Matomo

Conferences & events | Cossack Labs

🇺🇦 We bring our capabilities to all institutions that help protect Ukraine across critical infrastructure, defence, and government.

Conferences & events

Oct 2025 #

Building security into Ukrainian CNI and mission-critical systems

  • Conference image
  • Conference image
  • Conference image
  • Conference image
  • Conference image
  • Conference image
  • Conference image
    May 2025 #

    Security and adaptability in modern defence systems

    • Conference image
      Feb 2025 #

      Speeding up decision-making in cybersecurity for mission-critical systems

      • Conference image
        Oct 2024 #

        How to hide from too curious users

        • Conference image
          Jun 2024 #

          Building Security Protections for Robotic Devices

          May 2024 #

          Secure architecture for mission-critical systems

          • Conference image
            Mar 2024 #

            Bulletproof your software: The magic of security autotests

            Mar 2024 #

            Building data-centric security controls for mission-critical applications

            • Conference image
              Feb 2024 #

              Critical Infrastructure Cybersecurity Diagnostics: Strengthening Digital Protection

              • Conference image
                Ihor Malchenyuk at “Critical Infrastructure Cybersecurity Diagnostics: Strengthening Digital Protection” conference
                Jun 2023 #

                Investments in Cybersecurity in the CEE region

                • Conference image
                  Panel discussion “Investments in Cybersecurity in the CEE region.”
                  Feb 2022 #

                  Crypto wallets security for developers

                  Nov 2021 #

                  The secret life of Android apps

                  Nov 2021 #

                  Data is a new security boundary

                  Sep 2021 #

                  React Native security: addressing typical mistakes

                  • Conference image
                    Sketch of Julia's NSSpain talk by felibe444
                    Sep 2021 #

                    Cryptographic protection of ML models

                    • Conference image
                      Slide from Anastasiia's talk about ML models protection by means of cryptography
                      Sep 2021 #

                      The art of secure architecture

                      • Conference image
                        Slide from Julia's talk about security architecture and tradeoffs
                        Jun 2021 #

                        Encryption export regulations. Why should mobile developers care?

                        May 2021 #

                        iOS vulnerabilities and how to fix them

                        • Conference image
                          Slide from Julia's talk about improper usage of biometric authentication API
                          Jan 2021 #

                          End-to-end encrypted doesn't mean secure

                          Nov 2020 #

                          Secure Authentication. Are you sure you do it right?

                          Jun 2020 #

                          Use cryptography, don’t learn it

                          Mar 2020 #

                          Designing secure architectures the modern way, regardless of stack

                          Nov 2019 #

                          Protecting data in ICS, SCADA and industrial IoT: goals, problems, solutions

                          • Conference image
                            Eugene @ UA.SC
                            Nov 2019 #

                            Security engineering: from encryption to software architecture patterns

                            Nov 2019 #

                            Maintaining cryptographic library for 12 languages

                              Oct 2019 #

                              Designing secure architectures, the modern way

                              • Conference image
                                Eugene and Anastasiia taking part in panel discussion @ Devops Stage
                                Oct 2019 #

                                Building SQL firewall: insights from developers

                                Sep 2019 #

                                10 ways open source will hurt security and reliability

                                Sep 2019 #

                                10 lines of encryption, 1500 lines of key management

                                • Conference image
                                  Slide from Anastasiia's talk with lines of defense around end-to-end encrypted notes
                                  Sep 2019 #

                                  Disagree with "I Agree". Enforcing Better GDPR Compliance Through API Documentation

                                  Jun 2019 #

                                  Security, privacy and cryptography at WWDC19

                                  May 2019 #

                                  Search over encrypted records: from academic dreams to production-ready tool

                                    Apr 2019 #

                                    "Defense in depth": trench warfare principles for building secure distributed applications

                                    Mar 2019 #

                                    Code injections using ptrace

                                    Mar 2019 #

                                    Secure software development: from rookie to hardcore in 90 minutes [workshop]

                                    • Conference image
                                      Anastasiia Voitova
                                      Mar 2019 #

                                      Delivering security products without shooting yourself in the foot

                                        Feb 2019 #

                                        Teach your application eloquence. Logs, metrics, traces.

                                        • Conference image
                                          Dmytro Shapovalov @ RubyMeditation
                                          Dec 2018 #

                                          Data encryption for Ruby web applications

                                          Dec 2018 #

                                          Cryptography & data security: protecting the data while reducing cost in distributed systems

                                            Dec 2018 #

                                            Defensive team – who are the security engineers and how they help teams to develop secure applications

                                              Sep 2018 #

                                              Marrying usability and security in large-scale infrastructures

                                              Sep 2018 #

                                              Protecting sensitive data in modern multi-component systems

                                              • Conference image
                                                Karen Sawrey @ API The Docs Amsterdam
                                                Jun 2018 #

                                                Zero Knowledge Architecture Approach for Mobile Developers [workshop]

                                                Jun 2018 #

                                                Making security usable: product engineer perspective

                                                May 2018 #

                                                Getting secure against challenges or getting security challenges done

                                                • Conference image
                                                  Eugene Pilyankevich
                                                  May 2018 #

                                                  Documenting the secret

                                                  May 2018 #

                                                  X things you need to know before implementing cryptography

                                                  Apr 2018 #

                                                  Encryption without magic, risk management without pain

                                                  • Conference image
                                                    Karen Sawrey
                                                    Apr 2018 #

                                                    The Bad, The Ugly, The Good

                                                    Apr 2018 #

                                                    GDPR – Get security done

                                                    • Conference image
                                                      Eugene Pilyankevich @ OSDN Kyiv explaining Data encryption
                                                      Oct 2017 #

                                                      Zero-knowledge architectures for mobile applications

                                                      Oct 2017 #

                                                      Why decentralized social services fail

                                                        Apr 2017 #

                                                        Key management approaches for mobile applications

                                                        Apr 2017 #

                                                        DevOps and security: from the trenches to command centers

                                                        Nov 2016 #

                                                        End-to-end data turnover: building Zero-knowledge software

                                                        • Conference image
                                                          Eugene Pilyankevich
                                                          Aug 2016 #

                                                          Everything will be broken

                                                          May 2016 #

                                                          Evolution of password-based authentication systems

                                                          Contact us

                                                          Get whitepaper

                                                          Apply for the position

                                                          Our team will review your resume and provide feedback
                                                          within 5 business days

                                                          Thank you!
                                                          We’ve received your request and will respond soon.
                                                          Your resume has been sent!
                                                          Our team will review your resume and provide feedback
                                                          within 5 business days