| "Artificial intelligence in intelligent systems today and in the future", Kirill Scherbin, GlowByte Consulting | Video | Slides |
| "Reverse engineering of Android applications for beginners", Egor xarlan Litvinov | Video | Slides |
| "Vulnerabilities of OAuth 2.0 on mobile devices", Nikita Stupin, Mail.ru | Video | Slides |
| "HRAST: automatic processing of the HEX-RAYS output", George Zaytsev, Positive Techologies | GitHub | Slides |
| "DIY tools for Hardware Reverse", Egor xarlan Litvinov | | Slides |
| "Work of pentesters team", Sergey Krasnov, USSC | Video | Slides |
| "20 years in information security", Dmitry Sklyarov, Positive Technologies | Video | Slides |
| "Social engineering in practice", Alexey Lexus Stolyarov | Video | Slides |