<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2024.3.1. -->
<schedule>
    <generator name="pretalx" version="2024.3.1" />
    <version>0.4</version>
    <conference>
        <title>WICCON 2025</title>
        <acronym>wiccon-2025</acronym>
        <start>2025-10-30</start>
        <end>2025-10-31</end>
        <days>2</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://program.wiccon.nl</base_url>
        
        <time_zone_name>Europe/Amsterdam</time_zone_name>
        
        
        <track name="Talks" slug="5-talks"  color="#4f1473" />
        
        <track name="Workshops" slug="6-workshops"  color="#9c0000" />
        
    </conference>
    <day index='1' date='2025-10-30' start='2025-10-30T04:00:00+01:00' end='2025-10-31T03:59:00+01:00'>
        <room name='Main Stage' guid='7539b1b7-1ec9-51a4-9e46-6d6301d9ad18'>
            <event guid='b365f886-6f68-5a8a-a8ef-259c200df80c' id='172'>
                <room>Main Stage</room>
                <title>Opening</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-30T10:00:00+01:00</date>
                <start>10:00</start>
                <duration>00:15</duration>
                <abstract>The opening of WICCON by the amazing Jaimy Thepass!</abstract>
                <slug>wiccon-2025-172-opening</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='44'>Jaimy Thepass</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/9HWMXF/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/9HWMXF/feedback/</feedback_url>
            </event>
            <event guid='1f10b6fc-2d5c-529c-92e1-562dbc45bc17' id='159'>
                <room>Main Stage</room>
                <title>The Awareness Trap: Why security awareness training often fails &#8211; and what to do instead</title>
                <subtitle></subtitle>
                <type>Talk 45 minutes</type>
                <date>2025-10-30T10:15:00+01:00</date>
                <start>10:15</start>
                <duration>00:45</duration>
                <abstract>Cybersecurity training often assumes that awareness leads to action. But despite years of phishing simulations and mandatory e-learnings, 95% of cyberincidents can be traced back to human error. Drawing from behavioral science and real-world examples, this talk reveals why knowledge alone rarely changes behavior. We&#8217;ll challenge the common assumption that people act rationally when they&#8217;re informed and aware, and show the audience how a more realistic model of decision-making opens the door to smarter, more effective interventions. Because in cybersecurity, what people do matters more than what they know.</abstract>
                <slug>wiccon-2025-159-the-awareness-trap-why-security-awareness-training-often-fails-and-what-to-do-instead</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='156'>Roos van Duijnhoven</person><person id='159'>T&#252;nde van Hoek</person>
                </persons>
                <language>en</language>
                <description>Cybersecurity professionals have poured lots of time, money, energy (and hopes and dreams) into awareness campaigns. We roll out some phishing simulations, add e-learnings to our colleagues&#8217; to-do lists, and organize the occasional escape room hoping to at least make the mandatory topic of security a bit more fun.

And yet, 95% of cyberincidents can be traced back to human error [1]. We still click. We still use weak passwords. We still ignore or delay updates. At the end of the day, it&#8217;s still people &#8211; like you and me &#8211; using those digital systems. Which is exactly why human behavior plays such an important role in cybersecurity. 

Many security initiatives are built on a faulty assumption: that people behave rationally when informed. Surely, if someone knows that clicking a phishing link can bring the whole organization to its knees, they will make sure to avoid that&#8230; right? 

But research tells us otherwise. Under time pressure and cognitive load, people often rely on quick, intuitive decisions (what psychologists call &#8216;System 1&#8217; thinking), rather than slow, analytical reasoning (&#8216;System 2&#8217;) [2]. It&#8217;s quick, but prone to mistakes. That&#8217;s why even well-informed employees can make risky choices in a rush to meet all their deadlines.

Behavioral science teaches us that knowing &#8800; doing. It gives us the tools to take a look inside the real drivers of human behavior in cybersecurity. Hint: it&#8217;s not just about awareness. Decades of research from fields like behavioral economics, cognitive psychology, and usability studies have shown that our behavior is far more driven more by our context than by conscious deliberation. 

External factors, like time constraints, attention overload, social norms, and default settings influence behavior, often without us even realizing it. And when people are juggling tasks, they don&#8217;t act not based on what they know, but on what&#8217;s easiest, fastest, or helps them get their work done in the moment. [3]

That&#8217;s why your colleagues reuse the same weak password across accounts. Not because they think it&#8217;s safe, but because they&#8217;re using 20 different tools, the password manager is confusing and adds extra steps, and they just need to get through their work in time. In that moment, they&#8217;re way more likely to pick what&#8217;s easiest, even if it&#8217;s less secure. 

So sure, an escape room can be a fun way to raise the topic of awareness. And sure, awareness may be top of mind during it, or shortly thereafter, but it is not a &#8216;constant&#8217; state of mind. It tends to fade over time, gradually pushed aside by daily routines and competing priorities. When was the last time you fired off some last emails at the end of the day before rushing out to pick up your kids from school? In that split second, awareness isn&#8217;t what&#8217;s top of mind &#8211; convenience is. And that&#8217;s when mistakes happen.

Many organizations still operate from what behavioral scientists call the &#8216;rational human model&#8217;: the idea that if we explain the risk, people will adjust. But this model just doesn&#8217;t match how we humans actually behave. It&#8217;s the reason why many traditional security awareness programs fall flat, and why it&#8217;s time for a new approach.

This talk reframes the human factor in cybersecurity from an awareness challenge, to a behavioral one. Instead of doubling down on training modules and phishing tests, we&#8217;ll explore how habits form, how environments shape decisions, and how behaviorally informed design changes can reduce risk more effectively than yet another &#8220;death by PowerPoint&#8221;.

By the end of this session, the audience will walk away with:
* An understanding of why awareness alone rarely leads to behavior change;
* A more realistic model of human decision-making to design interventions that actually change behavior &#8211; and not just tick compliance boxes;
* A behavior-first lens to help them rethink their campaigns, metrics, and prevention initiatives &#8211; saving time and by avoiding ineffective awareness campaigns.

A more realistic model of decision-making opens the door to smarter, more effective interventions that align with how people actually behave. It shifts the focus beyond tracking how many people click on phishing links, toward designing environments that support meaningful and measurable behavior change. Because in cybersecurity, success shouldn&#8217;t be measured by how much people know or how aware they are, but by what they do when it matters most. 

Realism eats rationalism for breakfast ;)

References
[1] IBM Cyber Security Intelligence Index Report (2021)
[2] Kahneman, D. (2011). Thinking, Fast and Slow. London: Penguin Books.
[3] Bounded Rationality. Simon, H. A. (1955). A behavioral model of rational choice. The Quarterly Journal of Economics, 69(1), 99-118. https://doi.org/10.2307/1884852</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/WYU8VM/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/WYU8VM/feedback/</feedback_url>
            </event>
            <event guid='e0a1e8b3-3ee6-5d66-8730-3d9db28eafbe' id='145'>
                <room>Main Stage</room>
                <title>Azure DevOps privilege escalation: Pipeline shenanigans</title>
                <subtitle></subtitle>
                <type>Talk 60 minutes</type>
                <date>2025-10-30T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>01:00</duration>
                <abstract>CI/CD pipelines are the standard way of deploying not just applications but infrastructure as well. To do all that, they usually have some juicy privileges. Privileges that I want. 
In this talk we&apos;re going to have a look at Azure DevOps pipelines, their permission settings, and all the ways in which you think you may have secured your pipeline that actually aren&apos;t watertight. With live demos (fingers crossed!) to show every problem and every fix.</abstract>
                <slug>wiccon-2025-145-azure-devops-privilege-escalation-pipeline-shenanigans</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='139'>Anniek van der Peijl</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/YQ9KUL/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/YQ9KUL/feedback/</feedback_url>
            </event>
            <event guid='4a432463-6c3f-5123-ad20-ae496e90c19e' id='153'>
                <room>Main Stage</room>
                <title>Breaking in: a journey through the cybersecurity hiring maze</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-30T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:30</duration>
                <abstract>What does it really take to enter the cybersecurity field, especially as an outsider? In this talk, I share my journey from Quality Assurance and account management into the world of ethical hacking and beyond. I discovered that getting in isn&#8217;t just about skill, but about navigating an ecosystem not designed for newcomers. Along the way, I learned what helped, what didn&#8217;t, and how the industry can better support motivated people trying to join. Whether you&apos;re hiring, mentoring, or just starting out, this talk offers a real-world look at the gap between open roles and accessible entry points.</abstract>
                <slug>wiccon-2025-153-breaking-in-a-journey-through-the-cybersecurity-hiring-maze</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='148'>Lianne Klaver</person>
                </persons>
                <language>en</language>
                <description>The cybersecurity industry is sounding the alarm about talent shortages, but what is it really like to enter the field from the outside?

In this talk, I share my personal journey into cybersecurity, beginning with a background in Quality Assurance and Account Management. Motivated by the parallels I saw between testing, monitoring, risk analysis, and cybersecurity, I decided to pursue a path in ethical hacking. I gained the Certified Ethical Hacker certification and focused my full energy on transitioning into the field.
Then I ran into barrier after barrier&#8230;

This talk gives an unfiltered yet constructive look at the reality many aspiring professionals face when trying to enter cybersecurity. I&#8217;ll share real examples of job descriptions, feedback I received, confusing certification expectations, and the impact of both helpful and dismissive responses.

Whether you&apos;re a company looking for new talent, a mentor, or a fellow newcomer to the world of cybersecurity, there&#8217;s something in this story for you.

Key Takeaways:
- Differentiate between competences and branch specific knowledge, to pinpoint which
experience is really needed to be gained within a cybersecurity job
- When considering a move into cybersecurity: talk first, certify second
- What organisations can do to help newcomers enter their business
- Why asking for certifications when needed is fine, but &quot;certification spraying&quot; can be counterproductive</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/RCUA3A/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/RCUA3A/feedback/</feedback_url>
            </event>
            <event guid='510f7c7a-ec07-56e0-a1b0-3fb0f271c73b' id='135'>
                <room>Main Stage</room>
                <title>Embedded AI - Evolving attack surface and ways to defend them</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-30T12:30:00+01:00</date>
                <start>12:30</start>
                <duration>00:30</duration>
                <abstract>The rapid adoption of embedded AI in products and infrastructure has created powerful new capabilities&#8212;alongside a dramatically expanded attack surface for cyber adversaries. Recent incidents have shown how vulnerabilities such as adversarial inputs, data poisoning, and insecure APIs can be exploited to compromise AI-driven systems. 
This talk will break down the unique risks introduced by embedded AI, illustrated with real-world breach examples and attacker techniques. Attendees will learn a practical, actionable defense framework, including AI-specific threat modeling, secure development practices, and continuous monitoring. The session will equip security professionals with the insights and strategies needed to proactively defend against the next generation of AI-powered threats.</abstract>
                <slug>wiccon-2025-135-embedded-ai-evolving-attack-surface-and-ways-to-defend-them</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='130'>Prithvi Bhat</person>
                </persons>
                <language>en</language>
                <description>The rapid integration of embedded AI into products and critical infrastructure is transforming digital capabilities&#8212;but it is also dramatically expanding the attack surface for adversaries. In 2025, organisations are facing a surge in sophisticated threats that specifically target AI-powered components, from adversarial inputs and data poisoning to prompt injection and insecure APIs. Recent high-profile incidents, such as critical remote code execution vulnerabilities in AI developer tools and authentication bypasses in AI platforms, have demonstrated how attackers can exploit these new vectors to gain unauthorised access, steal data, or deploy botnets at scale.
This talk will:
	&#8226;	Deconstruct the unique vulnerabilities introduced by embedded AI, including adversarial attacks, data poisoning, model inversion, and exploitation of non-human identities and insecure endpoints.
	&#8226;	Analyze recent real-world breaches&#8212;such as the exploitation of Anthropic&#8217;s MCP Inspector and Langflow AI servers&#8212;to illustrate how attackers are leveraging these weaknesses for remote code execution, lateral movement, and DDoS attacks.
	&#8226;	Outline a practical defense framework for organizations, covering:
	&#8226;	AI-specific threat modeling and red teaming
	&#8226;	Secure development and deployment practices
	&#8226;	Continuous monitoring for behavioral anomalies and data integrity
	&#8226;	Robust authentication and segmentation controls for AI APIs and endpoints
	&#8226;	Highlight actionable strategies for defenders, such as adopting behavioral biometrics, implementing anomaly detection for embedded AI, and developing incident response playbooks tailored to AI-driven threats.
Key Takeaways:
Recognize the evolving risks of embedded AI,
understand the latest attacker techniques, 
explore preventive controls to secure their organizations against this new generation of threats.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/PF9D8K/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/PF9D8K/feedback/</feedback_url>
            </event>
            <event guid='35b1f57f-6f14-59a3-bd82-84516570914a' id='125'>
                <room>Main Stage</room>
                <title>Hooray, I failed!</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-30T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>00:30</duration>
                <abstract>I always tell my students: &quot;Failure is fun! We learn, when things fail!&quot; ... so why do I feel so shitty right now?

Tess talks us through channeling moments of failure and &quot;imposter syndrome&quot;, into moments of introspection and learning.</abstract>
                <slug>wiccon-2025-125-hooray-i-failed-</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='19'>Tess Sluijter-Stek</person>
                </persons>
                <language>en</language>
                <description>Every one of us will have moments in life where things end up in confusion or frustration. Relationships, family life and a plain fact of daily life: our jobs. 

A few times in her life, Tess has struggled through the questions &quot;Is this really what I want? Am I really the right person for this job? Am I really not some fraud, fooling everyone?&quot; Each of those times, it took a lot of time and soul searching to find the answers. 

Figuring things out like:

* Why Tess left IT ... and came back.
* Why Tess is not fulfilling her long-lived dream of employing juniors.
* How she failed OSCP ... and some day she&apos;ll be okay with that.
* How she might not be doing what she wants to... and how she copes with that.

Tess would love to share with you some of the tools and techniques she&apos;s applied over the years, to get to some of the hard truths she had to deal with. Mind mapping and associative thinking, the &quot;Mindy&quot;-method and even tarot. No spooky esoterica, just another great way of asking yourself questions. 

An open and heartfelt talk from someone with 25 years of professional experience, hoping to make life a little easier for her juniors.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/HTG7HX/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/HTG7HX/feedback/</feedback_url>
            </event>
            <event guid='f6f3d0fe-acbb-5c74-81d2-908ad5e3081d' id='150'>
                <room>Main Stage</room>
                <title>Adversarial robustness of ML-based malware classifiers</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-30T14:30:00+01:00</date>
                <start>14:30</start>
                <duration>00:30</duration>
                <abstract>As machine learning becomes a core component in malware detection, new risks emerge from adversarial manipulation. This talk explores how ML-based malware classifiers respond to targeted feature modifications. In order to experimentally assess their robustness, several models were trained to classify malicious and benign files and then tested with adversarially altered samples. The presentation focuses on data preparation, attack simulation, and a comparative analysis of model robustness under adversarial conditions.</abstract>
                <slug>wiccon-2025-150-adversarial-robustness-of-ml-based-malware-classifiers</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='144'>Deleted User</person>
                </persons>
                <language>en</language>
                <description>This talk presents a technical exploration of adversarial robustness in machine learning-based malware detection systems. The research is grounded on the EMBER dataset, one of the largest publicly available datasets for static malware analysis, containing raw features and labels for over 3.2 million malicious and benign samples spanning six file types: Win32, Win64, .NET, APK, ELF, and PDF.
The first phase involved analyzing the dataset to identify which features are most relevant for binary classification of malware. After feature selection and preprocessing, multiple machine learning models (e.g., Random Forest, Gradient Boosting, and Neural Networks) were trained on a representative sample subset to distinguish between malicious and benign files. These trained models were saved for further testing.
In the second phase, adversarial attacks were simulated by modifying key input features in the test samples &#8212; without altering the functional structure of the binaries &#8212; to observe how the predictions of each saved model changed. This process helped evaluate the models&#8217; resilience to feature manipulation and adversarial evasion.
The presentation will detail the full pipeline: from dataset preparation and feature engineering, through model training, to adversarial evaluation. It concludes with a comparative analysis of each classifier&#8217;s robustness under attack, identifying which algorithms offer the highest resistance and reliability in adversarial scenarios. This work contributes to understanding how secure and dependable current ML-based malware detection methods are when faced with intelligent manipulation attempts.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/XQRSJV/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/XQRSJV/feedback/</feedback_url>
            </event>
            <event guid='3b5bbd88-ec31-5e23-bf2b-148cdfda1d59' id='164'>
                <room>Main Stage</room>
                <title>The Human Firewall: How Soft Skills Became My Strongest Tool</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-30T15:00:00+01:00</date>
                <start>15:00</start>
                <duration>00:30</duration>
                <abstract>In this talk, I share my personal journey, starting with studying law and competing in top-level sports, and eventually building a career in cybersecurity. Without a technical background, I&#8217;ve carved out a successful path by leaning into my strongest assets: communication, empathy, and adaptability. These soft skills have helped me translate complex policies into clear, human-centered actions, coach stakeholders with patience and clarity, and build trust across all levels of an organization.</abstract>
                <slug>wiccon-2025-164-the-human-firewall-how-soft-skills-became-my-strongest-tool</slug>
                <track>Talks</track>
                <logo>/media/wiccon-2025/submissions/M8DCYP/Foto_Wiccon_DAwQMOL.jpg</logo>
                <persons>
                    <person id='160'>Rami&#235;lla Ramos</person>
                </persons>
                <language>en</language>
                <description>Cybersecurity is often seen as a technical domain, but the human factor is what truly makes the difference. Drawing from my experience in the GRC domain, I&#8217;ll explore how awareness can shift security from being just a policy to becoming part of an organization&#8217;s culture. I&#8217;ll share how I transitioned from SOC analyst to Security Consultant, and how working with a government agency, where technical knowledge is limited and change is often met with resistance, taught me the importance of making security relatable and actionable.

This talk is not a technical deep dive. It&#8217;s a story about the power of soft skills and the human side of cyber. When people feel involved and informed, security becomes part of their mindset rather than just a checkbox. Trust, connection, and collaboration are the real drivers of lasting security, and that&#8217;s where the true strength of soft skills lies.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/M8DCYP/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/M8DCYP/feedback/</feedback_url>
            </event>
            <event guid='231daaff-1a22-5fc5-b2f5-b17866435a26' id='142'>
                <room>Main Stage</room>
                <title>Crack, communicate, change: turning password failures into security wins</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-30T15:30:00+01:00</date>
                <start>15:30</start>
                <duration>00:30</duration>
                <abstract>Have you ever encountered some hashes in a pen-test, cracked them only to find the results to be anywhere from &#8220;not great&#8221; to &#8220;downright depressing&#8221;? We have, and it encouraged us to implement monthly password cracking cycles. We use the results as a driving force to change behaviour around password usage. This talk will not be a technical deep dive on password cracking; rather, it will focus on how to use the results to get people to change their password behaviour. I will share the approaches we tried at Mediahuis: why quite a few didn&#8217;t work, which approaches did work, and some of the obstacles we&#8217;ve encountered along the way.</abstract>
                <slug>wiccon-2025-142-crack-communicate-change-turning-password-failures-into-security-wins</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='136'>Nynke Damstra</person>
                </persons>
                <language>en</language>
                <description>In 2018, a pen-test revealed that almost 40% of Mediahuis Nederland hashes were easy to crack. We had previously run several generic awareness campaigns around strong password usage, but these had limited effect. Knowing the results weren&#8217;t great and that generic campaigns have limited impact, we wanted to make colleagues aware if they were using a weak password, and that they should change it, while also making it so that the security team don&#8217;t see their passwords.
We built a program for monthly password cracking (or password strength testing, as it is called within Mediahuis). We obtained buy in from board and workers council and started the testing cycles. I will share some brief information on our testing set-up, this will not be a deep dive since there are already many clear write-ups on how to crack passwords. I will also share how we developed our testing criteria. 

But testing alone will change nothing. So, we developed a communication strategy to get our colleagues to change their password behaviour. Mediahuis has entities in 5 different countries, and we have needed to adapt our communication strategy to fit local cultures. Along the way we have tried various different approaches, and I will share what, in our experience, are the advantages and disadvantages of the options we&#8217;ve tried. We have encountered obstacles and resistance to change during this project, and I will share what we&#8217;ve encountered and how we dealt with it. Currently Mediahuis is down to a maximum of 1% of easily crackable passwords across all entities, with most entities being at 0 weak passwords.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/QBVLC9/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/QBVLC9/feedback/</feedback_url>
            </event>
            <event guid='90d22584-7339-59f5-92f9-923dc24d182b' id='167'>
                <room>Main Stage</room>
                <title>Nightmare on NTLM Street: Legacy&apos;s Revenge</title>
                <subtitle></subtitle>
                <type>Talk 45 minutes</type>
                <date>2025-10-30T16:30:00+01:00</date>
                <start>16:30</start>
                <duration>00:45</duration>
                <abstract>We know the world runs on legacy. We know it&#8217;s not supposed to. But when vendors or LinkedInfluencers command us to phase out old systems and protocols, it sometimes seems like their expectation-versus-reality connection is faulty. 

This talk will walk you through the ~adventure~ of disabling a recently-deprecated Microsoft authentication protocol with numerous security problems: NTLM. Microsoft introduced NT Lan Manager in 1993 as a replacement for LANMAN, born in 1987. Just seven years later, they announced Kerberos as the default replacement for NTLM and instructed companies to stop using it. No one did. Then, in June 2024, Microsoft announced the deprecation of the entire NTLM authentication protocol family, and even removed older versions from newer OS versions. 

Having completed this project in the IT environment of a mid-sized enterprise, this presentation will discuss resources and lessons learned that could help get the job done elsewhere. It will also illustrate to those outside the field why IT and cybersecurity are critical business functions, not cost centers.

For decision-makers, this is an opportunity to better understand the struggles of on-the-ground IT and security teams trying to bring outdated systems in line with industry standards. For IT and information security peers, this presentation will share valuable resources and &#8220;lessons learned&#8221; for successfully phasing out NTLM (and similar thorns-in-sides) within their own organizations.</abstract>
                <slug>wiccon-2025-167-nightmare-on-ntlm-street-legacy-s-revenge</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='161'>Marina Bochenkova</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/SXGLZN/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/SXGLZN/feedback/</feedback_url>
            </event>
            <event guid='2cf56313-de58-568b-be25-ebb3baff3745' id='128'>
                <room>Main Stage</room>
                <title>How to Make Cybersecurity Sexy - Get the Board on Board</title>
                <subtitle></subtitle>
                <type>Talk 45 minutes</type>
                <date>2025-10-30T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>00:45</duration>
                <abstract>Let&#8217;s face it: cybersecurity is not sexy. Not to boards, anyway. It&#8217;s often seen as dull, technical, and best left to IT - until a breach happens. You don&apos;t get media coverage for a well-run cyber drill, but you will make headlines when things go wrong. In this talk, Mirjam van Delft - Kaijser reveals how to flip the script, how to grab board-level attention and get them to take ownership. Using real-world stories and her RISICO method, she&apos;ll show you how to speak their language, frame the urgency, and make cybersecurity impossible to ignore. If you&apos;ve ever struggled to get buy-in from the top, this is the talk you&apos;ve been waiting for.</abstract>
                <slug>wiccon-2025-128-how-to-make-cybersecurity-sexy-get-the-board-on-board</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='123'>Mirjam Kaijser</person>
                </persons>
                <language>en</language>
                <description>Boards love visibility, strategy, and results. Cybersecurity often delivers none of that - until there&#8217;s a crisis. That&apos;s why many executives often see security as a sunk cost. Important, but not urgent, and definitely not something that gets them noticed or praised. After all, no one posts a selfie from a cyber drill. So how do we get boards to pay attention before it&#8217;s too late?

In this energetic and eye-opening session, Mirjam tackles one of the biggest challenges in cybersecurity: executive engagement. Mirjam unpacks why cybersecurity fails to land in boardrooms and what needs to shift in how we present it. Drawing on behavioral insights, public sector experience, and her own RISICO method, she lays out a practical approach to reframing cybersecurity as a leadership issue - not a technical one.

You&apos;ll learn:

- Why traditional cybersecurity messaging falls flat at the top
- How to reframe cybersecurity as a leadership and continuity issue
- The RISICO method: a practical and powerful toolset for boards to assess, act, and lead
- Communication tactics that resonate with non-technical decision-makers

Expect sharp insights, a touch of humor, and  real-world examples. This talk is for CISOs, advisors, and IT leaders who want real traction with their board - and who are done begging for attention.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/YGBUF7/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/YGBUF7/feedback/</feedback_url>
            </event>
            <event guid='06b29a2c-0cc9-5fd5-b898-8374bee24fdc' id='127'>
                <room>Main Stage</room>
                <title>We&apos;ve gathered 4000 hackers on a field and here&apos;s what happened.</title>
                <subtitle></subtitle>
                <type>Talk 60 minutes</type>
                <date>2025-10-30T18:00:00+01:00</date>
                <start>18:00</start>
                <duration>01:00</duration>
                <abstract>Last summer the 10th edition of the Dutch Hacker Camp took place in Geestmerambacht.
Hackers from all over the world came to this party of innovation and technology abd shared their knowledge.
I was part of Team:Projectleiding and would love to share with you how it came to be and what the highlights were!</abstract>
                <slug>wiccon-2025-127-we-ve-gathered-4000-hackers-on-a-field-and-here-s-what-happened-</slug>
                <track>Talks</track>
                <logo>/media/wiccon-2025/submissions/898HYY/WHY2025_logo_true_black_gioOypS.png</logo>
                <persons>
                    <person id='109'>Nancy Beers</person>
                </persons>
                <language>en</language>
                <description>Dutch Hacker Camps are an important part of Dutch Hacker Culture. 
Last August, 4000 hackers gathered on a field and had serious hacker fun.
Let me give you some insights on what happened..</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/898HYY/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/898HYY/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop' guid='369a5adc-f7df-59fa-80ee-06a17c690b0a'>
            <event guid='dbd0ffea-5e63-5e72-a341-3c955dff3f28' id='170'>
                <room>Workshop</room>
                <title>The Ghost in the Machine - Capture the Flag by KPN</title>
                <subtitle></subtitle>
                <type>Workshop 120 minutes</type>
                <date>2025-10-30T10:15:00+01:00</date>
                <start>10:15</start>
                <duration>02:45</duration>
                <abstract>October 2025. MyTelco, a global telecom giant, is under siege. Not by a known threat actor, but by something stranger...

Calls drop, leaving behind eerie static whispers. Data packets vanish without a trace. Rogue signals disrupt critical systems. In the NOC, screens flicker with unreadable glyphs and error logs defy logic. Officially, it&#8217;s a suspected cyberattack. Unofficially? Employees whisper of a digital poltergeist, something haunting the very heart of the network.

You are brought in as MyTelco&#8217;s last hope.

In this session, step into the shoes of a senior security specialist tasked with investigating the unexplainable. You&#8217;ll follow the forensic trail through ghost data, spectral code, and manipulated infrastructure. Is it a new breed of cyberweapon? An insider with a vendetta? Or is the network itself turning against its creators?

Expect real-world tools, tactics, and a case study unlike any other.
Expect the unexpected.
The network is alive. And it&apos;s angry.

And if you exorcise the ghost in the network successfully? You might win a prize...

Note: This CTF has limited capacity and is first come, first served. You will need a laptop to participate. Come in early to secure your spot in the ghost hunt.</abstract>
                <slug>wiccon-2025-170-the-ghost-in-the-machine-capture-the-flag-by-kpn</slug>
                <track>Workshops</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/DEFACR/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/DEFACR/feedback/</feedback_url>
            </event>
            <event guid='47b5e521-054a-52c0-823c-59f6e55bf6af' id='147'>
                <room>Workshop</room>
                <title>Ghostbusters Reloaded: catching a tech-savvy ghost in the logs</title>
                <subtitle></subtitle>
                <type>Workshop 120 minutes</type>
                <date>2025-10-30T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>02:00</duration>
                <abstract>In this Halloween-themed dataset, you will investigate a cyber incident inspired by a real world threat actor. Your goal? Finding out what happened and how, building a timeline, and collecting IOCs. All from the comfort of your browser, using Azure Data Explorer (ADX) and the Kusto Query Language (KQL).</abstract>
                <slug>wiccon-2025-147-ghostbusters-reloaded-catching-a-tech-savvy-ghost-in-the-logs</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='141'>Kellamity</person>
                </persons>
                <language>en</language>
                <description>Curious about the blue side of cybersecurity? Enjoying puzzles and detective games? Or needing some exposure to the Kusto Query Language?

Welcome to this workshop that walks you through an incident-response type investigation!

Starting off with a nugget of information, we will dive headfirst into the provided dataset on Azure Data Explorer. With carefully (or messily, I&apos;m not one to judge) crafted KQL queries, we will trace the attacker&apos;s steps until we get the full picture, from reconnaissance to actions on objectives (yes, that&apos;s the Cyber Kill Chain).

Don&apos;t forget to take notes! At the end of the session, we will draw up a timeline of events and compile some IOCs in a table, two elements that are important in a report. 

Worried about KQL being a new &quot;language&quot;? I will start off the session with a short intro and will provide you with a &quot;cheatsheet&quot; to help you along the way.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/JWSFEC/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/JWSFEC/feedback/</feedback_url>
            </event>
            <event guid='f0d90edb-75ec-53bb-8498-afd03881cbe3' id='160'>
                <room>Workshop</room>
                <title>Persuasion in Practice: Social Engineering Workshop</title>
                <subtitle></subtitle>
                <type>Workshop 60 minutes</type>
                <date>2025-10-30T16:30:00+01:00</date>
                <start>16:30</start>
                <duration>01:00</duration>
                <abstract>What technique do cyber criminals use to persuade people to click a link, download malware or bypass procedures? In this workshop we explore Cialdini&apos;s seven ways to influence other people&#8217;s behavior and decision making, and how cyber criminals use them to their advantage.

Participants are divided into two groups, each receiving their own mission. They have 10 minutes to prepare their strategy. Can they social engineer the other person to get to their goal? 

Computers or other digital tools are not necessary for this workshop!</abstract>
                <slug>wiccon-2025-160-persuasion-in-practice-social-engineering-workshop</slug>
                <track>Workshops</track>
                
                <persons>
                    <person id='62'>Helma de Boer</person><person id='157'>Rosanne Pouw</person>
                </persons>
                <language>en</language>
                <description>In this workshop we dive into the seven ways to influence people&apos;s behavior, explained with examples from the world of cyber crime. The best way to defend yourself against social engineering attacks it to know the mechanics. In this workshop you&apos;ll practice the science of persuasion and get ahead of the game. 

Participants are divided into two groups, each receiving their own mission. They have 10 minutes to prepare their strategy. Can they social engineer others to get to their goal? 

Computers or other digital tools are not necessary for this workshop!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/3MFK7E/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/3MFK7E/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='2' date='2025-10-31' start='2025-10-31T04:00:00+01:00' end='2025-11-01T03:59:00+01:00'>
        <room name='Main Stage' guid='7539b1b7-1ec9-51a4-9e46-6d6301d9ad18'>
            <event guid='f9a6a057-07b2-522e-9ea3-55a18b01905d' id='154'>
                <room>Main Stage</room>
                <title>How we handled a major increase in our threat landscape</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-31T10:00:00+01:00</date>
                <start>10:00</start>
                <duration>00:30</duration>
                <abstract>In May of 2024 an announcement was made: The NATO Summit of 2025 would take place at The Hague. Little did we know about what that would mean for our organization and for our city. In this talk, Lilian will talk you through our security preparation and our efforts during those two days of the summit.</abstract>
                <slug>wiccon-2025-154-how-we-handled-a-major-increase-in-our-threat-landscape</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='149'>Lilian Knippenberg</person>
                </persons>
                <language>en</language>
                <description>Ofcourse we can only disclose information labeled TLP:GREEN by our partners, and our own information and experiences on how we handled 1) preparing and 2) the Summit taking place. For part 1 (preparations) I will share how we handled our increased threat landscape (with a threat assessment), how we defined our security measures using a threat assessment and how we prepared our organization with cybercrisis exercises. For part 2 (the Summit itself) I will share our experiences from the eyes of the information coordinator role in the cyber backoffice. I will only share our goal, roles and collaborations. 
I&#8217;ll end with the remaining question: and now what?</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/MWZ9LU/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/MWZ9LU/feedback/</feedback_url>
            </event>
            <event guid='452728b4-76b4-5707-9fc5-11a005f87d8c' id='162'>
                <room>Main Stage</room>
                <title>Beyond Compliance: Rethinking Legal Accountability in Cybersecurity</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-31T10:30:00+01:00</date>
                <start>10:30</start>
                <duration>00:30</duration>
                <abstract>This talk explores the growing divide between cybersecurity compliance and actual legal accountability in the EU regulatory landscape. Through the lens of GDPR, NIS2, and DORA, the session examines how emerging frameworks shape legal risk and influence organizational behavior. The session provides a critical look at whether legal accountability improves security&#8212;or simply encourages minimal compliance.</abstract>
                <slug>wiccon-2025-162-beyond-compliance-rethinking-legal-accountability-in-cybersecurity</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='158'>Andreea Focsa</person>
                </persons>
                <language>en</language>
                <description>The growing legal and regulatory pressure on cybersecurity practitioners in the European Union, has led many organizations to equate compliance with security. Nevertheless, recent enforcement actions and major security incidents reveal a significant disconnect between formal compliance and substantive accountability. 
This talk aims at examining how legal responsibility is evolving, especially under instruments such as the General Data Protection Regulation, the NIS2 Directive, and DIGITAL Operational Resilience Act. 
Key questions addressed include: 
&#8226;	To what extent does compliance create a false sense of legal protection? 
&#8226;	How are emerging regulatory frameworks shifting the legal risk landscape in the EU? 
&#8226;	Can legal accountability support better security outcomes or does it incentivize minimalism and blame-shifting? 
Audience Takeaways: 
Understand how legal accountability is distinct from compliance. 
Learn the practical implications of EU cybersecurity legislation on risk ownership. 
Identify cultural and structural barriers to shared responsibility. 
Gain language and frameworks to influence better internal practices. 
Methodology 
This talk will be developed through legal and regulatory analysis, with a focus on current and emerging cybersecurity legislation in the EU. Primary sources include GDPR, the NIS2 Directive and DORA. Each of these frameworks will be reviewed to examine how legal responsibility is defined, distributed, and enforced in the context of cybersecurity. 
The analysis will be also based on published enforcement actions, supervisor guidance, and selected cased studies where formal compliance failed to prevent significant security incidents. By comparing regulatory expectations with known limitations in implementation, one can notice the growing gap between legal reform and security substance.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/SZQSTK/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/SZQSTK/feedback/</feedback_url>
            </event>
            <event guid='309ad1a0-7661-5272-954d-e3231ead7c39' id='156'>
                <room>Main Stage</room>
                <title>When Nostalgia Hacks Back: A Forensic Autopsy of a Trojanized Flash Game</title>
                <subtitle></subtitle>
                <type>Talk 60 minutes</type>
                <date>2025-10-31T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>01:00</duration>
                <abstract>In my teenage years, I was regularly slacking homework and studies for flash games! And I was particularly obsessed with a few, until Flash Player expired and I had to manually search for game .exes online and download and run them on my only laptop. And weird things used to happen then : a seemingly innocent Flash gameused to cause repeated crashes on my laptop, it used to get me irritated, burn my savings on recovery of my OS and system and I never really even understood why &#8212; but only years later, armed with digital forensics and reverse engineering skills, did I revisit it to uncover what really happened. 

This talk walks through the forensic investigation and malware analysis of a nostalgic childhood game that turned out to be trojanized. Using tools like Autopsy, Volatility, Regshot, Ghidra, and x64dbg, we&#8217;ll trace its behavior from system tampering to process injection and obfuscated payloads.

This session blends technical depth with personal narrative to highlight how curiosity, nostalgia, and trust can be weaponized. Attendees will learn practical techniques for uncovering post-execution artifacts, unpacking malware, and extracting IOCs &#8212; and gain a new appreciation for the risks hidden in seemingly harmless digital memories.</abstract>
                <slug>wiccon-2025-156-when-nostalgia-hacks-back-a-forensic-autopsy-of-a-trojanized-flash-game</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='152'>Ankshita Maunthrooa</person>
                </persons>
                <language>en</language>
                <description>This talk explores a personal, technical investigation into a trojanized Flash game from the early 2000s &#8212; a game I had downloaded in my teens, only to experience repeated system failures I couldn&apos;t explain at the time. Years later, with experience in digital forensics and malware reverse engineering, I returned to that same game with the intent to uncover the truth &#8212; and what I found was far from harmless.

The talk is split into four parts. First, I&#8217;ll introduce the backstory &#8212; how nostalgia led me to revisit the game and why this experience stuck with me for over a decade. Then, we&#8217;ll jump into the forensics phase: I&#8217;ll walk through the behavior observed during sandbox execution, showing how I used Regshot, Procmon, Wireshark, Volatility, and Autopsy to identify registry tampering, dropped payloads, memory injection, and suspicious network traffic.

From there, we&#8217;ll move to reverse engineering &#8212; using Ghidra and x64dbg to analyze the packed executable, identify obfuscation techniques, unpack hidden strings and routines, and reveal its encrypted communication patterns. This part will highlight how the malware was designed to blend in as a benign game while silently executing background tasks.

The final part of the session distills the key takeaways: how malware can be distributed through seemingly harmless, nostalgic software; how emotional trust becomes a vector; and how forensic techniques and reverse engineering can uncover buried threats.

This session is designed to be technical but approachable, with a strong narrative arc and practical demonstrations. 

It&#8217;s a reminder that sometimes, the most dangerous files are the ones we wanted to trust the most.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/GSLDPP/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/GSLDPP/feedback/</feedback_url>
            </event>
            <event guid='c2c65809-a8aa-55eb-a720-9d55e58d8c12' id='163'>
                <room>Main Stage</room>
                <title>When the Hackers are inside the building</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-31T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:30</duration>
                <abstract>Most admins spend their working life trying to keep malware, hackers, and their tools outside of their network. However, for the last four and a bit years, I&apos;ve been working with the opposite problem. Running a network for a penetration testing company. Where the pentesters are using all the tools we&apos;d normally like to keep a long way away from our network.

From threatmodelling, to implementation, in this talk I&apos;ll go through some of the unusual design and operational aspects of this unique usecase, as well as some of the examples we as an organisation have been able to learn from those we pentest.</abstract>
                <slug>wiccon-2025-163-when-the-hackers-are-inside-the-building</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='87'>Julia Freeman</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/GWF8XX/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/GWF8XX/feedback/</feedback_url>
            </event>
            <event guid='0462d6fc-dc6b-55b4-b056-1040f3d54e96' id='152'>
                <room>Main Stage</room>
                <title>Inside the CRA Standardisation Trenches: Our Real&#8209;World Struggle to Harmonise</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-31T12:30:00+01:00</date>
                <start>12:30</start>
                <duration>00:30</duration>
                <abstract>This session offers an insider&#8217;s view of the EU&#8217;s Cyber Resilience Act (CRA) standardisation process from two active participants in one of the CEN&#8209;CENELEC working groups. We&#8217;ll share what it&#8217;s really like to draft the horizontal harmonised standards, from defining scope to debating technical terminology. The talk highlights challenges in building consensus between manufacturers, regulators, SMEs, and open&#8209;source communities, often with competing priorities. Expect candid stories about moments of friction, surprising compromises, and lessons we&#8217;ve learned navigating the process. Attendees will walk away understanding not only the standards&#8217; timelines and structure but also how to engage effectively in shaping them.</abstract>
                <slug>wiccon-2025-152-inside-the-cra-standardisation-trenches-our-real-world-struggle-to-harmonise</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='50'>Raluca Viziteu</person><person id='145'>Wendy Tonks</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/BYCDFQ/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/BYCDFQ/feedback/</feedback_url>
            </event>
            <event guid='36fcd063-d728-5be6-b9c1-67880802ebe5' id='138'>
                <room>Main Stage</room>
                <title>The Time Machine of Security: Stopping Vulnerabilities Before They&apos;re Born</title>
                <subtitle></subtitle>
                <type>Talk 60 minutes</type>
                <date>2025-10-31T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>01:00</duration>
                <abstract>What if you could travel back in time to prevent a security breach before a single line of vulnerable code was written? While we don&apos;t have a physical time machine, the &quot;Shift-Left&quot; methodology offers the next best thing. This session reimagines the DevOps lifecycle as a &quot;Time Machine,&quot; demonstrating how to proactively eliminate vulnerabilities at their genesis. We will journey through each stage, from Plan to Monitor, showcasing how integrating security capabilities like threat modeling, automated code analysis (SAST/SCA), and continuous testing can catch issues when they are exponentially cheaper and easier to fix. Join us to learn how to move beyond the reactive security nightmare, build a culture of prevention, and architect a more secure and resilient future for your applications</abstract>
                <slug>wiccon-2025-138-the-time-machine-of-security-stopping-vulnerabilities-before-they-re-born</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='132'>Akansha Shukla</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/KREPAB/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/KREPAB/feedback/</feedback_url>
            </event>
            <event guid='b5d8ac32-2496-50c7-b539-5923418bc553' id='132'>
                <room>Main Stage</room>
                <title>What Your Exposed APIs Are Leaking</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-31T15:00:00+01:00</date>
                <start>15:00</start>
                <duration>00:30</duration>
                <abstract>Many large organizations unknowingly expose vulnerable staging and development APIs, creating opportunities for hackers to access sensitive data. To uncover the scope of this issue, we analyzed 1,000 domains, identifying shadow APIs, leaked API secrets, and critical vulnerabilities like misconfigured GraphQL APIs and exposed Spring Boot Actuator schemas.

In this session, we&#8217;ll show key findings, share how we scaled API discovery using subdomain enumeration and schema reconstruction, and provide actionable strategies to mitigate risks, such as continuous API inventory and schema validation. Attendees will also gain hands-on knowledge of open-source tools like GraphQL Armor and Goctopus to enhance API security.</abstract>
                <slug>wiccon-2025-132-what-your-exposed-apis-are-leaking</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='127'>Alexandra Charikova</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/EG3M8R/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/EG3M8R/feedback/</feedback_url>
            </event>
            <event guid='c1dacfd3-bb7a-5705-ba63-ec38301bf35a' id='161'>
                <room>Main Stage</room>
                <title>Unsafe Code Lab: How Modern Web Frameworks Fail (and How to Fix Them)</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-31T15:30:00+01:00</date>
                <start>15:30</start>
                <duration>00:30</duration>
                <abstract>Unsafe Code Lab is an open-source collection of vulnerable backend applications built with modern web frameworks: Next.js, Koa, Django REST Framework, FastAPI and others. It&apos;s a streamlined way to learn how modern web frameworks work, what makes them tick, how they break and how to fix them. Built for security engineers and researchers.

Use it to get up to speed quickly on unfamiliar frameworks, run targeted secure code reviews and see how framework API design can either create security traps or completely prevent mistakes that are common elsewhere. The runnable, annotated scenarios also work as a research harness for vulnerability research and exploit development.

At WICCON we&apos;ll demo our first public release: ten modern frameworks across Python and JavaScript. We&apos;ll share what we learned, show fresh vulnerabilities we uncovered and outline our roadmap for expanding into more languages.</abstract>
                <slug>wiccon-2025-161-unsafe-code-lab-how-modern-web-frameworks-fail-and-how-to-fix-them-</slug>
                <track>Talks</track>
                
                <persons>
                    <person id='153'>Irina Iarlykanova</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/S8UKKU/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/S8UKKU/feedback/</feedback_url>
            </event>
            <event guid='da1818ed-c84a-53ef-a94b-fd749b78d2a0' id='173'>
                <room>Main Stage</room>
                <title>Closing</title>
                <subtitle></subtitle>
                <type>Talk 30 minutes</type>
                <date>2025-10-31T16:00:00+01:00</date>
                <start>16:00</start>
                <duration>00:30</duration>
                <abstract>more info here</abstract>
                <slug>wiccon-2025-173-closing</slug>
                <track>Talks</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/CED8HS/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/CED8HS/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop' guid='369a5adc-f7df-59fa-80ee-06a17c690b0a'>
            <event guid='e367657d-48ef-5a99-a265-f638dc2b536d' id='171'>
                <room>Workshop</room>
                <title>The Ghost in the Machine - Capture the Flag by KPN</title>
                <subtitle></subtitle>
                <type>Workshop 120 minutes</type>
                <date>2025-10-31T10:00:00+01:00</date>
                <start>10:00</start>
                <duration>03:00</duration>
                <abstract>October 2025. MyTelco, a global telecom giant, is under siege. Not by a known threat actor, but by something stranger...

Calls drop, leaving behind eerie static whispers. Data packets vanish without a trace. Rogue signals disrupt critical systems. In the NOC, screens flicker with unreadable glyphs and error logs defy logic. Officially, it&#8217;s a suspected cyberattack. Unofficially? Employees whisper of a digital poltergeist, something haunting the very heart of the network.

You are brought in as MyTelco&#8217;s last hope.

In this session, step into the shoes of a senior security specialist tasked with investigating the unexplainable. You&#8217;ll follow the forensic trail through ghost data, spectral code, and manipulated infrastructure. Is it a new breed of cyberweapon? An insider with a vendetta? Or is the network itself turning against its creators?

Expect real-world tools, tactics, and a case study unlike any other.
Expect the unexpected.
The network is alive. And it&apos;s angry.

And if you exorcise the ghost in the network successfully? You might win a prize...

Note: This CTF has limited capacity and is first come, first served. You will need a laptop to participate. Come in early to secure your spot in the ghost hunt.</abstract>
                <slug>wiccon-2025-171-the-ghost-in-the-machine-capture-the-flag-by-kpn</slug>
                <track>Workshops</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/EG33XG/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/EG33XG/feedback/</feedback_url>
            </event>
            <event guid='4c44037e-4eee-5847-b8bd-9d7535cf5e38' id='140'>
                <room>Workshop</room>
                <title>Hardware Hacking with Artificial Intelligence</title>
                <subtitle></subtitle>
                <type>Workshop 120 minutes</type>
                <date>2025-10-31T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>02:00</duration>
                <abstract>Obtaining passwords through the power consumption of a chip: Myth or Real? In this hardware hacking workshop, you&apos;ll get hands-on experience in extracting secret information using artificial intelligence. The workshop consists of a short theoretical introduction to side-channel analysis, followed by a real-world attack using popular deep-learning techniques.</abstract>
                <slug>wiccon-2025-140-hardware-hacking-with-artificial-intelligence</slug>
                <track>Workshops</track>
                <logo>/media/wiccon-2025/submissions/7PUHHJ/sca_4ppCufQ.jpg</logo>
                <persons>
                    <person id='134'>Azade Rezaeezade</person><person id='135'>Lizzy Grootjen</person>
                </persons>
                <language>en</language>
                <description>In everyday life, embedded devices are integrated everywhere: from your washing machine to your smartcard. The information processed by these devices are secured through encryption algorithms. However, devices can leak information about critical parts of the algorithm through physical phenomenon, such as power consumption, execution time or radiation.

In side-channel analysis, this information can be analyzed using statistics or deep learning to obtain encryption keys. In this workshop, we will focus on breaking a small embedded device - the ARM Cortex M4 - by retrieving the key of AES through deep-learning based side-channel analysis. 

For this workshop, you&apos;ll need to bring a laptop with Git, Git-LFS, Python 3.12 and VSCode installed. Use git to clone this repo and follow the installation instructions in the Readme: https://github.com/BruteforceMisa/wiccon-workshop</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://program.wiccon.nl/wiccon-2025/talk/7PUHHJ/</url>
                <feedback_url>https://program.wiccon.nl/wiccon-2025/talk/7PUHHJ/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
