Region Head F-Secure Nordics and Regional Sales
Internationally experienced sales leader with more than 10 years of service time with F-Secure in many various market including 2 years stint in China.
SynopsisIt’s amazing to reflect on the fact that F-Secure has been excelling in delivering stellar cyber security end point protection in the global market place for more than 30 years. Time to move on? Having this immense experience in behavioral automation technology, combining complex algorithms with expertise brainpower, sets the stage for the exciting transition from traditional end point protection to advanced threat detect and response technology. Tune in for F-Secures view on where cyber security is moving towards.
Senior Privacy Manager & UK Data Protection Officer
Ben is a privacy specialist who joined eBay in May 2017. He is responsible for all UK based data protection and information privacy matters within the eBay group of companies.
Ben has 10 years of experience managing regulatory compliance within the UK financial services sector. The past 5 years has been spent specialising in data protection and information security, with time spent at Legal & General, Vitality UK and Domestic & General.
SynopsisA case study of how eBay is approaching GDPR, with a deep dive into three separate work streams.
Tinkode - Razvan Cernaianu
Co-founder & CTO
Tinkode is a former hacker. Top Number. 2 worldwide. He was known in 2012 worldwide after he hacked some of the most secured infrastructures worldwide and is present on the multiple
Hall of fame:Google,Youtube, Yahoo, IBM, MSN, Apple, CNN, Reuters, Sony,Kaspersky, NOD32, Oracle, MySQL, N.A.S.A, US Army, Pentagon, WhiteHouse, National Weather Services – NOAA, Royal Navy – MOD.UK, European Space Agency, Sun MicroSystems, SourceForge, IPB , vBulletin and more.
Together with Madalin Dumitru he founded Cyber Smart Defence one the leading companies in Cyber Security Worldwide.
Security advisor, Secure Trading and Cognosec
Mustafa is an information security advisor at London-based Secure Trading and Cognosec, and a doctoral researcher at University College London, with a focus on cryptocurrency and distributed ledger technology. As a teenager, he co-founded LulzSec, a hacking group which made headlines for its hacks on Fortune 500 companies and governments.
He was included in the Forbes 30 under 30 in 2016 for his work on state-sponsored malware.
SynopsisThis talk will explore the human and economic motivations of information security. In order to understand why people and organisations might employ good or poor security practices, it is important to understand their motivations. Who is impacted when a breach happens, and who pays the cost, what’s the cost/benefit ratio for investing in security and how do customers react to products that have poor security?
Founder & CEO
Madalin is a Cyber Security Expert with over 16 years of experience in IT. He founded Cyber Smart Defence in 2011 as a need to all cyber security threats he was facing in his companies. Cyber Smart Defence is one of the fastest growing cyber security companies in Romania, also in the United States, Middle East and Europe and employing ethical hackers in order to identify and secure all the vulnerabilities.
SynopsisWhen was the last time you tried to hack yourself? A live hacking session delivered by Cyber Smart Defence’s most experienced ethical hackers, in order to increase the awareness of the damage in case of an cyber attack. A real situation where a motivated hacker can hack and steal sensitive data from your company. Better safe than sorry..
Consultant Solution Architect, EMEA
Colin Domoney is a Consultant Solution Architect at Veracode. In this role, Colin
is responsible for ensuring customer success in the deployment of Veracode. He
draws on his own vast personal experience and enables customers to build and
scale their own programmes. Colin is at the forefront of Veracode’s product and
innovation strategy, particularly in helping ensure the challenges of DevOps are
met. Colin’s enthusiasm for the topic of AppSec and DevSecOps leads him to
speak in many public forums, podcasts and often in one of Veracode’s many
Prior to joining Veracode, Colin was originally an embedded systems developer
working on secure communications systems in South Africa. Colin has over 20
years of development and security expertise in the telecommunications,
consumer, medical, and financial service industries.
SynopsisWeb applications are entirely ubiquitous in the modern digital economy – there is not a business that doesn’t have a custom website and associated e-commerce web application. However the web application remains the most common attack vector used by cyber criminals attacking an organisation. The instances of exploits against the web application layer is on the increase, and as the recent massive breach at Equifax in the USA demonstrates the potential for damage is immense. The web applicationis truly the ‘keys to the kingdom’. In this talk I will discuss trends that we at Veracode are seeing globally in terms of attacks against web applications, and trends in the development technologies used to build web applications. I will cover the ways in which businesses can ensure that they protect their web applications from attack; covering aspects such as securing your Software Supply Chain, providing your developers with adequate training and incentives to code securely, and using best practices in secure coding. Finally I will cover how security vendors can adopt their technologies to ensure they are adopted into modern DevOps practices (ensuring we do achieve DevSecOps) and drive secure development as far left in the SDLC as possible.
Inria (Ex-W3C), Project co-ordinator of NEXTLEAP
Dr. Harry Halpin at Inria is the project co-ordinator of the NEXTLEAP (https://nextleap.eu) project to create decentralized secure messaging protocols and mix-networking systems resistant to traffic analysis even from a global passive adversary. Before joining Inria in 2016, he was a member of the W3C (World Wide Web Consortium) Team as part of CSAIL at MIT, where he led security standardization on the Web since 2012. He founded and led the Web Cryptography Working Group, which produced the widely-implemented Web Crypto API that works across all major browsers. He also started the Web Authentication Working Group to replace passwords with cryptographic authentication in co-ordination with the FIDO Alliance. He resigned in protest from the W3C after the W3C began standardization of DRM in the form of Encrypted Media Extensions, due to W3C’s lack of desire to defend security researchers against laws that restrict research on DRM.
György R. Rácz
IBM Security Business Unit Executive CEE
Gyorgy Racz leads the creation and formation of newly founded Security business unit in IBM Central and Eastern Europe. Responsible for the integrated security business including sales, software, SaaS solutions. Having more than 20 years of experience in Information technology, prior to his current role, he managed IBM’s Software services in the region and led Information Management business line and later the software channel sales. Based in Prague HQ, worked in Vienna and Budapest offices before.
SynopsisThis session will be updated soon
This session will be updated soon.
Global Security Advocate
As Global Security Advocate at Digital Guardian, Thomas plays a lead role in advising customers on their data protection activities against malicious parties. Thomas’ 25+ years background in IT includes varying roles from incident responder to security architect at fortune 500 company, vendors and consulting organizations.
Thomas is also an active participant in the InfoSec community not only as a member but also as director of Security BSides London, ISSA UK chapter board member and presenter at SANS DFIR EMEA, DeepSec, various BSides events and ISSA-UK.
SynopsisThreat Hunting refers to proactively and iteratively searching through networks or datasets to detect and respond to advanced threats that evade traditional rule- or signature-based security solutions. But what does that really mean? And what real impact does it have on the security team? Threat hunting looks at a mountain of security data already being produced daily by the traditional monitoring solutions such as netflow data, firewall events and logs. Now include end point data and the events to review explode exponentially. The claim, from various vendors, is that the additional data provides greater visibility but for whom. Traditional incident detection doesn't necessarily take into consideration the endpoint events. Building a threat hunting activity scoped to start with end point data can significantly change the game. This talk is a journey of how to dive into threat hunting and will cover the principals of threat hunting as a foundation while examining the challenges of working with large datasets that can be generated by end point data and analyse some of the tools claiming to ease this burden including machine learning.
Freelance technology journalist
Andrada is a freelance technology journalist trying to find stories nobody else is writing. Her stories feature people targeted in malware attacks, bug bounty hunters, IoT insecurity, and the history of technology in Eastern Europe.
She has written for WIRED, Vice Motherboard, ZDNet, The Outline, tech.eu and more.
She’s also news editor for ProFM radio station in Bucharest.
Warning: Invalid argument supplied for foreach() in /home/imworld/public_html/wp-content/themes/blankslate/tpl-speakers.php on line 264
Tarun Samtani,CISSP is the Group Cyber Security Advisor for Findel Plc, Express-Gifts (multi-channel retailer) and Findel Education. Tarun holds over 17+ years of experience across various sectors like Telecommunications, ISP’s, Financial Services, Gambling & Retail. Tarun has worked across UK, Europe, Asia & Middle East on different assignments.
He has a wealth of experience in Cyber Security and is passionate about securing business information landscape. During the course of his career Tarun has been involved in the strategy & planning, design, architecture and implementation of a significant number of information security programmes.
He has a passion for Cyber Security and enjoys sharing his experience. He also has a keen interest in helping out charities and non-profit board organisations fight cybercrime and is open to non-exec or board advisory positions. His specialisations include strategic board advisory, building roadmaps planning through delivery of security programmes including Security Culture, Data Security, GDPR and Data loss prevention, He regularly addresses global audience on these and other topics.
SynopsisIt is commonly said that staff are the weakest link to security but is it really? Or we have missed something? Computers process and transmit data and we have been patching them for last 20 odd years or longer but how about humans? This session will be all about how you turn your so called weakest link (the people) in to your strongest asset in the fight for cybercrime. Especially, with the new upcoming regulation GDPR it has become even more crucial.
Dr. Cristian IORDAN
Responsible for partnerships and cooperation
Having joined the Romanian Intelligence Service (SRI) in 2003, after various positions in the Service, dr. Cristian IORDAN manages the area of partnerships and cooperation in the National Cyberint Center since 2014. He holds a PhD in International Relations (2010).
SynopsisCybersecurity in Romania` intends to give a brief outlook of the Cybersecurity landscape in Romania, offering some insights on the cyber perspective of the Romanian Intelligence Service and, more precisely, the National Cyberint Center.
Lead Network Security - Solutions Architect
Cotiso spent over 15 years as a network security consultant (CCIE – Cisco Certified Internetwork Expert) and trainer (CCSI – Cisco Certified Systems Instructor) for various technology integrators and for various Fortune 500 companies in telco, automotive, banking and pharma industries.He has extensive experience designing, implementing and operating complex and scalable secure networks for large customers and has an in-depth experience with top Network Security vendors.
SynopsisThis session will be updated soon
Deputy General Director
Mircea Grigoraș is an experienced Cyber Security professional, with almost 6 years of experience in the investigation of cyber-attacks at national level and over 9 years working on Cyber Security issues altogether. He is Deputy General Director of CERT-RO since Jan. 2014, where he coordinates the reaction and response to cyber security incidents nationwide, the cooperation with other institutions dealing with cyber security response and investigation, as well as the cooperation with the private sector in identifying and mitigating cyber threats. He is member of several EU – level working groups and committees as well as international expert groups in the area of Network and Information Security and has participated as trainer in several European projects in the areas of Cyber Crime and Cyber security.
SynopsisThis session will be updated soon
EMEA Security Evangelist
As the EMEA Cyber Security Evangelist for Radware, Pascal helps execute the company’s thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of Information Technology and holds a degree in Civil Engineering from the Free University of Brussels. As part of the Radware Security Research team Pascal develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, did extensive research on Hajime and follows closely new developments of threats in the IoT space and the applications of AI in cyber security and hacking. Prior to Radware, Pascal was a consulting engineer for Juniper working with the largest EMEA cloud and service providers on their SDN/NFV and data center automation strategies. As an independent consultant, Pascal got skilled in several programming languages and designed industrial sensor networks, automated and developed PLC systems, and lead security infrastructure and software auditing projects. At the start of his career, he was a support engineer for IBM’s Parallel System Support Program on AIX and a regular teacher and presenter at global IBM conferences on the topics of AIX kernel development and Perl scripting.
SynopsisBrickerBot is the first fully autonomous Permanent Denial of Service (PDOS) botnet. Its mission: cleanse the internet from IoT botnets and purge it from any devices that might provide a platform for them. The author, which goes by the name of 'Janit0r' and likes to refer to himself as ‘The Doctor’, considers his project a form of "Internet Chemotherapy". While most botnets such as Mirai and Hajime are fighting a tireless war to conquer their share of IoT resources, BrickerBot uses only a handful of compromised IoT devices to create an autonomous sensor network that autonomously attacks infected devices. BrickerBot can be considered a vigilante, much like Hajime, but with far less devices held hostage and much more disastrous side effects and collateral damage. BrickerBot was responsible for taking down a US ISP earlier this year and more recently attributed the loss of internet connectivity in over 60,000 modems and routers in India. As IoT botnets are battling it out, what does it mean for your IoT devices? Do you actually care if your IP camera or router is enslaved and taking part in an army of bots which benefits its herders millions of USD by selling DDoS-as-a-Service packages? Maybe not... or at least not until your camera gets a visit from BrickerBot and renders it into a useless, shiny paperweight. Join to learn about the most common exploits and vulnerabilities in use by current IoT bots, the details on BrickerBot and how it senses and bricks compromised IoT devices.
Chairman, Cloud Security Alliance, Israel
Moshe Ferber is a recognized industry expert, popular public speaker and a notable figures in the Israeli innovation community, with over 20 years’ experience at various positions. Currently Ferber focuses on cloud security as entrepreneur and lecturer and promotes responsible cloud adoption by developing the next generation of cloud security best practices for the industry.