Behind the Code Cybersecurity Meetup at Kolla
Details
The BEHIND THE CODE meetup is coming soon!
This event is a networking opportunity for information security professionals from Cyprus and around the globe.
Note: We're back at Kolla! While construction work is underway, we'll gather at the large, comfortable tent near GATE 3. Please use this Gate to enter: location. The entrance to the parking lot was also moved; follow the EVENT PARKING signs and take a left turn AFTER THE LIDL.
SCHEDULE:
18:30 - 19:00 Guests gathering
19:00 - 21:00 Talks
21:00 - 23:00 Free networking
SPEAKERS AND TALKS
Denis Rybin | Director of Information Security | InDrive
Сybersecurity, but as your C-level sees it
In this talk, Denis will share his experience on how to effectively manage security by aligning it with business goals, moving beyond a purely technical engineering focus. This talk is essential for security professionals looking to advance their careers—from engineer to manager, or manager to director/CISO—who want to stop feeling disregarded and instead learn how to gain respect, a voice at the leadership table, and truly help the business thrive.
Grigory Salnikov | Senior SOC Analyst
SMS pumping: The unending weekend
SMS Pumping attacks can affect any company that relies on SMS providers. In this talk, Grigory will share his experience in battling this persistent form of abuse over several years. He'll detail the lessons learned and the tools and methods developed to combat SMS Pumping effectively. Participants will leave with a practical understanding of various defenses and can choose the anti-pumping strategies best suited to their business needs.
Artur Shamsiev | Co-Founder and CTO | SOC Jedi.AI
Purple swarm: Graph-native agents for faster incident investigation & remediation
Purple teaming is typically defined by Red and Blue teams collaborating in tight, iterative loops. This talk will introduce a more advanced, autonomous approach: a graph-orchestrated security swarm. We will explore how autonomous agents—specialized for emulation, threat hunting, enrichment, correlation, detection engineering, and remediation—can be coordinated by a graph that encodes hypotheses and optimal decision paths.
After the presentations, we organize a hookah lounge to chill and start insightful conversations with like-minded people. Join us, and let's enjoy a fantastic evening together!
Note: By registering and attending our events, you confirm that you've read and agreed to our Privacy Notice.
