Saturday, May 16th, 2026
TimeMain TrackPresenter
08:00Registration Opens
08:50Opening remarks
09:00From Phish to Phantom: How Attackers Steal Credentials and Evade DetectionChristos Voutselas
10:00Attacking Network Infrastructure: From Initial Access to Network ControlTomas Kirnak
11:00AI Weaponized Red TeamDiyar Saadi
12:00Lunch Break (60 minutes) 🍴
13:00Deepfakes: From Meme Culture to Cyber ThreatsPetros Mantzoukas
14:00Next Generation Security Operations Centers: Reimagining SOC for the Digital AgeApostolos Gkletos
15:00Mandatory Hacking Meets Reality: The DORA TLPT BottleneckRichard Mader
16:00Lesser Known Techniques for Bypassing Web Application Firewalls – Insights from Pentests and Bug Bounty HuntingNikita Bohuslavskyi
17:00Closing remarks