Matomo

Conferences & events | Cossack Labs

🇺🇦 We bring our capabilities to all institutions that help protect Ukraine across critical infrastructure, defence, and government.

Conferences & events

Security architecture Security engineering Mobile Risk management Security for senior managers High level cryptography Acra DevSecOps Encryption IOS dev SSDLC Cryptography Zero knowledge architectures Cyberwarfare Product engineering
Mar 2026 #
Waagnatie, Antwerpen

Securing the business of tomorrow

  • Conference image
  • Conference image
  • Conference image
    Mar 2026 #
    Prague, Czech Republic

    Beyond firewalls: Is cyber resilience the only real defence?

    • Conference image
    • Conference image
    • Conference image
      Dec 2025 #
      Warsaw, Poland

      Cybersecurity Architectures in 2030: ZT, DCS, CDSS

      • Conference image
      • Conference image
        Dec 2025 #
        Tampere, Finland

        Utilising civilian technologies in cyber defence, security engineering, drone warfare.

        • Conference image
          Anastasiia Voitova: resilience depends on speed, adaptability and the ability to coordinate
        • Conference image
          Tampere 2025 gathered around 300 attendees, which was twice the organisers’ expectations
          Nov 2025 #
          Kyiv, Ukraine

          On-prem AI infrastructure for secure PR reviews

          • Conference image
          • Conference image
          • Conference image
          • Conference image
          • Conference image
            Oct 2025 #
            Riga, Latvia

            Building security into Ukrainian CNI and mission-critical systems

            • Conference image
            • Conference image
            • Conference image
            • Conference image
            • Conference image
            • Conference image
            • Conference image
              Sep 2025 #
              Kyiv, Ukraine

              Cybersecurity for high-risk systems

              • Conference image
                Representatives of Cossack Labs, Center of Innovations and Defence Technologies Development of Ministry of Defence of Ukraine, Directorate of Digital Transformation in the Defence Sector of Ministry of Defence of Ukraine, and Ministry of Digital Transformation of Ukraine discuss the challenges of cybersecurity protection and resilience in governmental and defence systems.
              • Conference image
              • Conference image
                Jul 2025 #
                Kyiv, Ukraine

                How AI is changing security

                • Conference image
                • Conference image
                  For skilled engineers, AI is just a tool. Sadly, more and more often, we’re seeing people who simply aren’t prepared to use it responsibly.
                • Conference image
                  Cybersecurity certainly won’t stop the arrival of the technological singularity. It definitely won’t reduce its impact either. But maybe cybersecurity—as a set of measures and tools—can make people’s lives a bit more comfortable before it happens.
                  Jun 2025 #
                  KrakĂłw, Poland

                  Building security for autonomous and robotic systems

                  • Conference image
                  • Conference image
                  • Conference image
                    May 2025 #
                    Kyiv, Ukraine

                    Security and adaptability in modern defence systems

                    • Conference image
                      Feb 2025 #
                      Helsinki, Finland

                      Speeding up decision-making in cybersecurity for mission-critical systems

                      • Conference image
                        Oct 2024 #
                        Kyiv, Ukraine

                        How to hide from too curious users

                        • Conference image
                          Jun 2024 #
                          Kyiv, Ukraine

                          Building Security Protections for Robotic Devices

                          May 2024 #
                          Kyiv, Ukraine

                          Secure architecture for mission-critical systems

                          • Conference image
                            Mar 2024 #
                            online

                            Bulletproof your software: The magic of security autotests

                            Mar 2024 #
                            Berlin, Germany

                            Building data-centric security controls for mission-critical applications

                            • Conference image
                              Feb 2024 #
                              Kyiv, Ukraine

                              Critical Infrastructure Cybersecurity Diagnostics: Strengthening Digital Protection

                              • Conference image
                                Ihor Malchenyuk at “Critical Infrastructure Cybersecurity Diagnostics: Strengthening Digital Protection” conference
                                Jun 2023 #
                                Katowice, Poland

                                Investments in Cybersecurity in the CEE region

                                • Conference image
                                  Panel discussion “Investments in Cybersecurity in the CEE region.”
                                  Feb 2022 #
                                  Kyiv, Ukraine

                                  Crypto wallets security for developers

                                  Nov 2021 #

                                  The secret life of Android apps

                                  Nov 2021 #

                                  Data is a new security boundary

                                  Sep 2021 #

                                  React Native security: addressing typical mistakes

                                  • Conference image
                                    Sketch of Julia's NSSpain talk by felibe444
                                    Sep 2021 #

                                    Cryptographic protection of ML models

                                    • Conference image
                                      Slide from Anastasiia's talk about ML models protection by means of cryptography
                                      Sep 2021 #

                                      The art of secure architecture

                                      • Conference image
                                        Slide from Julia's talk about security architecture and tradeoffs
                                        Jun 2021 #

                                        Encryption export regulations. Why should mobile developers care?

                                        May 2021 #

                                        iOS vulnerabilities and how to fix them

                                        • Conference image
                                          Slide from Julia's talk about improper usage of biometric authentication API
                                          Jan 2021 #

                                          End-to-end encrypted doesn't mean secure

                                          Nov 2020 #

                                          Secure Authentication. Are you sure you do it right?

                                          Jun 2020 #

                                          Use cryptography, don’t learn it

                                          Mar 2020 #

                                          Designing secure architectures the modern way, regardless of stack

                                          Nov 2019 #

                                          Protecting data in ICS, SCADA and industrial IoT: goals, problems, solutions

                                          • Conference image
                                            Eugene @ UA.SC
                                            Nov 2019 #

                                            Security engineering: from encryption to software architecture patterns

                                            Nov 2019 #

                                            Maintaining cryptographic library for 12 languages

                                              Oct 2019 #

                                              Designing secure architectures, the modern way

                                              • Conference image
                                                Eugene and Anastasiia taking part in panel discussion @ Devops Stage
                                                Oct 2019 #

                                                Building SQL firewall: insights from developers

                                                Sep 2019 #

                                                10 ways open source will hurt security and reliability

                                                Sep 2019 #

                                                10 lines of encryption, 1500 lines of key management

                                                • Conference image
                                                  Slide from Anastasiia's talk with lines of defense around end-to-end encrypted notes
                                                  Sep 2019 #

                                                  Disagree with "I Agree". Enforcing Better GDPR Compliance Through API Documentation

                                                  Jun 2019 #

                                                  Security, privacy and cryptography at WWDC19

                                                  May 2019 #

                                                  Search over encrypted records: from academic dreams to production-ready tool

                                                    Apr 2019 #

                                                    "Defense in depth": trench warfare principles for building secure distributed applications

                                                    Mar 2019 #

                                                    Code injections using ptrace

                                                    Mar 2019 #

                                                    Secure software development: from rookie to hardcore in 90 minutes [workshop]

                                                    • Conference image
                                                      Anastasiia Voitova
                                                      Mar 2019 #

                                                      Delivering security products without shooting yourself in the foot

                                                        Feb 2019 #

                                                        Teach your application eloquence. Logs, metrics, traces.

                                                        • Conference image
                                                          Dmytro Shapovalov @ RubyMeditation
                                                          Dec 2018 #

                                                          Data encryption for Ruby web applications

                                                          Dec 2018 #

                                                          Cryptography & data security: protecting the data while reducing cost in distributed systems

                                                            Dec 2018 #

                                                            Defensive team – who are the security engineers and how they help teams to develop secure applications

                                                              Sep 2018 #

                                                              Marrying usability and security in large-scale infrastructures

                                                              Sep 2018 #

                                                              Protecting sensitive data in modern multi-component systems

                                                              • Conference image
                                                                Karen Sawrey @ API The Docs Amsterdam
                                                                Jun 2018 #

                                                                Zero Knowledge Architecture Approach for Mobile Developers [workshop]

                                                                Jun 2018 #

                                                                Making security usable: product engineer perspective

                                                                May 2018 #

                                                                Getting secure against challenges or getting security challenges done

                                                                • Conference image
                                                                  Eugene Pilyankevich
                                                                  May 2018 #

                                                                  Documenting the secret

                                                                  May 2018 #

                                                                  X things you need to know before implementing cryptography

                                                                  Apr 2018 #

                                                                  Encryption without magic, risk management without pain

                                                                  • Conference image
                                                                    Karen Sawrey
                                                                    Apr 2018 #

                                                                    The Bad, The Ugly, The Good

                                                                    Apr 2018 #

                                                                    GDPR – Get security done

                                                                    • Conference image
                                                                      Eugene Pilyankevich @ OSDN Kyiv explaining Data encryption
                                                                      Oct 2017 #

                                                                      Zero-knowledge architectures for mobile applications

                                                                      Oct 2017 #

                                                                      Why decentralized social services fail

                                                                        Apr 2017 #

                                                                        Key management approaches for mobile applications

                                                                        Apr 2017 #

                                                                        DevOps and security: from the trenches to command centers

                                                                        Nov 2016 #

                                                                        End-to-end data turnover: building Zero-knowledge software

                                                                        • Conference image
                                                                          Eugene Pilyankevich
                                                                          Aug 2016 #

                                                                          Everything will be broken

                                                                          May 2016 #

                                                                          Evolution of password-based authentication systems

                                                                          Contact us

                                                                          Get whitepaper

                                                                          Apply for the position

                                                                          Our team will review your resume and provide feedback
                                                                          within 5 business days

                                                                          Thank you!
                                                                          We’ve received your request and will respond soon.
                                                                          Your resume has been sent!
                                                                          Our team will review your resume and provide feedback
                                                                          within 5 business days