Hacking and Creators
Training will be the tool that will allow you to defend your future. Therefore, we organize a space with conferences with a current theme, where cybersecurity, artificial intelligence and video games will predominate. We will have news soon.
Talks
Jorge Coronado
There’s a Russian in my wallet: identifying crypto-scam perpetrators
12 years of experience in computer forensics and OSINT. Passionate about cybersecurity and Python programming. From a very young age I started working in the IT sector and ended up creating my own company, called QuantiKa14. I do different tasks and jobs: DFIR, IT expertise, application development and security auditing. I have also been a speaker at conferences and events such as PyConEs, OpenExpo, Hack&Beers, EastMadHack, Sec/Admin, etc. And I am member 116 and member of the Association of Technological Experts of Andalusia (APTAN).
My divulging side is not only in giving talks, I have also been 4 years as a collaborator in Canal Sur Radio and I have written several opinion and research articles on the Internet that have been published in various media (ElPlural, lamarea.com, etc). In addition, I have written more than 400 articles in my blog. Founder of the most active community in Seville on cybersecurity, Happy Hacking Sevilla and co-organizer of the congress on intelligence, cybersecurity and OSINT, called OSINTCITY.
Director of the summer course on gender cybercrime and professor in the course of detectives at the University Pablo de Olavide in the year of 2017 on digital investigation. I have also provided training to security forces through the Public School of Public Security of Andalusia (ESPA) and other courses.
Co-author of the first institutional protocol in Spain against gender violence in social networks in Andalusia and author of the action protocol for the search of missing persons through ICT.
And, above all, Triana.
José Juan Palao
Artificial Intelligence 2025: The Future That’s Already Here and How It Will Transform Your Life and Work
I am a professional with more than 15 years of experience in SEO, digital marketing and project management. I started my career in information technology, working as a Linux system administrator and programmer in companies such as Isotrol and Atos. Later, I specialized in SEO, working as a SEO Consultant at Demindu and leading teams in agencies such as Extravaganza Communication and GF Publicidad, where I developed strategies to improve the visibility and conversion of websites.
In the financial sector, I was a Bank Clerk and Business Manager at Santander, where I managed portfolios and advised clients on financial products. More recently, as SEO Manager at Digital Tactics 360 and Team Leader SEO at CoverManager, I have led teams and executed SEO strategies at a technical, content and data analysis level, always with a focus on continuous improvement and measurable results.
My experience includes the use of tools such as Google Analytics, SEMrush, Ahrefs, and Google Ads, with a strong focus on on-page SEO, technical SEO and link building strategies.
Kino Makino
Cybersecurity. Profession and passion
Kinomakino has been passionate about IT and security since the mid-90s. He has numerous certifications and belongs to renowned organizations such as ENISA and thanks to his work he has won the Microsoft MVP award the last few years. He is the creator of the cybersecurity blog INSEGUROS Seguridad Informática.
Aina S. Gelabert
Introduction to pixelart: basic tips for a beautiful videogame.
Chari Morón – Denna
The birth of Artificial Intelligence: from zero to our computers.
For as long as I can remember I have always been interested in science. That is why when the time came I decided to start studying physics, I wanted to know how the world worked, and it was studying physics when I realized that I needed to investigate even the most basic of the world: mathematics.
After a change of career I was able to start studying my passion, learning how everything worked, finding explanations and solving almost impossible formulas was something inexplicable, but it was then when my life took a curious turn.
Let’s just say that someone who did not get along well with computer science ended up studying computer science and it has been the best decision I have ever made.
Currently I am a Systems Technician at Inerco, where I am growing in this field and learning a little more every day, but I have been very lucky to be able to participate in R&D projects as a Data Scientist internally in the company. It is here where my small (still) trajectory in the world of Artificial Intelligence and Data science begins, in this time I have learned to create my own artificial intelligence, how it works from the inside and how I can resemble the AI to the human brain itself and even get to draw conclusions of what we will see in a very short time in the world of technology thanks to these advances.
And finally one very important thing: mathematics cannot be owned, mathematics is the fruit of mother nature.
Juan Garrido – Silverhack
Scraping the unscrapable. How To Spot a Fake Profile on LinkedIn
LinkedIn has a serious problem with fake accounts. During 2022 and part of 2023, several attacks have been perpetrated, many of which originated with fake job offers posted on LinkedIn, and as one of them ended with the theft of more than 500 million in cryptocurrencies. That same year, companies such as Apple, Amazon and Microsoft teamed up to take down nearly a million fake profiles of purported workers from these companies. By the end of 2022 and during the current year, fake profiles with high-level roles, such as Chief Information Security Officer (CISO) or Chief Technical Officer (CTO), have proliferated. LinkedIn users have known for years that fake profiles exist on the social network and are aware of scam and phishing attacks via messages sent by LinkedIn. Today, attacks are becoming more elaborate and sophisticated, and LinkedIn is not doing a good job of eliminating, slowing down or stopping these types of attacks, as attackers are using today’s technology, such as images and content generated by artificial intelligence. During this talk we will look at what type of technology attackers are using to generate fake content on LinkedIn and how companies can defend against, detect and eliminate these targeted attacks. This will include guidelines on how to assess company health on LinkedIn, as well as practical examples of how to extract company and employee information in a fully automated way. During the talk, examples of fake profiles will be shown, as well as several real-time demos on profile capture, extraction, evaluation and mass profile detection.
FJ Monge
DFIR en la vida real, más allá de los manuales
My beginnings in the world of IT and technology started in the field of SysAdmin. My first work experience in this field was in an international engineering company, where I was able to observe and participate in the internal processes that organizations follow to manage their technology infrastructure. Although I was passionate about the world of SysAdmin, I was always a cybersecurity geek, which led me, after a year, to make the leap to Digital Forensics through computer forensics, working in a firm specializing in computer forensics and forensic analysis.
During my time in the forensic sector, I discovered how passionate I was about investigations, which motivated me to move on to a new challenge: working in DFIR in large corporate environments. I left the forensics field to fully embrace the challenging and exciting discipline of Digital Forensics and Incident Response (DFIR), joining a cybersecurity consulting firm, Deloitte, where I currently work. This discipline combines investigative skills with team management capabilities, resources and technical expertise essential for responding to cyber incidents and investigating post mortem incidents.
During my short but intense experience at DFIR, I have worked on the front lines of ransomware, web exploits, fraud, phishing, insider threats and corporate analysis, helping companies identify how they were exposed, protect their assets and recover from attacks. In my current role as Senior Cyber Security Analyst at Deloitte, my day-to-day is focused on team management, investigations and cyber incident response, covering Windows, Linux, iOS and Android systems. I apply the fundamental principles of DFIR, including gathering and preserving evidence, interpreting key data, and writing technical and executive reports to mitigate risks, understand what happened, and improve the organizations security posture.
Alcolea Party will be my first experience as a communicator, a great personal and professional challenge, as it is not exactly one of my strong points. However, I am motivated by the idea of sharing first-hand what day-to-day incident response is like, as well as transmitting my experiences, the knowledge I have acquired and my perspective on how to deal with them.
David Padilla
Bug Bounty en España: Cazadores de bugs, ¿O Cazadores de Sombras?
Graduated in telematics engineering from the University of Jaén. I have several postgraduate degrees among which are: official master’s degree in computer security from the International University of La Rioja (UNIR), master’s degree in offensive security from the Catholic University of San Antonio de Murcia (UCAM), master’s degree in Microsoft business environments, master’s degree in business administration and management from the International University of La Rioja (UNIR).
I am currently developing my professional career as an Offensive Security Engineer and for more than five years I have been working in the field of cybersecurity. From the point of view of certifications I have some of the most relevant in the industry as OSCP, CRTO, PNPT, eWPT, eJPT, CCNA, CSX, CAP. I am positioned in more than seven halls of fame for having found vulnerabilities to entities such as NASA, Nestle, Glovo, Jaen City Council, University of Jaen, Indra, Berlin, US Health Service among others.
I have several 0-days to my name positioning me in the INCIBE CNA ranking with a total of 4 CVE found.
I am a founding member of the cybersecurity congress Hackén in Jaén.
Themes
Cybersecurity
We have been following and studying the growth of cybersecurity for years. A long time ago it was an “optional”; today it is necessary that you all know what is going on in this world.
Artificial Intelligence
Do you know ChatGPT? In Alcolea Party you can discover how with other technologies you can achieve similar results on your own computer. We will have a very interesting talk – workshop.
Computer Forensics
When you hear forensics it will remind you of police movies, but, in the world of computer science and cybersecurity this discipline also exists; and we are going to teach it to you.
Video game creation
It is exciting how virtual worlds can be created today with the tools we have available. We will have the best to talk to us about this amazing art.
…
…and much more… soon you will be able to know more about it!
Open your mind!
Take advantage of these specific trainings to enrich your knowledge, learn something new, know what we find today, or who knows, maybe it will help you in your professional future.