We make our conferences a totally different experience for attendees by presenting clear and concise content along with practices taken from real situations.
To be more specific we will initially explain what you will NEVER expect at our conferences:
- Speaker explaining topics using only PowerPoint slides as a resource.
- Recommendations “Veiled or Subliminal” about manufacturers or technologies related to the topic discussed.
- Pre-recorded videos with demonstrations that are NOT understood, nor do they look good, nor do we know if they work in a real environment.
- Commercial material of any kind.
- Monotony of presentation.
- Dense or complex subjects explained in denser or unintelligible technical language.
- Questions at the end of the Conference.
Now, let’s talk about what you can expect at our conferences:
- All lectures include LIVE and REAL-TIME demonstrations.
- High-impact demonstrations with advanced techniques.
- Latest Contents with latest Examples.
- Ability to respond to any type of concern not only about the subject matter of the conference but also about the issues that the audience considers relevant.
- Freedom to ask questions when they wish, during the conference.
- Permanent interaction with the audience.
- Personalized content.
- Speakers with over 15 years of experience in audience management and body language.
- Amusing, digestible and understandable content for each type of audience/sector:
- Managers/ executives.
Some of our Conferences, without limiting ourselves to generating tailor-made content, are described below:
Cybersecurity: Protecting corporate information
This conference will explain the different attack vectors used by a cybercriminal to steal corporate information, we will discuss the rules of cyber hygiene to be observed when using a computer to make it difficult for a computer criminal to act, such as improving password security, proper use of WIFI, Bluetooth, etc.
We begin with a preamble where we explain what data a cybercriminal is looking for from us and demonstrate how he achieves this.
After these demonstrations of OSINT (Open Source Intelligence), we demonstrate the use of this information collected to carry out attacks, amongst which we can cite:
- False email.
- Social engineering.
- Robust passwords.
- Unsecure WIFI.
- Malicious Mobile Applications.
- Amongst other demonstrations.
For each attack, we demonstrate countermeasures and defenses that users can implement.
The final message of this conference is:
We are the owners and responsible for our Cybersecurity and that of our Company.