BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesluxembourg-2026//speaker//F7ZBE7
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-VENKPF@pretalx.com
DTSTART;TZID=CET:20260507T112000
DTEND;TZID=CET:20260507T120000
DESCRIPTION:Modern infrastructures are increasingly complex\, distributed\,
  and opaque — making it difficult for security teams to answer a simple 
 question: what exactly are we protecting?\n\nSystem cartography provides a
 n essential foundation for cybersecurity governance. It allows organizatio
 ns to understand their architecture\, dependencies\, and data flows — th
 e key to effective risk management\, incident response\, and compliance.
DTSTAMP:20260412T011659Z
LOCATION:Workshops and Stage - Design Space (C1.05.12)
SUMMARY:Mapping the Invisible: Why System Cartography Matters for Security 
 and Compliance - Didier Barzin
URL:https://pretalx.com/bsidesluxembourg-2026/talk/VENKPF/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-LKLWWX@pretalx.com
DTSTART;TZID=CET:20260508T094000
DTEND;TZID=CET:20260508T102000
DESCRIPTION:Does end-users spontaneously connect USB sticks fiund in public
  places to their personal or professional computers ? \n\nTo this end\, a 
 controlled experiment was carried out in Luxembourg\, where 250 USB sticks
  were voluntarily “lost”. The results revealed a high success rate\, e
 stimated around 20%\, with the first connection recorded in just a few min
 utes. We believe that these users are acting out of curiosity or altruisti
 c intent\, seeking to identify or restore the owner of the key. \n\nHoweve
 r\, they do not perceive the risks associated with their gesture. The stud
 y highlights the persistence of USB key attacks as an effective intrusion 
 vector\, and underscores the need to make users more aware of the dangers 
 they represent.
DTSTAMP:20260412T011659Z
LOCATION:Workshops and Stage - Design Space (C1.05.12)
SUMMARY:Spreading malware with USB keys - does it still work ? - Didier Bar
 zin\, Mathieu Vajou
URL:https://pretalx.com/bsidesluxembourg-2026/talk/LKLWWX/
END:VEVENT
END:VCALENDAR
