Tomáš Vobruba
For the past 8 years, he has been working at Check Point as a senior security engineer for Slovakia and Eastern Europe. During his more than 25-year professional career, he worked at AEC, gaining extensive experience in information system security. He has obtained numerous certificates from professional training courses focused on Unix/Linux, antivirus products, system security and analysis, data encryption, and other areas. He leads technical training courses focused on threat prevention, encryption, network (internet) communication and security, and firewall security.
-
DISCUSSION "Strategic Technology in Defense"
-
AI, cyber warfare and the future of combat conflicts: How technology is changing the rules of the game (5 min)
Modern warfare is undergoing a fundamental transformation, with artificial intelligence, cybersecurity, and information operations playing as important a role as weapons on the battlefield. AI accelerates decision-making, enables autonomous systems, and changes the nature of reconnaissance and attacks, while cyber operations disrupt adversary infrastructure, communications, and morale. Check Point Software Technologies reports and research show the remarkable speed of AI-driven threats, cyber warfare, and the exploitation of known vulnerabilities, confirming that the future will be defined by the speed, intelligence, and security of digital systems. -
Achilles, we found 400 weaknesses in the QUALCOMM chip
With more than 3 billion users worldwide, smartphones are an integral, almost inseparable part of our daily lives.
As the mobile market continues to grow, retailers are competing to provide new features and better technological innovation in their latest devices. In support of this persistent drive for innovation, retailers often rely on third parties to provide the required hardware and software for their phones. One of the most common third-party solutions is a digital signal processor unit, commonly known as DSP chips.
In this presentation, we will look at the vulnerability that our company discovered in the chips of the well-known company Qualcomm Technologies. Its chips are used by a large number of mobile phone manufacturers. Let's take this vulnerability closer together.
-
Discussion
Discussion of invited speakers:
Jaroslav Ďurovka, ORANGE
Juraj Eliáš, O2 Slovakia
Ivan Marták, Úrad pre reguláciu elektronických komunikácií a poštových služieb
Rene Summer, Ericcson
Marian Ščasný, Úrad pre reguláciu elektronických komunikácií a poštových služieb
Tomáš Vobruba, CheckPoint -
Security from ENIAC to quantum computer
Why is Ransomware so successful? Why is Cryptojacking even more successful malware? What was the most successful malware in history and why? Who was behind him? Simply Historia Magistra Vitae.
-
Best security - THINK LIKE A HACKER!