Matomo

Conferences & events | Cossack Labs

🇺🇦 We bring our capabilities to all institutions that help protect Ukraine across critical infrastructure, defence, and government.

Conferences & events

Security architecture Security engineering Mobile Risk management Security for senior managers High level cryptography Acra DevSecOps Encryption IOS dev SSDLC Cryptography Zero knowledge architectures Cyberwarfare Product engineering
Dec 2025 #
Warsaw, Poland

Cybersecurity Architectures in 2030: ZT, DCS, CDSS

  • Conference image
  • Conference image
    Dec 2025 #
    Tampere, Finland

    Utilising civilian technologies in cyber defence, security engineering, drone warfare.

    • Conference image
      Anastasiia Voitova: resilience depends on speed, adaptability and the ability to coordinate
    • Conference image
      Tampere 2025 gathered around 300 attendees, which was twice the organisers’ expectations
      Nov 2025 #
      Kyiv, Ukraine

      On-prem AI infrastructure for secure PR reviews

      • Conference image
      • Conference image
      • Conference image
      • Conference image
      • Conference image
        Oct 2025 #
        Riga, Latvia

        Building security into Ukrainian CNI and mission-critical systems

        • Conference image
        • Conference image
        • Conference image
        • Conference image
        • Conference image
        • Conference image
        • Conference image
          Sep 2025 #
          Kyiv, Ukraine

          Cybersecurity for high-risk systems

          • Conference image
            Representatives of Cossack Labs, Center of Innovations and Defence Technologies Development of Ministry of Defence of Ukraine, Directorate of Digital Transformation in the Defence Sector of Ministry of Defence of Ukraine, and Ministry of Digital Transformation of Ukraine discuss the challenges of cybersecurity protection and resilience in governmental and defence systems.
          • Conference image
          • Conference image
            Jul 2025 #
            Kyiv, Ukraine

            How AI is changing security

            • Conference image
            • Conference image
              For skilled engineers, AI is just a tool. Sadly, more and more often, we’re seeing people who simply aren’t prepared to use it responsibly.
            • Conference image
              Cybersecurity certainly won’t stop the arrival of the technological singularity. It definitely won’t reduce its impact either. But maybe cybersecurity—as a set of measures and tools—can make people’s lives a bit more comfortable before it happens.
              Jun 2025 #
              KrakĂłw, Poland

              Building security for autonomous and robotic systems

              • Conference image
              • Conference image
              • Conference image
                May 2025 #
                Kyiv, Ukraine

                Security and adaptability in modern defence systems

                • Conference image
                  Feb 2025 #
                  Helsinki, Finland

                  Speeding up decision-making in cybersecurity for mission-critical systems

                  • Conference image
                    Oct 2024 #
                    Kyiv, Ukraine

                    How to hide from too curious users

                    • Conference image
                      Jun 2024 #
                      Kyiv, Ukraine

                      Building Security Protections for Robotic Devices

                      May 2024 #
                      Kyiv, Ukraine

                      Secure architecture for mission-critical systems

                      • Conference image
                        Mar 2024 #
                        online

                        Bulletproof your software: The magic of security autotests

                        Mar 2024 #
                        Berlin, Germany

                        Building data-centric security controls for mission-critical applications

                        • Conference image
                          Feb 2024 #
                          Kyiv, Ukraine

                          Critical Infrastructure Cybersecurity Diagnostics: Strengthening Digital Protection

                          • Conference image
                            Ihor Malchenyuk at “Critical Infrastructure Cybersecurity Diagnostics: Strengthening Digital Protection” conference
                            Jun 2023 #
                            Katowice, Poland

                            Investments in Cybersecurity in the CEE region

                            • Conference image
                              Panel discussion “Investments in Cybersecurity in the CEE region.”
                              Feb 2022 #
                              Kyiv, Ukraine

                              Crypto wallets security for developers

                              Nov 2021 #

                              The secret life of Android apps

                              Nov 2021 #

                              Data is a new security boundary

                              Sep 2021 #

                              React Native security: addressing typical mistakes

                              • Conference image
                                Sketch of Julia's NSSpain talk by felibe444
                                Sep 2021 #

                                Cryptographic protection of ML models

                                • Conference image
                                  Slide from Anastasiia's talk about ML models protection by means of cryptography
                                  Sep 2021 #

                                  The art of secure architecture

                                  • Conference image
                                    Slide from Julia's talk about security architecture and tradeoffs
                                    Jun 2021 #

                                    Encryption export regulations. Why should mobile developers care?

                                    May 2021 #

                                    iOS vulnerabilities and how to fix them

                                    • Conference image
                                      Slide from Julia's talk about improper usage of biometric authentication API
                                      Jan 2021 #

                                      End-to-end encrypted doesn't mean secure

                                      Nov 2020 #

                                      Secure Authentication. Are you sure you do it right?

                                      Jun 2020 #

                                      Use cryptography, don’t learn it

                                      Mar 2020 #

                                      Designing secure architectures the modern way, regardless of stack

                                      Nov 2019 #

                                      Protecting data in ICS, SCADA and industrial IoT: goals, problems, solutions

                                      • Conference image
                                        Eugene @ UA.SC
                                        Nov 2019 #

                                        Security engineering: from encryption to software architecture patterns

                                        Nov 2019 #

                                        Maintaining cryptographic library for 12 languages

                                          Oct 2019 #

                                          Designing secure architectures, the modern way

                                          • Conference image
                                            Eugene and Anastasiia taking part in panel discussion @ Devops Stage
                                            Oct 2019 #

                                            Building SQL firewall: insights from developers

                                            Sep 2019 #

                                            10 ways open source will hurt security and reliability

                                            Sep 2019 #

                                            10 lines of encryption, 1500 lines of key management

                                            • Conference image
                                              Slide from Anastasiia's talk with lines of defense around end-to-end encrypted notes
                                              Sep 2019 #

                                              Disagree with "I Agree". Enforcing Better GDPR Compliance Through API Documentation

                                              Jun 2019 #

                                              Security, privacy and cryptography at WWDC19

                                              May 2019 #

                                              Search over encrypted records: from academic dreams to production-ready tool

                                                Apr 2019 #

                                                "Defense in depth": trench warfare principles for building secure distributed applications

                                                Mar 2019 #

                                                Code injections using ptrace

                                                Mar 2019 #

                                                Secure software development: from rookie to hardcore in 90 minutes [workshop]

                                                • Conference image
                                                  Anastasiia Voitova
                                                  Mar 2019 #

                                                  Delivering security products without shooting yourself in the foot

                                                    Feb 2019 #

                                                    Teach your application eloquence. Logs, metrics, traces.

                                                    • Conference image
                                                      Dmytro Shapovalov @ RubyMeditation
                                                      Dec 2018 #

                                                      Data encryption for Ruby web applications

                                                      Dec 2018 #

                                                      Cryptography & data security: protecting the data while reducing cost in distributed systems

                                                        Dec 2018 #

                                                        Defensive team – who are the security engineers and how they help teams to develop secure applications

                                                          Sep 2018 #

                                                          Marrying usability and security in large-scale infrastructures

                                                          Sep 2018 #

                                                          Protecting sensitive data in modern multi-component systems

                                                          • Conference image
                                                            Karen Sawrey @ API The Docs Amsterdam
                                                            Jun 2018 #

                                                            Zero Knowledge Architecture Approach for Mobile Developers [workshop]

                                                            Jun 2018 #

                                                            Making security usable: product engineer perspective

                                                            May 2018 #

                                                            Getting secure against challenges or getting security challenges done

                                                            • Conference image
                                                              Eugene Pilyankevich
                                                              May 2018 #

                                                              Documenting the secret

                                                              May 2018 #

                                                              X things you need to know before implementing cryptography

                                                              Apr 2018 #

                                                              Encryption without magic, risk management without pain

                                                              • Conference image
                                                                Karen Sawrey
                                                                Apr 2018 #

                                                                The Bad, The Ugly, The Good

                                                                Apr 2018 #

                                                                GDPR – Get security done

                                                                • Conference image
                                                                  Eugene Pilyankevich @ OSDN Kyiv explaining Data encryption
                                                                  Oct 2017 #

                                                                  Zero-knowledge architectures for mobile applications

                                                                  Oct 2017 #

                                                                  Why decentralized social services fail

                                                                    Apr 2017 #

                                                                    Key management approaches for mobile applications

                                                                    Apr 2017 #

                                                                    DevOps and security: from the trenches to command centers

                                                                    Nov 2016 #

                                                                    End-to-end data turnover: building Zero-knowledge software

                                                                    • Conference image
                                                                      Eugene Pilyankevich
                                                                      Aug 2016 #

                                                                      Everything will be broken

                                                                      May 2016 #

                                                                      Evolution of password-based authentication systems

                                                                      Contact us

                                                                      Get whitepaper

                                                                      Apply for the position

                                                                      Our team will review your resume and provide feedback
                                                                      within 5 business days

                                                                      Thank you!
                                                                      We’ve received your request and will respond soon.
                                                                      Your resume has been sent!
                                                                      Our team will review your resume and provide feedback
                                                                      within 5 business days