We make our conferences a totally different experience for attendees by presenting clear and concise content along with practices taken from real situations.
To be more specific we will initially explain what you will NEVER expect at our conferences:
- Speaker explaining topics using only PowerPoint slides as a resource.
- Recommendations “Veiled or Subliminal” about manufacturers or technologies related to the topic discussed.
- Pre-recorded videos with demonstrations that are NOT understood, nor do they look good, nor do we know if they work in a real environment.
- Commercial material of any kind.
- Monotony of presentation.
- Dense or complex subjects explained in denser or unintelligible technical language.
- Questions at the end of the Conference.
Now, let’s talk about what you can expect at our conferences:
- All lectures include LIVE and REAL-TIME demonstrations.
- High-impact demonstrations with advanced techniques.
- Latest Contents with latest Examples.
- Ability to respond to any type of concern not only about the subject matter of the conference but also about the issues that the audience considers relevant.
- Freedom to ask questions when they wish, during the conference.
- Permanent interaction with the audience.
- Personalized content.
- Speakers with over 15 years of experience in audience management and body language.
- Amusing, digestible and understandable content for each type of audience/sector:
- Managers/ executives.
- Technicians
- Users
Some of our Conferences, without limiting ourselves to generating tailor-made content, are described below:
Cybersecurity: Protecting corporate information
This conference will explain the different attack vectors used by a cybercriminal to steal corporate information, we will discuss the rules of cyber hygiene to be observed when using a computer to make it difficult for a computer criminal to act, such as improving password security, proper use of WIFI, Bluetooth, etc.
We begin with a preamble where we explain what data a cybercriminal is looking for from us and demonstrate how he achieves this.
After these demonstrations of OSINT (Open Source Intelligence), we demonstrate the use of this information collected to carry out attacks, amongst which we can cite:
- False email.
- Social engineering.
- Insiders
- Phishing
- JavaScript attacks.
- Robust passwords.
- Unsecure WIFI.
- Malicious Mobile Applications.
- Amongst other demonstrations.
For each attack, we demonstrate countermeasures and defenses that users can implement.
The final message of this conference is:
We are the owners and responsible for our Cybersecurity and that of our Company.
My Digital Shadow: Beyond Our Hands
In this conference, we will explain what happens to our information once it is delivered to the internet, whether it is our photos on Facebook, our LinkedIn profile, etc. Here we will see how our data is replicated and shared across the web, and how our photo can be in a fake child molester’s profile, or our address can be used for a crime.
We’ll show you the search techniques a cybercriminal uses to seek out information about us, and we’ll show you the level of exposure an ordinary person has to the world, and how criminals find it, cross it, and profile their victims; from finding the portals where the victim has registered, to password recovery information, to targeted phishing, to automated password cracking.
The final message of this conference is:
We must be aware of the information we freely share on the Internet and Cyberspace.
Some of the demonstrations are:
- Detection of the presence of our data in:
- Deep Web
- Dark Net
- Internet
- Detection of our usernames;
- My identity…what can you know about me?
- My password is very robust…
- My Photos… what are they doing there?
- I never registered to that portal…
- So that’s how my identity is faked
- Social engineering
- How do I protect myself?
- What tools do I have within reach?
- Amongst other demonstrations.
Are we Computer Puppets?
In this Conference we show how search engines and advertising or marketing companies can direct our actions, we unconsciously let them manipulate our habits of both search, purchase and consumption; we talk about the subliminal messages of the Internet, technological control mechanisms, external control of our privacy, etc.
we show the techniques and mechanisms of Tracking and Profiling used to identify us uniquely and accurately by the sites and services we use, we show how they influence us and intervene in our decisions.
The final message of this conference is:
Do we think? or do they think for us without us realizing it?
Algunas de las demostraciones que realizamos son:
Some of the demonstrations are:
- What is tracking?
- What is profiling?
- What information does a website capture when browsing it?
- What can they know about me with that information?
- How do they know what devices I use?
- How do I make it difficult to be profiled?
- How should I protect myself?
- How Do I Avoid Tracking?
- And more
Parental Control and the Internet of Things
In this experience, we explained the risks of not implementing parental control, in other terms, if parents or relatives of children do not exercise preventive control over potential threats to their children when they are connected to the Internet, from visiting malicious sites or sites with inappropriate content to interaction with predators on social networks.
We address current issues with videos and interactive demonstrations to raise awareness and show the importance of preventing the danger to which children are exposed.
We talk about cases in Colombia, prevention measures, monitoring tools, vulnerabilities and recommendations about the internet of things.
The final message of this conference is:
Our duty is to protect our children; are we doing that?
Algunas de las demostraciones y temas que tratamos son:
- Grooming
- Sexting
- Bullying
- Stalking
- Contenido Ofensivo
- Sexting
- Vamping
Nothing is what it seems (Special effects FX)
The Conference “Nothing is what it seems” is a totally different and shocking experience; the objective is to prevent and make the attendees aware of the various types of human social engineering that exist, that is, how they could be tricked into falling into a trap, and leave in their minds the message: you are the first line of defense of our Company or Entity.
The attendees will not know the true identity of the speaker; that is, the speaker will be disguised in a specific persona.
During the conference some kind of connection will be generated between the character and the attendees, this way at the end of the conference this character will show his true identity, generating a strong impact of reminding the attendees that “nothing is what it seems”.
This conference will cover topics such as:
- Encroachment
- Neuro Linguistic Programming (NLP)
- Non-verbal language.
- Deceit
- Disappointment
- Persuasion
- Insiders
- Outsiders
- Warning signs
- How to defend ourselves
Talks for the Senior Management
The main purpose of a company is to generate products or services aimed at certain groups of customers and to obtain income or dividends from this work; but what about the cyber risks that could affect the provision of these services or the creation of these products that generate our income? this is where Cybersecurity comes into play in a transversal way within our company: protecting each stage, process and procedure that allows us to meet our business goals.
It is important to perfectly align our cybersecurity processes and policies with the main objective: “Produce money for the company” and experience shows that this alignment works like a well-coordinated orchestra, producing harmonic music pleasant to all, but if any of the instruments fail, or do not enter on time, or do not comply with their chords, all the melody is lost, hence we talk about the orchestration of cybersecurity with business goals.
These talks are aimed at senior management, which are intended to involve the executives who are responsible for managing, directing, establishing policies and representing the interaction of the company with its environment, where the proposal of awareness is focused on the risks to which the business may be exposed, as well as its image and reputation, support to the areas of Infrastructure and Security that have critical processes for the operation and availability of products or services of the company.
These are some options of talks for the senior management, which has a duration of one (1) hour approximately:
COFFEE WITH AN EXPERT: Participants will be able to ask questions, resolve doubts and generate a space for discussion on cybersecurity issues.
SELECTING A TOPIC: The expert will bring a topic defined by common agreement, which will be discussed during the session.
CASE STUDY: A case study will be presented around the theme that will be worked on and discussed within the session.
Note: The logistics (video beam, auditorium, audio system, internet, refreshments and transportation of officials (if required) will be in charge of the client.