the promoter.
AWARDS for the modality under 14 years a Minidron, for modality from 14 years an eReader.
At 19:30 the winners will be announced
This talk presents a study on different families of this kind of malware conducted between 2011 and 2015 and which categorises 22 samples according to: (i) how they work and how they become persistent on the system; (ii) the type of card data they search for, and (iii) how they leak sensitive data.
The code of some particular samples will be shown so as to provide a "live" demonstration of this malware's behaviour. For this purpose, a new malware analysis tool currently in progress based on dynamic instrumentation principles will be used.
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
In this workshop we will discuss the advantages and disadvantages of allowing children to have their own mobile device at a certain age. We will address key aspects such as the maturity of the minor, main use of the mobile phone, risks and risk prevention and how to teach them to use it in a responsible way.
Sharpen your throat and come close to singing about safety, privacy and responsible use of the Internet. Songs composed by David "Insonusvita" that will sing along with the children who attend the workshop. The meaning of each stanza will be explained by Angel Pablo Avilés, belonging to the Telematic Crime Group of the Civil Guard, and co-founder of the X1RedMasSegura initiative.
Ages 9 and over.
A boy and a girl who are addicted to their phones share everything as best friends. The friendship and trust they share is unquestionable for them, to the point of sharing their passwords through instant messaging. The consequences, however, are unexpected...
The curiosity of students makes them test everything they learn. However, on many occasions, instead of testing on a virtual machine, tests are carried out on actual systems. The presentation is based on an exploit-based hacking attack to detect the security vulnerabilities in a computer system and the potential criminal consequences of "crossing the line" that makes pentesting constitute one or several crimes.
The goal is to explain what happened when the possibility of carrying out a virtual attack as a practice exercise was suggested on www.evidencias.es.
A Smartphone allows us to perform many actions with just one hand but which also entails a degree of responsibility and risks for its owner if it is not used appropriately. In this workshop we will learn to use these devices in a safe way and to identify and avoid potential risks.
In this workshop the main aspects defining cyberbullying will be discussed: definition of the phenomenon, parties involved, how it is carried out. We will also discuss how to suspect it and detected it and how to act in these situations.
Suitable for all audiences.
Two children come across a message on their computer informing about an alarming situation that is about to happen. Without questioning it or sharing the message with those around them (father, mother, siblings, etc.) they start acting unthinkingly.
We will analyse the concept of sexting and why the children practise it, what the main issues associated with sexting are, why it is a phenomenon which is increasingly popular and what guidelines the family must give and we will discuss dating apps and services.
Sharpen your throat and come close to singing about safety, privacy and responsible use of the Internet. Songs composed by David "Insonusvita" that will sing along with the children who attend the workshop. The meaning of each stanza will be explained by Angel Pablo Avilés, belonging to the Telematic Crime Group of the Civil Guard, and co-founder of the X1RedMasSegura initiative.
Immerse yourself in this adventure with our protagonist and learn about cybersecurity by playing! Solve the fun mini-games and advance each mission to prevent the evil Cybercrook from achieving its goal. Play son Sergio and save your father's secret!
If you can dream it, then you can build it. With these four workshops on cybersecurity you will learn about the process of digital production and develop your creativity and invention skills:
- Tailoring and Password Creation: Make your t-shirt with your ideal password and check if it is safe. Wear your own design! Recommended age: 8+ or accompanied by an adult
- Sail Safely, Captain: Create the necessary items to protect your ship from the attacks of software pirates and hackers. You will obtain your protection shield! Recommended age: 8+ or accompanied by an adult
- Nerdy Derby: Send your Message: Build your original and exclusive car, part by part. Aim: to reach the end of the track in safety optimum conditions to deliver the message without it being intercepted. Recommended age: 8+ or accompanied by an adult
- Little Bits: Internet of things: Find out how the Internet of Things works, creating a smart object capable of connecting to the Internet. It will surprise you! Recommended age: 12+
Come to the Virtual Reality area, put on the glasses and immerse yourself in the world of virtual reality together with our pet Botillo; with him you will experience incredible adventures while learning about cybersecurity.
In CyberScouts competitions the whole family will be able to compete and enjoy different challenges that show who knows the most about cybersecurity and, most importantly: learn how to safely use Internet services. The winners of each competition will receive a prize.
NOTE: No seats available
When an incident occurs in which a digital device is involved, how can information be obtained to find out what has happened? We explain to you what information is needed in a forensic analysis and how it should be recovered.
Show your artistic skills and participate by drawing a strip on cybersecurity, the winner will take a prize. You will have the help of Javi de Castro, Author Revelation Award 2016 in the Barcelona Comic Hall.
HOW? Create a strip with at least 3 bullets about cybersecurity; Network risks, threats, fraud, protection, privacy, cyberbullying ...
Indicate a Nick, age and phone in the back ... and give it to the promoter.
AWARDS for the modality under 14 years a Minidron, for modality from 14 years an eReader.
At 19:30 the winners will be announced
Start guide which explains to parents how to use such a useful tool like the parental control on mobile devices and computers.
Workshop addressing the main risks for minors in online games, explaining how to avoid them and how to act in a situation in which the minor has been affected through these games
We will discuss privacy for ICTs , the importance of safeguarding the privacy of minors, giving reasons and specific examples so that the parents may evaluate how this can affect them now and in their future, and we will also discuss the importance of not sharing images of minors online.
Suitable for all audiences.
Two children come across a message on their computer informing about an alarming situation that is about to happen. Without questioning it or sharing the message with those around them (father, mother, siblings, etc.) they start acting unthinkingly.
We will address the importance of parental mediation and digital education from the family in the prevention of dangers of ICT tools for minors. We will discuss the differences between digital education and parental espionage defining the appropriate limit in digital education, emphasizing the rights to privacy of minors regarding their electronic communications.
Sharpen your throat and come close to singing about safety, privacy and responsible use of the Internet. Songs composed by David "Insonusvita" that will sing along with the children who attend the workshop. The meaning of each stanza will be explained by Angel Pablo Avilés, belonging to the Telematic Crime Group of the Civil Guard, and co-founder of the X1RedMasSegura initiative.
Ages 12 and over.
A love story about two teenagers in which the absolute dedication, the loss of individuality and blind trust to each other can be felt. The problem arises when the relationship deteriorates, as both of them will use all the personal information shared to hurt each other...
Suitable for all audiences.
After school, Eva and Carlos have some homework to do, but unlike other days, this evening's task seems very interesting: to look for information about their parents on the Internet. The different searches on the Internet will help them find out some things about them they didn't know, creating some doubts and many questions...
In this workshop we will discuss the advantages and disadvantages of allowing children to have their own mobile device at a certain age. We will address key aspects such as the maturity of the minor, main use of the mobile phone, risks and risk prevention and how to teach them to use it in a responsible way.
A Smartphone allows us to perform many actions with just one hand but which also entails a degree of responsibility and risks for its owner if it is not used appropriately. In this workshop we will learn to use these devices in a safe way and to identify and avoid potential risks.
CreaComic Awards.
Prizes for the under-14s category a Minidrone, and for the over-14s category an eReader.