CONFidence Conference’s cover photo
CONFidence Conference

CONFidence Conference

IT Services and IT Consulting

Krakow, Lesser Poland Voivodeship 4,047 followers

Let’s meet on 25-26 May 2026 in Krakow, Poland with hackers, cybersecurity experts, and IT specialists!

About us

25-26 May 2026 | EXPO Krakow, Poland Security experts, researchers, developers, and IT specialists - every spring they all come to Kraków to take part in Legendary CONFidence, the biggest IT security conference in CEE. We focus on delivering practical, relevant, and diverse content. This year you can expect a program packed with advanced lectures, real-life examples, and innovative solutions. Yet CONFidence is much more than just a conference. It's a camp-like event packed with many attractions, security villages, and parties!

Website
https://confidence-conference.org/
Industry
IT Services and IT Consulting
Company size
1,001-5,000 employees
Headquarters
Krakow, Lesser Poland Voivodeship
Founded
2005
Specialties
IT security, cybersecurity, bezpieczeństwo IT, cyberbezpieczeństwo, and cyberprzestępczość

Updates

  • Some systems can afford a mistake. Banking cannot. At PKO Bank Polski, cybersecurity means operating in an environment where scale, speed, and trust intersect every second. Millions of users, constant transaction flow, and evolving attack techniques turn security into a continuous, real-time operation. That’s why at PKO Bank Polski, cybersecurity is not a layer added on top - it’s a continuous process embedded in everyday operations. With millions of customers and constant exposure to phishing, fraud, and targeted attacks, security here is about real-time decisions, fast response, and resilience at scale. Behind the scenes, dedicated CERT and SOC teams work around the clock to detect threats, analyze incidents, and protect both infrastructure and customer funds. It’s an environment where theory is quickly verified by reality. At CONFidence 2026, you’ll have a chance to meet the PKO Bank Polski team and talk about how cybersecurity works when systems run at scale and there’s no room for downtime.  If you want to understand what defending a large-scale financial system actually looks like, this is a conversation worth having. 👉 pkobp.pl

    • No alternative text description for this image
  • Let’s welcome Akamai Technologies as a Workshop Partner of CONFidence 2026. Akamai operates a globally distributed cloud computing platform and edge network, handling internet traffic on a massive scale. From DDoS mitigation to API protection, they support the performance, reliability, and security of business. At CONFidence, they’ll be running a workshop - a chance to go deeper into how these issues are handled in practice, not just in theory. If you’re interested in how security looks from the edge, stay tuned for the details! 👉 akamai.com 

    • No alternative text description for this image
  • Last call before they’re gone. Tickets with T-shirts & Hoodies for CONFidence Conference 2026 are available only until May 3rd. After that - no merch bundles, no second chance. If you’re joining us in Kraków, this is the moment to lock in your spot and grab the gear. Security. Community. And something you’ll actually wear. 👉 Don’t wait - May 3rd is the deadline. #CONFidence2026 #Cybersecurity #Infosec #Krakow #TechEvents

    • No alternative text description for this image
  • Rolling out passkeys in a bank is hard. Doing it without changing application code? That’s the interesting part. At CONFidence Conference 2026, Bartosz Miazga (BNP Paribas Bank Polska) and Bartosz Cieszewski (Secfense | The Fast Track To Passwordless) show how FIDO2 passkeys were deployed in a real banking environment - without rewrites and without breaking legacy systems. Phishing-resistant auth. PSD2 compliance. A rollout that actually worked. This is the kind of problem most teams assume is unsolvable. Be there.

    • No alternative text description for this image
  • For years, TPMs have been positioned as a foundation for hardware-backed security. Yet in practice, adoption remains limited. Not because the technology isn’t there - but because integrating it into real-world systems is still too complex. At CONFidence 2025, Ignat Korchagin offered a different perspective: instead of pushing complexity to applications, bring TPM integration closer to the Linux kernel. The result is a model where hardware security becomes easier to consume - not harder to implement. And that’s where adoption actually starts. https://lnkd.in/dDF9twvi See what’s next at CONFidence Conference 2026.

  • Są rzeczy, które teoretycznie "nie powinny się wydarzyć" w systemach produkcyjnych… a jednak dzieją się cały czas. Podczas CONFidence Conference 2026 zobaczycie przegląd największych porażek bezpieczeństwa aplikacji webowych - bez teorii, bez marketingu, tylko realne przypadki. ➡️ ok. 20 aktualnych podatności ➡️ znalezionych w prawdziwych systemach ➡️ z konkretnymi wnioskami, które możesz od razu przełożyć na swoją pracę Prelekcję poprowadzi Michal Sajdak - Założyciel sekurak i jedna z najbardziej rozpoznawalnych postaci polskiej sceny cybersecurity. Jeśli tworzysz, testujesz albo zabezpieczasz aplikacje webowe - to jest talk, którego nie chcesz przegapić. Bo największe błędy często wyglądają… zaskakująco znajomo.

    • No alternative text description for this image
  • Let’s welcome PZU as a Gold Partner of CONFidence 2026. PZU is one of the largest financial institutions in Central and Eastern Europe, spanning insurance, health, and banking. At that scale, security is less about isolated systems and more about managing risk across connected services and processes. This includes protecting sensitive data, maintaining system continuity, handling incidents, and dealing with fraud and abuse. They also sit close to the impact of cyber incidents - not just technically, but financially, supporting organizations in responding to attacks, recovering operations, and dealing with the consequences. Join them at CONFidence to talk about what happens after detection. 👉 www.pzu.pl

    • No alternative text description for this image
  • Ile kosztuje napisanie prawdy o bezpieczeństwie? Czasem kończy się to pozwem. Nie dlatego, że ktoś się myli. Dlatego, że ktoś o tym napisał. Adam Haertle z ZaufanaTrzeciaStrona.pl od lat opisuje realne przypadki. Błędy, podatności, reakcje firm. I to, co dzieje się później. Prośby o usunięcie. Naciski. Wezwania. A czasem sprawy w sądzie. To ciekawa perspektywa, bo pokazuje nie tylko security, ale też to, jak organizacje radzą sobie z niewygodną prawdą. I jak często robią to źle. Widzimy się na CONFidence Conference

    • No alternative text description for this image
  • You think your lateral movement defenses are working? They might not be. At CONFidence Conference 2025, Omer Kahlon showed how DCOM and WMI attacks can bypass common RPC-based protections. The problem? The signals your tools rely on are still there… just hidden. So even when everything looks fine, you might be completely blind. And worse - with current approaches, these attacks are often neither detected nor prevented. This talk breaks down why it happens and introduces a different approach: a DCOM-WMI firewall designed to stop these attacks in real time. https://lnkd.in/dwaF5923 Want to see what’s next? 🔥Join us at CONFidence Conference 2026.

  • "Test it in staging" sounds reasonable… until you operate at Netflix scale. At Netflix, assumptions are not enough. When your systems run on millions of client devices, you need to understand impact before anything reaches production. That’s why they experiment differently. They run experiments directly from client devices and within hours can see how changes affect real-world conditions. New roots of trust, TLS configurations, performance optimizations — all validated before they become a problem. This is not about moving fast and breaking things. It’s about moving fast and knowing what will break. At CONFidence Conference 2026, Jared Crawford (Security Software Engineer at Netflix) will walk through how this approach works in practice. If you’re working on systems where security, scale, and reliability matter, this is a talk worth paying attention to.

    • No alternative text description for this image

Affiliated pages

Similar pages