Agenda

Provisional event agenda

Subscribe to Diary - RSS | Cybercamp

Thursday, November 30, 2017

Morning

Families workshops
10:00
1h.

Security on a PC

At the end of the workshop the student will know the main security features in a PC with Windows operating system versions 7, 8.1 and 10.

Technical workshops
11:00
2h.

T1-Offensive and defensive security with machine learning

Jose Ignacio Escribano

The workshop will allow attendees to have a clear notification of the real state of artificial intelligence, its application to the world of cybersecurity and its potential / limitations in its application to other scenarios. References will be attached so that the assistant can be trained in this subject of great present and future.

Auditorium
11:00
1h.

A1-TBD

TBD

Workshop auditorium Multipurpose room Multipurpose room Multipurpose room
11:00
1h.

EP1-Companies and SMEs: cybersecurity is not an option

M. A. Lozano

Currently, companies and more specifically SMEs, have become the target of attacks by cybercriminals. Ransomware, phishing and other threats lurk online to try to destroy your business. From this talk, you can raise awareness about these risks and where, in addition, comfortably, proof of concept to see how cybercriminals act

Auditorium
12:00
1h.

A2- Security in free social networks. Attacks and threats

Miguel Hernández Boza

In this paper we will study free social networks, their most important characteristics and security problems they may have. Attackers may be interested in attacking them and affecting systems alien to them. The reason is simple, your security and your incident response team do not have the capacity of large "commercial" social networks.

Families workshops
13:00
1h.

Identification of Internet Risks

At the end of the workshop the student will know the different threats and risks that the daily use of the internet supposes. Online stores and emails are not exempt from these risks.

Auditorium
13:00
1h.

A3-Keynote

TBD

Afternoon

Families workshops
15:00
1h.

Security on a PC

At the end of the workshop the student will know the main security features in a PC with Windows operating system versions 7, 8.1 and 10.

Workshop auditorium Multipurpose room Multipurpose room Multipurpose room
16:00
1h.

EP2- TBD

Auditorium
16:00
1h.

A4-Advances in machine learning applied to cybersecurity

Alfonso Muñoz

The workshop will allow attendees to have a clear notion of the current state of artificial intelligence, its application to the world of cybersecurity and its potential / limitations in its application to other scenarios. References will be attached so that the assistant can be properly trained in this subject of great present and future.

Technical workshops
16:00
2h.

T2- DFIR: Tracing lateral movements on day d.

Chema García

He teaches the use of a tool to automate the process of creating relationships between logon events from security events in windows, showing a graphic relationship between users (domain or local), the machines involved in the relationship , duration of the session, etc. Allowing you to quickly consult which users had a session started at a certain time.

Likewise, the tool has several output modules, allowing integration with third-party tools and the exploitation of the resulting data: CSV, Neo4J, SQLite, Gephi, Graphviz, JSON.

Auditorium
17:00
1h.

A5-TBD

To be done

Theatre
17:00

Risks of Internet

Policía Nacional

Talk focused on the responsible use of the internet and how to avoid the dangers that affect children.

Workshop auditorium Multipurpose room Multipurpose room Multipurpose room
17:00
1h.

EP3-Early detection of ransomware on Android

Lucía Álvarez Gonzalez, José Antonio Gómez Hernández

Competitions
18:00
2h.

COM1-Welcome to the world of the CTF

Javier Rodríguez Bouza y Daniel Fernández Rodríguez

Welcome to the world of CTF is a practical workshop aimed at all those who want to enter the world of safety competitions or those who, already knowing, want to discover alternative techniques or simply share a group experience in a type of competitions where usually it is participated individually. This workshop shows the tests of the most common categories that we can find in CTF's of any level, either in our local NOC or in competitions of international level.

Technical workshops
18:00
2h.

T3-TBD

To be done

 

Families workshops
18:00
1h.

Identification of Internet Risks

At the end of the workshop the student will know the different threats and risks that the daily use of the internet supposes. Online stores and emails are not exempt from these risks.

Workshop auditorium Multipurpose room Multipurpose room Multipurpose room
18:00
90m.

EP4-Awareness talk

M.A.Lozano

Currently, companies and more specifically SMEs, have become the target of attacks by cybercriminals. Ransomware, phishings and other threats lurk on the internet to try to harm your business. From this talk, it is intended to raise awareness about these risks and where, in addition, you can see simple concept tests to see how cybercriminals act.

Auditorium
18:00
1h.

A6-Securing APIs with RSA Cryptography: Beyond SSL

Tomás García Merás Capote

This talk teaches how to protect a REST API with electronic signatures and digital envelopes, all through free software libraries available in the GitHub repository of the Technology Transfer Center of the Government of Spain.

Families workshops
19:00
1h.

Security on a PC

At the end of the workshop the student will know the main security features in a PC with Windows operating system versions 7, 8.1 and 10.

Auditorium
19:00
1h.

A7- User Geolocation Bots in Telegram

Eduardo Sanchez Toríl

The purpose of the presentation is to see how, from the use of bots, we can obtain user information through the use of digital beacons that will be passed to users based on their interaction with the bots. We will carry out the use of Chatfuel for the development of the bots and provide them with behavior. These bots will be able to interact with users in particular or with groups of users, passing different information links that users request, which means that we can obtain more information about them since these links are marked.

Friday, December 1, 2017

Morning

Families workshops
10:00
1h.

Security and Privacy in Internet services

At the end of the workshop the student will know the main security features in Internet services. You will learn how to configure privacy in your email and in your social media accounts. You will know the risks of sharing your personal information on the internet.

Workshop auditorium Multipurpose room Multipurpose room Multipurpose room
10:00
2h.

EP5-Hackathon presentation

The participants of the Hackathon will show the software and hardware developments achieved during the competition.

Competitions
10:00
10h.

Hackathon

A Hackathon is a meeting or face-to-face event of collaborative software development (or hardware) in a short period of time. The participating teams will compete against other teams to develop or improve tools, solutions and / or open source cybersecurity applications, new or existing, thus providing new functionalities, improvements or innovative capabilities to the selected free software project.

Technical workshops
10:00
2h.

T4-TBD

Auditorium
10:00
1h.

A8-Harry vs. Mr Robot

Sergio Saiz

Families workshops
11:00
1h.

Identification of Internet Risks

At the end of the workshop the student will know the different threats and risks that the daily use of the internet supposes. Online stores and emails are not exempt from these risks.

Families workshops
12:00
1h.

Security on a PC

At the end of the workshop the student will know the main security features in a PC with Windows operating system versions 7, 8.1 and 10.

Technical workshops
12:00
2h.

T5-To cloud or not to cloud: Automating security audits and hardening in cloud systems

Antonio Fernandez Basilio

In this workshop, relying on several solutions both open source and own is shown as a malicious actor can cause a data leak, compromise our credentials or make improper use of our authentication systems, apis, interfaces ... using exploits against the design of the infrastructures. It will also try to explain how to build tools that help correct these detected vulnerabilities.

Auditorium
12:00
30m.

A9-Institutional opening ceremony

TBD

Workshop auditorium Multipurpose room Multipurpose room Multipurpose room
12:00
2h

EP6-Carmen Torrano

Competitions
12:00
5h.

CyberOlympics

CyberOlympics is a championship oriented to educational centers of Secondary Education, Baccalaureate and Vocational Training at national level. In this competition, technical skills in different fields of Internet security and new technologies are tested through a series of skill challenges in war game mode.

Auditorium
12:30
30m.

A10-About INCIBE

The National Cybersecurity Institute of Spain (INCIBE), a subsidiary of the Ministry of Energy, Tourism and Digital Agenda (MINETAD) through the Secretariat of State and for the Information Society and Digital Agenda (SESIAD), is the entity of reference for the development of cybersecurity and digital confidence of citizens, the Spanish academic and research network (RedIRIS) and companies, especially for strategic sectors. 

Auditorium
13:00
1h.

A11-Keynote

This day at this time a great expert in cybersecurity worldwide will give a master class in the field. Who will it be? Stay tuned on social networks to find out!

Afternoon

Families workshops
13:00
1h.

Security in Smartphones & Wearables

At the end of the workshop the student will apply the basic security settings in phones with "Android" and "IOS" operating systems. You will know what Wearables devices are and what security problems they can cause.

Technical workshops
16:00
1h.

EP7-How is the profession of a Computer Forensic

Families workshops
16:00
1h.

Identification of Internet Risks

At the end of the workshop the student will know the different threats and risks that the daily use of the internet supposes. Online stores and emails are not exempt from these risks.

Auditorium
16:00
45m.

A12-TBD

Technical workshops
16:00
2h.

T6-TBD

Auditorium
16:45
45m.

A13- TBD

To be done

Families workshops
17:00
1h.

Security on a PC

At the end of the workshop the student will know the main security features in a PC with Windows operating system versions 7, 8.1 and 10.

Technical workshops
17:00
1h.

EP8-New Paradigms of Content-Based Analysis for the Detection of Spam in Social Networks

Auditorium
17:30
30m.

A14-CyberOlympics awards ceremony

Come and know who is the winner of this year's edition of CyberOlimpics! You can see that deinstituto centers in Spain are the latest in cybersecurity values!

Workshop auditorium Multipurpose room Multipurpose room Multipurpose room
18:00
90m.

EP9-Awareness talk

M. A. Lozano

Currently, companies and more specifically SMEs, have become the target of attacks by cybercriminals. Ransomware, phishings and other threats lurk on the internet to try to harm your business. From this talk, it is intended to raise awareness about these risks and where, in addition, you can see simple concept tests to see how cybercriminals act.

Technical workshops
18:00
2h.

T7-The mobile killed the smart card

Families workshops
18:00
1h.

Security in Smartphones & Wearables

At the end of the workshop the student will apply the basic security settings in phones with "Android" and "IOS" operating systems. You will know what Wearables devices are and what security problems they can cause.

Competitions
18:00
2h.

COM2- Welcome to the world of the CTF

Javier Rodríguez Bouza y Daniel Fernández Rodríguez

Welcome to the world of CTF is a practical workshop aimed at all those who want to enter the world of safety competitions or those who, already knowing, want to discover alternative techniques or simply share a group experience in a type of competitions where usually it is participated individually. This workshop shows the tests of the most common categories that we can find in CTF's of any level, either in our local NOC or in competitions of international level.

 

Workshop auditorium Multipurpose room Multipurpose room Multipurpose room
19:00
1h.

EP10-Mathematics in the evolution of cryptography.

Families workshops
19:00
1h.

Security and Privacy in Internet services

At the end of the workshop the student will know the main security features in Internet services. You will learn how to configure privacy in your email and in your social media accounts. You will know the risks of sharing your personal information on the internet.

Auditorium
19:00
1h.

A15-Testing UAC on Windows 10

Ernesto Fernandez Provecho

The objective of this conference is to present one of the most used attacks to gain administrator privileges on Windows 7, 8 and 10 systems, the "UAC attacks bypass", as well as to show a new method based on one already known to perform such attacks on Windows 8 and 10 systems.

Saturday, December 2, 2017

Morning

Families workshops
10:00
30 minutes

Time to install a parental control

Josep Albors

Initiation guide where parents will be explained how to use a useful tool such as parental control on mobile devices and computers.

Competitions
10:00
10h.

Hackathon

A Hackathon is a meeting or face-to-face event of collaborative software development (or hardware) in a short period of time. The participating teams will compete against other teams to develop or improve tools, solutions and / or open source cybersecurity applications, new or existing, thus providing new functionalities, improvements or innovative capabilities to the selected free software project.

Families workshops
10:00
1h.

Security on a PC

At the end of the workshop the student will know the main security features in a PC with Windows operating system versions 7, 8.1 and 10.

Competitions
10:00
8h.

CTF individual

The individual CTF is a competition that consists of a series of individual challenges which aim to empower the new promises of Cybersecurity. The final challenge is a simulation of a real environment where participants can test their skills.

Auditorium
10:00
1h.

A16

TBD

Workshop auditorium Multipurpose room Multipurpose room Multipurpose room
10:00
2h.

EP11- Manuel Camacho

Manuel Camacho

The workshop will consist of previously analyzing the WordPress CMS, discovering what methods exist and can be easily used to protect WordPress sites, and a server level as a back-end level. In addition, it is indicated that it blocks access from anonymity networks and protection against DoS attacks. All with tools 100% free and free.

Technical workshops
10:00
2h.

T8-Sniffing of web traffic evading some measures

Families workshops
10:30
30 minutes

Sexting and flirting applications

David Cortejoso

It will analyze what sexting is and why children practice it, what are the problems associated with sexting itself, why it is a phenomenon that is increasing among children, what guidelines should be given from the family and will be discussed about the apps and flirting services.

Auditorium
11:00
1h.

A17-Cybercrimes: in clarity and darkness

Francisco Jesús Rodriguez ; Luis Fernandez Prieto

The aim of the paper is to show how from INCIBE we detect cybercrimes in the darkness of the Deep Web using three fundamental factors: the power of technology development for the automation of tasks, applied research in fields such as Artificial Intelligence and experience of the final user (State Security Forces and Bodies). Likewise, an example of the closest cybercrime will be exposed, crimes that occur on Surface web, which seek to obtain the greatest possible number of victims and that directly affect Spanish domains.

Families workshops
11:00
30 minutes

Dangerous communities vs. positive communities

Ángel Pablo Avilés

The differences and criteria will be analyzed to identify and differentiate communities or websites that contain some type of danger for minors, as well as to provide recommendations to prevent and act against said problem.

Families workshops
11:30
30 minutes

Learning to use a smartphone safely

Josep Albors

It will teach to use a smartphone safely and learn to identify and avoid potential risks.

Families workshops
12:00
30 minutes

The phenomenon of cyberbullying

David Cortejoso

The main aspects that define cyberbullying will be discussed: definition of the phenomenon, actors involved, mechanisms to carry it out, as well as how to suspect and detect it and how to act in such situations.

Theatre
12:00
1h.

The glass shoe

A boy and a girl addicted to their cell phones share everything as best friends. The friendship and trust that they have is unquestionable for them, to the point of sharing their passwords through instant messaging. However, the consequences will be unexpected ...

Technical workshops
12:00
2h.

T9-Autopsying Whatsapp

Manuel Guerra

The idea of this workshop, eminently practical, is to demonstrate and show all the information that can be extracted from the most used instant messaging application in Spain and in the rest of Europe: WhatsApp.

Auditorium
12:00
1h.

A18- Tempest Revolution 2.0

Pedro Candel

In this presentation, we will demonstrate the evolution of the Tempest project that allowed to transmit signals in morse code and receive them with a medium wave AM receiver. It has been achieved through its evolution to "Tempest Revolution 2.0" transmit information using different sounds modulated by the CPU itself (it would sound similar to the old telephone modems), -without need of any external connectivity-, which allow a higher bitrate and security in the reception of the data, guaranteeing its confidentiality in order to exfiltrate the secrets of an isolated team.

Technical workshops
12:00
2h.

EP12- My perfect cloud

Adrián Ramírez

A fun and interactive workshop will be held, where a 100% OpenSource cloud will be built from 0. In it, you can store all kinds of files, share all types of files safely with other users and even view documents and photos online. To finish it will be taught how to increase the security of the cloud before leaving it free through cyberspace.

Families workshops
12:30
30 minutes

Age for your first mobile?

Ángel Pablo Avilés

The pros and cons of allowing minors to have their own mobile device at a certain age will be discussed. We will talk about key aspects such as the child's maturity, the main use of the mobile phone, risks and their prevention, and how to get them to use it responsibly.

Auditorium
13:00
1h.

A19-Keynote

This day at this time a great expert in cybersecurity worldwide will give a master class in the field. Who will it be? Stay tuned on social networks to find out!

Afternoon

Families workshops
13:00
1h.

Identification of Internet Risks

At the end of the workshop the student will know the different threats and risks that the daily use of the internet supposes. Online stores and emails are not exempt from these risks.

Families workshops
13:00
30 minutes

Time to install a parental control

Josep Albors

Initiation guide where parents will be explained how to use a useful tool such as parental control on mobile devices and computers.

Theatre
13:00
1h.

Eye! Contrast

Two children meet with a message that arrives at their computer in which they are informed of an alarming situation that is about to happen. Without questioning or sharing the message with their immediate surroundings (father, mother, brothers, etc.) they begin to carry out actions in an unreflective and meaningless way.

Families workshops
13:30
30 minutes

Privacy: so important to my child's future?

David Cortejoso

They will talk about what is privacy in ICT, the importance of safeguarding the privacy of minors, giving reasons and concrete examples so that parents can assess how it can affect them now and in their future, and will discuss the importance of not sharing images of minors in the network.

 

Families workshops
14:00
30 minutes

Parental Mediation: Should we spy on our children?

Ángel Pablo Avilés

The importance of parental mediation and digital education from the family in the prevention of the dangers of ICT in minors will be addressed. We will discuss the differences between digital education and parental espionage by talking about where is the appropriate limit in digital education, emphasizing the rights of minors to privacy in their electronic communications.

Families workshops
14:30
30 minutes

Learning to use a smartphone safely

Josep Albors

It will teach to use a smartphone safely and learn to identify and avoid potential risks.

Families workshops
16:00
30 minutes

Learning to use a smartphone safely

Josep Albors

It will teach to use a smartphone safely and learn to identify and avoid potential risks.

Auditorium
16:00
1h.

A20-UAC Bypass & Research with UAC-A-Mola

Pablo Gonzalez

UAC-A-Mola is a new framework designed to detect, detect, exploit and mitigate weaknesses called UAC derivations. These weaknesses are found in Microsoft Windows operating systems. UAC-A-Mola allows to automate the detection of a UAC derivation in a machine with Windows 7/8/1 8.1 / 10. UAC-A-Mola allows different modules, customizable, that allows to automate the research in search of UAC derivations, mainly, in the file and the hijacking of DLL.

The document will detail the IDEM methodology (Research, Detection, Exploitation and Mitigation). In addition, it explains how the tool has been developed and how the community can use and improve it. It is an open source project.

Technical workshops
16:00
2h.

EP13- Pendiente

Families workshops
16:00
1h.

Security on a PC

At the end of the workshop the student will know the main security features in a PC with Windows operating system versions 7, 8.1 and 10.

Theatre
16:00
1h.

The glass shoe

A boy and a girl addicted to their cell phones share everything as best friends. The friendship and trust that they have is unquestionable for them, to the point of sharing their passwords through instant messaging. However, the consequences will be unexpected ...

Technical workshops
16:00
2h.

T10-Technical workshop: Create your own Hacking platform with Docker: distributed, scalable, cheap and easy to maintain

Families workshops
16:30
30 minutes

The phenomenon of cyberbullying

David Cortejoso

The main aspects that define cyberbullying will be discussed: definition of the phenomenon, actors involved, mechanisms to carry it out, as well as how to suspect and detect it and how to act in such situations.

Auditorium
17:00
1h.

A21

TBD

Families workshops
17:00
30 minutes

Age for your first mobile?

Ángel Pablo Avilés

The pros and cons of allowing minors to have their own mobile device at a certain age will be discussed. We will talk about key aspects such as the child's maturity, the main use of the mobile phone, risks and their prevention, and how to get them to use it responsibly.

Families workshops
17:00
1h.

Security in Smartphones & Wearables

At the end of the workshop the student will apply the basic security settings in phones with "Android" and "IOS" operating systems. You will know what Wearables devices are and what security problems they can cause.

Theatre
17:00
1h.

Eye! Contrast

Two children meet with a message that arrives at their computer in which they are informed of an alarming situation that is about to happen. Without questioning or sharing the message with their immediate surroundings (father, mother, brothers, etc.) they begin to carry out actions in an unreflective and meaningless way.

Families workshops
17:30
30 minutes

Sexting and flirting applications

David Cortejoso

It will analyze what sexting is and why children practice it, what are the problems associated with sexting itself, why it is a phenomenon that is increasing among children, what guidelines should be given from the family and will be discussed about the apps and flirting services.

Technical workshops
18:00
2h.

EP14-Privacy and anonymity on the Net: Basic use of Tor Browser

Francisco Jesús Rodriguez

The aim of the workshop is to explain in a simple and clear way the different existing technologies to preserve our privacy and anonymity in the network through the use of Proxys, VPN and the TOR network. We will see what they are and the differences between them. Basic notions will be given on the use of the browser that allows us to navigate using the Tor: Tor Browser network. The workshop is intended for people concerned about their privacy and anonymity and who want to introduce themselves in the use of this technology.

Auditorium
18:00
1h.

A22

TBD

Families workshops
18:00
1h.

Security and Privacy in Internet services

At the end of the workshop the student will know the main security features in Internet services. You will learn how to configure privacy in your email and in your social media accounts. You will know the risks of sharing your personal information on the internet.

Technical workshops
18:00
2h.

T11-Ethical Hacking

Families workshops
18:00
30m.

PEGI 18: What do the children play?

The PEGI system of videogame cataloging by age will be described, as well as videogames and the risks that most influence minors today.

Families workshops
18:30
30 minutes

Dangerous communities vs. positive communities

Ángel Pablo Avilés

The differences and criteria will be analyzed to identify and differentiate communities or websites that contain some type of danger for minors, as well as to provide recommendations to prevent and act against said problem.

Auditorium
19:00
1h.

A23- Hacking TOR & Freenet for fun, profit and stop the evil

Daniel Echeverri

It will deal with the detection of vulnerabilities, pentesting and exploitation in hidden services in TOR, a replication of services hidden in TOR and injection of malicious Javascript routines, the use of insecure functions in the Freenet API, the creation of malicious add-ons and without verification of content by the instance and an execution of arbitrary code in Freenet instances using malicious encryption keys.

Families workshops
19:00
30 minutes

Privacy: so important to my child's future?

David Cortejoso

They will talk about what is privacy in ICT, the importance of safeguarding the privacy of minors, giving reasons and concrete examples so that parents can assess how it can affect them now and in their future, and will discuss the importance of not sharing images of minors in the network.

 

Theatre
19:00
1h.

Until life separates us

A love story between two young people in which the absolute surrender, the loss of individuality and the blind trust that one has for the other is clearly palpable. The problem comes when the relationship deteriorates, as both will use all the intimate information shared to hurt themselves ...

Families workshops
19:00
1h.

Identification of Internet Risks

At the end of the workshop the student will know the different threats and risks that the daily use of the internet supposes. Online stores and emails are not exempt from these risks.

Families workshops
19:30
30 minutes

Parental Mediation: Should we spy on our children?

Ángel Pablo Avilés

The importance of parental mediation and digital education from the family in the prevention of the dangers of ICT in minors will be addressed. We will discuss the differences between digital education and parental espionage by talking about where is the appropriate limit in digital education, emphasizing the rights of minors to privacy in their electronic communications.

Auditorium
20:00
30m.

A24-How the Spanish team managed to beat the ECSC2017

In this talk, members of the Spanish cybersecurity team will tell how they managed to win the victory of the biggest cybersecurity competition in Europe in 2017.

Sunday, December 3, 2017

Morning

Families workshops
10:00
30 minutes

Learning to use a smartphone safely

Josep Albors

It will teach to use a smartphone safely and learn to identify and avoid potential risks.

Competitions
10:00
2h.

COM3- Welcome to the CTF world

Javier Rodríguez Bouza y Daniel Fernández Rodríguez

Welcome to the world of CTF is a practical workshop aimed at all those who want to enter the world of safety competitions or those who, already knowing, want to discover alternative techniques or simply share a group experience in a type of competitions where usually it is participated individually. This workshop shows the tests of the most common categories that we can find in CTF's of any level, either in our local NOC or in competitions of international level.

Families workshops
10:00
1h.

Security and Privacy in Internet services

At the end of the workshop the student will know the main security features in Internet services. You will learn how to configure privacy in your email and in your social media accounts. You will know the risks of sharing your personal information on the internet.

Technical workshops
10:00
2h.

EP15-Hackathon presentation

The participants of the Hackathon will show the software and hardware developments achieved during the competition.

Competitions
10:00
4h.

Hackathon

A Hackathon is a meeting or face-to-face event of collaborative software development (or hardware) in a short period of time. The participating teams will compete against other teams to develop or improve tools, solutions and / or open source cybersecurity applications, new or existing, thus providing new functionalities, improvements or innovative capabilities to the selected free software project.

Technical workshops
10:00
2h.

T12-Criptografy applicated

Jorge Ramió

In this workshop, after a brief introduction to modern digit systems, the operation of the AES algorithms (for encryption, decryption, function tracking and brute force attack example) and RSA (for key generation, encryption, deciphered and examples of attacks by whole factorization, by cyclic encryption and by birthday paradox).


Afterwards, some practices of its execution will be carried out from the following software: AESphere, genRSA v2.1 and OpenSSL, Win64 OpenSSL v1.1.0g.


If you want to follow the workshop with a personal laptop, it is advisable to have previously downloaded and installed these three programs, although they can also be downloaded from the workshop.

Auditorium
10:00
1h.

A25- TBD

Families workshops
10:30
30 minutes

The phenomenon of cyberbullying

David Cortejoso

The main aspects that define cyberbullying will be discussed: definition of the phenomenon, actors involved, mechanisms to carry it out, as well as how to suspect and detect it and how to act in such situations.

Auditorium
11:00
1h.

A26-The dark side of embedded systems

Aarón Flecha

Industry 4.0 incorporates a multitude of devices, most of them have embedded systems and secure them, is a challenge for many companies. In order to help these companies, some cybersecurity researchers are responsible for carrying out pentesting work, providing a real vision of the situation in which the embedded systems of the devices are located and improving the cybersecurity of the environments in which they are housed. . These tests usually have as scope both communications, permissions provided to users or files, services in execution and many other aspects in some cases typical of embedded systems.

This presentation is the result of our own experience in this type of work and the research carried out by the speaker for months inside and outside the different professional and personal projects.

Families workshops
11:00
1h.

Identification of Internet Risks

At the end of the workshop the student will know the different threats and risks that the daily use of the internet supposes. Online stores and emails are not exempt from these risks.

Families workshops
11:00
30 minutes

Age for your first mobile?

Ángel Pablo Avilés

The pros and cons of allowing minors to have their own mobile device at a certain age will be discussed. We will talk about key aspects such as the child's maturity, the main use of the mobile phone, risks and their prevention, and how to get them to use it responsibly.

Families workshops
11:30
30 minutes

Time to install a parental control

Josep Albors

Initiation guide where parents will be explained how to use a useful tool such as parental control on mobile devices and computers.

Technical workshops
12:00
1h.

EP16

A cybersecurity expert will give a talk this day.

Auditorium
12:00
1h.

A27-The children of the Black Dragon or how Bureau 121 enters your system

Pedro Sanchez

The conference has an investigation carried out for the discovery of a group known as Bureau 121 belonging to the government of North Korea and using infrastructure of Chinese companies to attack IT companies around the world.

In the conference you will see step by step the research done after an attack by this group, how it was detected, what tools were used and how the attack was reduced. Likewise it will be seen the tools used and the lateral attacks that used this group, many of them novel in conjunction with exploits of 0 Day.

Technical workshops
12:00
2h.

T13-TBD

Families workshops
12:00
1h.

Security on a PC

At the end of the workshop the student will know the main security features in a PC with Windows operating system versions 7, 8.1 and 10.

Theatre
12:00
1h.

The glass shoe

A boy and a girl addicted to their cell phones share everything as best friends. The friendship and trust that they have is unquestionable for them, to the point of sharing their passwords through instant messaging. However, the consequences will be unexpected ...

Families workshops
12:00
30 minutes

Sexting and flirting applications

David Cortejoso

It will analyze what sexting is and why children practice it, what are the problems associated with sexting itself, why it is a phenomenon that is increasing among children, what guidelines should be given from the family and will be discussed about the apps and flirting services.

Families workshops
12:30
30 minutes

Dangerous communities vs. positive communities

Ángel Pablo Avilés

The differences and criteria will be analyzed to identify and differentiate communities or websites that contain some type of danger for minors, as well as to provide recommendations to prevent and act against said problem.

Technical workshops
13:00
1h.

EP17

A cybersecurity expert will give a talk this day.

Auditorium
13:00
1h.

A28-Keynote

This day at this time a great expert in cybersecurity worldwide will give a master class in the field. Who will it be? Stay tuned on social networks to find out!

Auditorium
14:00
1h.

A29-Closing. Awards

Awards ceremony of the competitions. Come and meet the winners of the best cybersecurity competitions nationwide.

Auditorium
15:00
1h.

A30-Closing of the event

Closing of the event where everyone can enjoy the best sensations experienced in the event

Afternoon

Families workshops
13:00
30 minutes

Privacy: so important to my child's future?

David Cortejoso

They will talk about what is privacy in ICT, the importance of safeguarding the privacy of minors, giving reasons and concrete examples so that parents can assess how it can affect them now and in their future, and will discuss the importance of not sharing images of minors in the network.

 

Theatre
13:00
1h.

Until life separates us

A love story between two young people in which the absolute surrender, the loss of individuality and the blind trust that one has for the other is clearly palpable. The problem comes when the relationship deteriorates, as both will use all the intimate information shared to hurt themselves ...

Families workshops
13:00
1h.

Security in Smartphones & Wearables

At the end of the workshop the student will apply the basic security settings in phones with "Android" and "IOS" operating systems. You will know what Wearables devices are and what security problems they can cause.

Families workshops
13:30
30 minutes

Parental Mediation: Should we spy on our children?

Ángel Pablo Avilés

The importance of parental mediation and digital education from the family in the prevention of the dangers of ICT in minors will be addressed. We will discuss the differences between digital education and parental espionage by talking about where is the appropriate limit in digital education, emphasizing the rights of minors to privacy in their electronic communications.