Lightning talks

Did you think that the thrill of sharing your ideas in front of the audience at BSides Ljubljana was something you’d never do? Do you work on a cool project and want to get the word out? Was your talk one of the hundreds that got rejected? Did you come up with an awesome hack that you need to share? Well, you’re in luck because there will be Lightning Talks at BSides Ljubljana.

Taking place as the last slot in main track in our agenda – these fast-paced sessions are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to get out to a global audience. Even if you don’t have an awesome idea or project to share, a Lightning Talk is perfect for pitching…

  • You can submit you talk via URL:
  • You can submit any time from now and yes also during BSides Ljubljana on the day of the event
  • We assign timeslots on a first-come, first-served basis (FIFO)
  • You get max. 7min for your talk (no Q&A or reserve time in your 7min slot also for Q&A, switching laptops and preparing slides)


BSidesLjubljana 0x7E3 badgeWhat it is, what it does, how we failed. Do you want to help next year? The design is open and why do you want to use it.@brodul
Side-effects of publishing security researchWith two recent examples, the WinRAR ACE vulnerability (CVE-2018-20250) and Fox IT's global scans for Cobalt Strike servers, lets have a very quick look into the side-effects of publishing security research and tactical factors involved. Food for thoughts, not pitching anything.Daniel Roethlisberger @droethlisberger
Cyber InterregThe EU is sponsoring the creation of new policies intended to promote the cyber security industry. Page: for EU, for .si. Unless you get involved, you might not like the policies we come up with.polz
Black sheep of MX family: Parlez vous STARTTLS?End to end email encryption of email still does not fit all use cases in 2019. On the other hand, STARTTLS with SMTP provides decent option to at least encrypt the emails on their riskiest hop, the one over the internet. Let's peek who still does not use STARTTLS, and suggest them to do use it...Tadej Vodopivec
Heal your community health centerAt BSidesLjubljana 2018 I discovered security vulnerabilities with google hacking. (they are now fixed)@brodul
Bitstamp Security in NumbersA short glimpse of how we handle security at Bitstamp.Urban Jurca
Artificial WAFA convolutional neural network approach to classify web requestsalm8i
How to monitor your internal networkShowing a tool to enable continuous scanning of the internal networksternze
John the Ripper FPGA supportWhat talk title says :)Solar Designer / @solardiz
Pragmatic Security MetricsA key element of our maturing as an industry is to be able to quantify what we're doing - i.e. to be able to answer to Management in a quantifiable way when they ask "So how secure are we now, exactly?" The PRAGMATIC methodology is designed to do that, and by using "meta-metrics" to determine which security metrics are relevant for you.@sebastian_paul