|

|

|

136Days
13Hours
03Minutes
17Seconds
136Days
13Hours
03Minutes
17Seconds

About

About

High-level minds. High-impact learning. One day.

High-level minds. High-impact learning. One day.

High-level minds. High-impact learning. One day.

Hackers Behind The Code – Conference is a one-day premium experience designed for a select group of hackers and developers seeking real challenges, practical learning, and high-level connections. More than a traditional conference, the event delivers advanced insights, technical demonstrations, and sessions where participants explore new techniques, dive into the latest industry updates, and interact directly with leading experts including speakers previously featured on the Hackers Behind The Code podcast. Hosted at the VIP Grand Lisboa Hotel & Spa, a 5-star venue in Lisbon, the conference offers an exclusive environment with continuous catering, premium service, and personalized gifts. Every detail is crafted to deliver a complete, immersive, and unforgettable experience. This isn’t just about watching talks it’s about experiencing the content in practice, connecting strategically with the speakers, and joining a community that is shaping the future of cybersecurity.

Hackers Behind The Code – Conference is a one-day premium experience designed for a select group of hackers and developers seeking real challenges, practical learning, and high-level connections. More than a traditional conference, the event delivers advanced insights, technical demonstrations, and sessions where participants explore new techniques, dive into the latest industry updates, and interact directly with leading experts including speakers previously featured on the Hackers Behind The Code podcast. Hosted at the VIP Grand Lisboa Hotel & Spa, a 5-star venue in Lisbon, the conference offers an exclusive environment with continuous catering, premium service, and personalized gifts. Every detail is crafted to deliver a complete, immersive, and unforgettable experience. This isn’t just about watching talks it’s about experiencing the content in practice, connecting strategically with the speakers, and joining a community that is shaping the future of cybersecurity.

0%
0%

Hackers Behind The Code – Conference is a one-day premium experience designed for a select group of hackers and developers seeking real challenges, practical learning, and high-level connections. More than a traditional conference, the event delivers advanced insights, technical demonstrations, and sessions where participants explore new techniques, dive into the latest industry updates, and interact directly with leading experts including speakers previously featured on the Hackers Behind The Code podcast. Hosted at the VIP Grand Lisboa Hotel & Spa, a 5-star venue in Lisbon, the conference offers an exclusive environment with continuous catering, premium service, and personalized gifts. Every detail is crafted to deliver a complete, immersive, and unforgettable experience. This isn’t just about watching talks it’s about experiencing the content in practice, connecting strategically with the speakers, and joining a community that is shaping the future of cybersecurity.

0%
0%

For Whom?

For Whom?

If You Shape the Future of Security, This Is Your Place

If You Shape the Future of Security, This Is Your Place

If You Shape the Future of Security, This Is Your Place

Business

Investors

Hackers

Developers

Unlock AI’s potential to optimize operations, enhance customer experiences, drive data-informed decisions, and stay competitive in a fast-evolving market.

Business

Investors

Hackers

Developers

Unlock AI’s potential to optimize operations, enhance customer experiences, drive data-informed decisions, and stay competitive in a fast-evolving market.

Speakers

Speakers

Meet the Experts Shaping the Future of Cybersecurity

Meet the Experts Shaping the Future of Cybersecurity

Meet the Experts Shaping the Future of Cybersecurity

Event Agenda

Event Agenda

Discover the Full Hackers Behind The Code Conference Event Agenda

Discover the Full Hackers Behind The Code Conference Event Agenda

Kickoff

Main Conference

Kickoff

Main Conference

Kickoff

Main Conference

08:45 – 09:15

Welcome to the Hackers Behind The Code – Conference

Start the day with an opening message from the organizers and a brief overview of what this exclusive experience has prepared for you.

09:15 – 10:15

AI Adoption with Proper Security Guardrails - An AI journey from start secure to staying secure

AI Adoption with Proper Security Guardrails - An AI journey from start secure to staying secure

Organizations are rapidly adopting AI, making security a foundational requirement rather than an afterthought. This session presents an end-to-end AI security journey focused on starting secure and staying secure. It explains how security guardrails can be embedded early through governance, secure data pipelines, and identity-driven access controls. The presentation introduces AI Security Posture Management (AI-SPM) as a way to gain visibility into AI assets, configurations, and compliance gaps. It also covers AI threat detection for identifying risks such as prompt injection, model abuse, and data leakage. Exposure Management is discussed as a method to correlate risks and prioritize remediation across AI workloads.

Organizations are rapidly adopting AI, making security a foundational requirement rather than an afterthought. This session presents an end-to-end AI security journey focused on starting secure and staying secure. It explains how security guardrails can be embedded early through governance, secure data pipelines, and identity-driven access controls. The presentation introduces AI Security Posture Management (AI-SPM) as a way to gain visibility into AI assets, configurations, and compliance gaps. It also covers AI threat detection for identifying risks such as prompt injection, model abuse, and data leakage. Exposure Management is discussed as a method to correlate risks and prioritize remediation across AI workloads.

Yuri Diogenes

PhD in Cybersecurity and Professor at University of Texas at Dallas

Yuri Diogenes

PhD in Cybersecurity and Professor at University of Texas at Dallas

Yuri Diogenes

PhD in Cybersecurity and Professor at University of Texas at Dallas

10:15 - 11:15

Hunting Malicious Documents with OSINT: Investigating Malware Beyond the Payload

Hunting Malicious Documents with OSINT: Investigating Malware Beyond the Payload

Malicious documents like PDFs, Word, and Excel files remain a common entry point for attacks. This talk shows how OSINT enhances malware analysis, helping investigators understand who is behind an attack, how it operates, and why it happens.

Attendees will learn practical techniques to extract intelligence from metadata, embedded objects, URLs, file hashes, and infrastructure, correlating these indicators with OSINT sources to link campaigns and identify threat actor behavior.

By combining document analysis with OSINT, defenders gain visibility beyond the file, uncovering attacker patterns, infrastructure, and attack strategies.

Malicious documents like PDFs, Word, and Excel files remain a common entry point for attacks. This talk shows how OSINT enhances malware analysis, helping investigators understand who is behind an attack, how it operates, and why it happens.

Attendees will learn practical techniques to extract intelligence from metadata, embedded objects, URLs, file hashes, and infrastructure, correlating these indicators with OSINT sources to link campaigns and identify threat actor behavior.

By combining document analysis with OSINT, defenders gain visibility beyond the file, uncovering attacker patterns, infrastructure, and attack strategies.

Filipi Pires

Head of Identity Threat Labs

Filipi Pires

Head of Identity Threat Labs

11:15 – 11:45

Morning Networking Coffee

Morning Networking Coffee

Catch up with fellow attendees over coffee before diving into another exciting day of learning.

Catch up with fellow attendees over coffee before diving into another exciting day of learning.

11:45 – 13:00

Hacking ChatGPT… 14 times… bug bounties is easy!

Hacking ChatGPT… 14 times… bug bounties is easy!

In this talk you are going to learn what I teach my coaching students for 250€ per hour for free. Join me as I take you beyond the scenes and explain how I have hacked one of the biggest AI companies ever no less than 5 times, and then again 14 times, and then I taught my students who got a divided 9 bugs over several people. This before I take you into game hacking and show you theoretically how to hack a game. I am going to finish with the surroundings of bug bounties like APIs, mobile and network bounty.

In this talk you are going to learn what I teach my coaching students for 250€ per hour for free. Join me as I take you beyond the scenes and explain how I have hacked one of the biggest AI companies ever no less than 5 times, and then again 14 times, and then I taught my students who got a divided 9 bugs over several people. This before I take you into game hacking and show you theoretically how to hack a game. I am going to finish with the surroundings of bug bounties like APIs, mobile and network bounty.

Wesley Thijs

Hacker and Founder of The XSS Rat

Wesley Thijs

Hacker and Founder of The XSS Rat

Wesley Thijs

Hacker and Founder of The XSS Rat

13:00 – 14:00

Lunch Break

Lunch Break

A dedicated break for lunch, networking, and recharging before the next sessions.

A dedicated break for lunch, networking, and recharging before the next sessions.

14:00 – 15:15

Under the Radar: Evasion and Incident Response Beyond XDR

Under the Radar: Evasion and Incident Response Beyond XDR

In an era of pervasive Extended Detection and Response (XDR), attackers and defenders alike must evolve their tactics.

In an era of pervasive Extended Detection and Response (XDR), attackers and defenders alike must evolve their tactics.

Sergey Chubarov

Security Expert

Sergey Chubarov

Security Expert

Sergey Chubarov

Security Expert

15:15 – 16:15

Dialing into Danger: Inside the World of Vishing

Dialing into Danger: Inside the World of Vishing

In this engaging session, we will delve into the deceptive realm of voice phishing, or vishing. This talk aims to illuminate the common techniques used by attackers to manipulate and deceive individuals over the phone. Through real-world examples, we’ll explore how vishers craft their schemes to exploit human psychology and trust. By the end of the talk, attendees will be equipped with practical strategies and defenses to protect themselves and their organizations from falling victim to vishing attacks.

In this engaging session, we will delve into the deceptive realm of voice phishing, or vishing. This talk aims to illuminate the common techniques used by attackers to manipulate and deceive individuals over the phone. Through real-world examples, we’ll explore how vishers craft their schemes to exploit human psychology and trust. By the end of the talk, attendees will be equipped with practical strategies and defenses to protect themselves and their organizations from falling victim to vishing attacks.

Teresa Pereira

Cyber Threat Hunter

Teresa Pereira

Cyber Threat Hunter

Teresa Pereira

Cyber Threat Hunter

16:15 – 16:45

Afternoon Coffee Break

Afternoon Coffee Break

A short break for coffee, networking, and informal conversations before the next talks.

A short break for coffee, networking, and informal conversations before the next talks.

16:45 – 18:00

Inside a $15M Cyber Heist: From Home Router Intrusions to Social Engineering (UNCENSORED)

Inside a $15M Cyber Heist: From Home Router Intrusions to Social Engineering (UNCENSORED)

This session explores a real-world multi-stage attack that led to a $15M financial fraud in Brazil. Starting with compromised home and small business routers, attackers evolved their tactics into a sophisticated social engineering campaign targeting contact center operators. Based on firsthand forensic investigations, the talk reveals how technical and human vulnerabilities were exploited, how the threat actors adapted over time, and the key lessons learned for defenders and incident responders.

This session explores a real-world multi-stage attack that led to a $15M financial fraud in Brazil. Starting with compromised home and small business routers, attackers evolved their tactics into a sophisticated social engineering campaign targeting contact center operators. Based on firsthand forensic investigations, the talk reveals how technical and human vulnerabilities were exploited, how the threat actors adapted over time, and the key lessons learned for defenders and incident responders.

Jefferson Macedo

Incident Responder & Founder of PurpleBird Security

Jefferson Macedo

Incident Responder & Founder of PurpleBird Security

Jefferson Macedo

Incident Responder & Founder of PurpleBird Security

18:00 – 19:15

Stop Lecturing! Start Playing!

Stop Lecturing! Start Playing!

This session will discuss how to use games to scale your application security program, foster agency, empathy, and community, spark imagination, and stimulate the brain. When choosing a strategy to make your applications more secure, don’t use reading materials, presentations with “talking heads,” or meetings as a medium to increase awareness and knowledge about application security. Instead, focus on activities that can be repeated regularly that are both relevant and engaging to the work you are doing. When employees are authentically involved and curious about their learning, their heightened focus and emotional connection lead to better memory formation and the application of knowledge. Numerous studies report that emotions have a significant impact on human cognitive processes. This underpins why games can enhance learning over time, and why having an extensive collection of games in your arsenal is beneficial when teaching others about application security.

This session will discuss how to use games to scale your application security program, foster agency, empathy, and community, spark imagination, and stimulate the brain. When choosing a strategy to make your applications more secure, don’t use reading materials, presentations with “talking heads,” or meetings as a medium to increase awareness and knowledge about application security. Instead, focus on activities that can be repeated regularly that are both relevant and engaging to the work you are doing. When employees are authentically involved and curious about their learning, their heightened focus and emotional connection lead to better memory formation and the application of knowledge. Numerous studies report that emotions have a significant impact on human cognitive processes. This underpins why games can enhance learning over time, and why having an extensive collection of games in your arsenal is beneficial when teaching others about application security.

Johan Sydseter

OWASP Cornucopia project co-leader AppSec Pokémon

Johan Sydseter

OWASP Cornucopia project co-leader AppSec Pokémon

Johan Sydseter

OWASP Cornucopia project co-leader AppSec Pokémon

19:15 – 19:30

Closing & Thank You

Closing & Thank You

A final wrap-up of the AIcron Tech Summit, with acknowledgments to all speakers, sponsors, and attendees. Looking forward to seeing you next year!

A final wrap-up of the AIcron Tech Summit, with acknowledgments to all speakers, sponsors, and attendees. Looking forward to seeing you next year!

Sponsorship

Sponsorship

Meet out sponsors who help to bring this think live

Meet out sponsors who help to bring this think live

Questions

Questions

All the Important Details Before Attending Hackers Behind the Code - Conference

All the Important Details Before Attending Hackers Behind the Code - Conference

All the Important Details Before Attending Hackers Behind the Code - Conference

1. How can I register?

2. When and where will the event take place?

3. Is the event in-person or online?

4. How many seats are available?

5. What ticket types are available?

6. Who is behind the event?

1. How can I register?

2. When and where will the event take place?

3. Is the event in-person or online?

4. How many seats are available?

5. What ticket types are available?

6. Who is behind the event?

1. How can I register?

2. When and where will the event take place?

3. Is the event in-person or online?

4. How many seats are available?

5. What ticket types are available?

6. Who is behind the event?

Our Host

Our Host

Meet Our Hosts:
The Visionaries

Meet Our Hosts:
The Visionaries

🎙️ Milton Araújo (R19) is the creator and host of the podcast Hackers Behind the Code — a space for genuine conversations with professionals shaping the future of technology, cybersecurity, and digital innovation.

Beyond the podcast, Milton is the visionary behind the international conference Hackers Behind the Code – Lisbon 2026, which will bring together past podcast guests and leading voices from the global cybersecurity community.

With a sharp and curious approach, Milton connects creative minds and bridges the gap between technical expertise and the modern hacker culture.

🎙️ Milton Araújo (R19) is the creator and host of the podcast Hackers Behind the Code — a space for genuine conversations with professionals shaping the future of technology, cybersecurity, and digital innovation.

Beyond the podcast, Milton is the visionary behind the international conference Hackers Behind the Code – Lisbon 2026, which will bring together past podcast guests and leading voices from the global cybersecurity community.

With a sharp and curious approach, Milton connects creative minds and bridges the gap between technical expertise and the modern hacker culture.

Registration

Registration

Secure Your Spot atHackers Behind the Code Conference 2026

Secure Your Spot at Hackers Behind the Code Conference 2026

Secure Your Spot at Hackers Behind the Code Conference 2026

Core Pass

Full access to all sessions, networking, and the official kit.

Access to all conference sessions and content

Networking with participants and speakers

Official Conference Kit

Premium full-day experience

Early Bird

****

Single admission

Root Pass

Premium experience with priority access, exclusive sessions, and VIP-only networking opportunities.

Everything included in the Core Pass

Exclusive Media Kit

Additional perks (to be announced)

Enhanced access for a more complete experience

Early Bird

****

Single admission

Core Pass

Full access to all sessions, networking, and the official kit.

Access to all conference sessions and content

Networking with participants and speakers

Official Conference Kit

Premium full-day experience

Early Bird

****

Single admission

Root Pass

Premium experience with priority access, exclusive sessions, and VIP-only networking opportunities.

Everything included in the Core Pass

Exclusive Media Kit

Additional perks (to be announced)

Enhanced access for a more complete experience

Early Bird

****

Single admission

Core Pass

Full access to all sessions, networking, and the official kit.

Access to all conference sessions and content

Networking with participants and speakers

Official Conference Kit

Premium full-day experience

Early Bird

****

Single admission

Root Pass

Premium experience with priority access, exclusive sessions, and VIP-only networking opportunities.

Everything included in the Core Pass

Exclusive Media Kit

Additional perks (to be announced)

Enhanced access for a more complete experience

Early Bird

****

Single admission