{"schedule_speakers":{"speakers":[{"id":79,"image":"/system/avatars/79/medium/aluc.png?1435776379","full_public_name":"Aluc","abstract":"$_: random hacker from Germany ","description":"/me hosting BerlinSides && \u028c\u0287\u02d9\u0254nl\u0250//:sd\u0287\u0287\u0265. Hacker as profession , around since a long time. \u01a8y\u0252wl\u0252 \u019a\u0258\u027f\u027fidl\u0258. p\u0281\u04e9\u0250\u029e!u\u0253 \u04e9\u0668\u04e9\u0281\u028e\u0287\u00b5!u\u0253","links":[{"url":"https://berlinsides.org","title":"BerlinSides"},{"url":"https://podcast.aluc.tv","title":"Aluc.TV"}],"events":[{"id":281,"guid":"c242e05e-0c08-434e-82b8-0b0f3bfa8b4d","title":"Possible effects from electromagnetic pollution of micro and millimeter waves","logo":null,"type":"lecture"}]},{"id":248,"image":"/system/avatars/248/medium/blahaj.jpg?1533283343","full_public_name":"Arnim Eijkhoudt","abstract":"Miscreant Puncher at KPN-CERT","description":"","links":[],"events":[{"id":278,"guid":"9cb74fcd-a633-4bec-bc2f-a86485b8fbbe","title":"That one time someone tried to blackmail KPN","logo":null,"type":"podium"}]},{"id":304,"image":null,"full_public_name":"Benjamin Lafois","abstract":"Benjamin Lafois is a Senior Managing Security Consultant with IBM X-Force Red based in France. He is an expert penetration tester. In addition to standard penetration tests (infrastructure, applications, reverse-engineering\u2026), Benjamin is also specialized in embedded systems ethical hacking (car-hacking, ATM, IoT\u2026) as well as industrial control systems. He has discovered multiple 0-day vulnerabilities during his multiple engagements for IBM all around the world.\r\nBenjamin is Offensive Security Certified Expert (OSCE) and Exploit Researcher and Advanced Penetration Tester (GXPN) certified. He has also been speaking at international conferences such as DefCon and BalCCon.","description":"","links":[],"events":[{"id":285,"guid":"8c1824a4-4133-40a0-9f65-60c23523a951","title":"Infotainment systems hacking","logo":null,"type":"lecture"}]},{"id":258,"image":"/system/avatars/258/medium/Head_Shot.jpg?1556947265","full_public_name":"Chris Kubecka","abstract":"Chris Kubecka is the founder & CEO of HypaSec. Group Leader for AOC, tasked with setting up digital security after the world\u2019s most devastating cyber warfare attack so far, the 2012 Shamoon attacks. Previously, establishing and leading the network and security operations, UK/EU GDPR Privacy Group, joint international intelligence team and Information Protection Group for Aramco Overseas covering EMEA (outside KSA) and South America, part of Saudi Aramco. USAF veteran of multiple humanitarian and combat missions as air crew with degrees in information technology and computer science. Based in northern Europe, is a member of the Cyber Senate, Artificial Intelligence, subject matter expert panellist and advisor for the European Council of Foreign Relations regarding post Brexit digital security and cyber warfare. An advisor and subject matter expert to several governments, industries on cyber security & incident response for cyber warfare, recognized expertise in financial, oil & gas, water, nuclear industrial digital security.","description":"Chris is the founder and CEO of HypaSec. Previously, Chris headed the Information Protection Group, network operations, security operations and joint-international intelligence team for the Aramco family. Helping to recover Aramco from a nation-state attack to implement digital security and reconnect international business operations. Responsible for all digital IT and ICS assets throughout the EMEA region (minus KSA) and Latin America. Subsequently, establishing and assisting global digital security teams, standards, security driven legal contracts for secure software development with third parties, the Aramco EU/UK Privacy group with internal and external council and computer emergency response teams. Chris has practical and strategic hands-on experience in several cyber warfare incidents. USAF Space Command, detecting and helping to halt the July 2009 Second Wave attacks from the DPKR against South Korea and helping to recover and reestablish international business operations after the world\u2019s most devastating cyber warfare attack, Shamoon in 2012. Expert advisor and panelist for several governments and parliaments. Author of several books, offensive security trainer, digital security course creator, recognized expert in several digital security fields including IT/IOT/ICS SCADA space, maritime, aviation, oil & gas, electric, water and nuclear.","links":[{"url":"https://youtu.be/WyMobr_TDSI","title":"How To Implement IT Security After A Cyber Meltdown"},{"url":"https://youtu.be/em1GObQAIOc","title":"How to Start a Cyber War: Lessons from Brussels -EU Cyber Warfare Exercises"}],"events":[{"id":283,"guid":"9357d2d8-5f5c-4696-a9c9-3fca3144a598","title":"The Road to Hell is Paved with Bad Passwords","logo":"/system/logos/283/medium/ISIS_50_million_dollars.jpeg?1556947614","type":"lecture"}]},{"id":289,"image":null,"full_public_name":"Dan O'Huiginn","abstract":"Dan writes code to understand the world, and occasonally to change it. He has <a href=\"https://qz.com/65290/germanys-offshore-money-and-the-hacker-who-helped-expose-it/\">revealed</a>, <a href=\"https://gijn.org/2014/02/25/yanukovychleaks-org-how-ukraine-journalists-are-making-history/\">enabled</a> Ukrainian journalists to publish a president's private papers,  documented the <a href=\"https://www.occrp.org/en/investigations/1905-croatia-shipped-arms-to-jordan\">arms trade</a>, and <a href=\"https://www.theguardian.com/politics/2003/feb/09/terrorism.iraq\">exposed</a> that a UK government 'intelligence' dossier was copied from the internet.\r\n","description":"","links":[],"events":[{"id":326,"guid":"816dd330-4c61-496b-a2a5-2b13b4750f28","title":"Generating Art With Neural Nets","logo":"/system/logos/326/medium/screenshot-2018-11-13-at-19-15-11.png?1561979445","type":"workshop"}]},{"id":275,"image":"/system/avatars/275/medium/london_bw.jpg?1565257420","full_public_name":"Dejan Strbad","abstract":"He craves for the challenge; wants to understand not only how but why.\r\n\r\nDejan is the CTO of Kraken (KrakenSystems) and Ascalia, with over 10 years of professional experience in a wide range of software development, SRE, Ops and systems architect roles.","description":"He is the main figure in supporting Nextuser\u2019s distributed high-load system spreading over 4 continents and helping their other clients tackle their technical challenges. Lately his focus is on building Ascalia, ICS for 21st century...\r\n\r\nHe is keen on building new companies and likes to exchange knowledge through meetups, workshops and conferences. He doesn\u2019t see his time as free time vs. working hours - it\u2019s all about the things he wants to do, whether they are of technical nature, or limited government and political transparency advocacy.\r\n","links":[{"url":"https://twitter.com/dstrbad","title":"Twitter"}],"events":[{"id":322,"guid":"337c1f11-7c7f-43fd-9495-314ee5e135e8","title":"Known and less known methods of user tracking ","logo":null,"type":""}]},{"id":300,"image":"/system/avatars/300/medium/avatar.png?1565185165","full_public_name":"Deso","abstract":"Deso is a professional pentester and a redteamer at the dutch telecom organization - KPN. Where the main focus areas are complex infrastructure assessments, product security and offensive simulations. Before this role, Deso started as a infosec consultant in a BIG4 company with hundreds of successful engagements around Europe.","description":"","links":[],"events":[{"id":278,"guid":"9cb74fcd-a633-4bec-bc2f-a86485b8fbbe","title":"That one time someone tried to blackmail KPN","logo":null,"type":"podium"}]},{"id":138,"image":"/system/avatars/138/medium/hettipic.jpeg?1472508917","full_public_name":"Hetti","abstract":"Technical Computer Science student from Vienna with a passion for IT Security and geeky stuff.","description":"He is one of the board members of the finest Viennese Hackspace <a href=\"https://metalab.at/\">Metalab</a>.\r\nIn his free time he enjoys travelling to community based IT Conferences.\r\nThe <a href=\"https://cryptoparty.at/\">Viennese Cryptoparty</a> is organized by him, where he also holds lectures and workshops about a broad range of IT Security & Privacy topics.\r\n\r\nYou can also find him at the  <a href=\"https://c3w.at/\">Chaos Computer Club Vienna (C3W)</a>.\r\nOn some weekends he is hunting flags with the successful academic CTF Team <a href=\"https://w0y.at/\">We_0wn_Y0u</a>.","links":[],"events":[{"id":295,"guid":"c89bca50-427f-48f9-a9c8-b600c613ac40","title":"Intro: BalCCon Beginner CTF","logo":null,"type":"lecture"}]},{"id":303,"image":"/system/avatars/303/medium/igorlukic.jpg?1566823483","full_public_name":"Igor Lukic","abstract":"Former-kid who used to hangout on Irc since 90s , current CEO of a Cybersecurity firm in Spain, founder of Spanish Hacking conference Hackron.","description":"","links":[],"events":[{"id":345,"guid":"40920e36-a96a-47cd-8eeb-cae7f1dd125e","title":"Lessons learned while Pentesting Travel Industry","logo":null,"type":"lecture"}]},{"id":238,"image":"/system/avatars/238/medium/igor_400x400.jpg?1531563686","full_public_name":"Igor Nikolic","abstract":"Hacker, makers, wannabe artist, academic and dad","description":"","links":[],"events":[{"id":340,"guid":"d3a5d8fc-277a-45c7-90de-27b6943dc700","title":"Into a  climate changed world: Uncharted Waters ","logo":null,"type":"lecture"}]},{"id":271,"image":null,"full_public_name":"Jaromir Horejsi","abstract":"Jaromir Horejsi is a threat researcher at Trend Micro. He specializes in hunting and reverse-engineering threats that target Windows and Linux. He has researched many types of threats over the course of his career, covering threats such as APTs, DDoS botnets, banking Trojans, click fraud and ransomware. He has successfully presented his research at RSAC, Virus Bulletin, FIRST, AVAR, Botconf and CARO.","description":"","links":[{"url":"https://twitter.com/JaromirHorejsi","title":"twitter"}],"events":[{"id":299,"guid":"90e677be-5631-4d7d-8606-199428967e39","title":"Looking through Muddy Waters: Insight into TTPs of a Middle Eastern threat actor","logo":null,"type":"other"}]},{"id":4,"image":null,"full_public_name":"Jelena Georgijevi\u0107 Krasojevic","abstract":"","description":"","links":[],"events":[{"id":276,"guid":"c5a27026-17a2-4f08-8e14-e35f71478466","title":"Opening","logo":null,"type":"lecture"}]},{"id":160,"image":"/system/avatars/160/medium/kk.png?1567678440","full_public_name":"Kirils Solovjovs","abstract":"<p>Mg. sc. comp. Kirils Solovjovs is Lead Researcher at <i><a href=\"http://possiblesecurity.com/\">Possible Security</a></i>, bug bounty hunter, IT policy activist, and the most visible white-hat hacker in Latvia having discovered and responsibly disclosed or reported multiple security vulnerabilities in information systems of both national and international significance. Kirils has developed the jailbreak tool for Mikrotik RouterOS. He has extensive experience in social engineering, penetration testing, network flow analysis, reverse engineering, and the legal dimension.</p>","description":"","links":[{"url":"https://kirils.org/","title":"Research page of Kirils Solovjovs"},{"url":"https://twitter.com/KirilsSolovjovs/","title":"Twitter"}],"events":[{"id":280,"guid":"4abb6ef0-87e7-47c0-b1e1-d1e7e0b8736c","title":"The leak of billions of passwords","logo":null,"type":"lecture"},{"id":293,"guid":"b3463d1e-39d2-4857-a2ce-3f32df19723c","title":"NOTH1NG T0 HID3","logo":null,"type":"lecture"}]},{"id":97,"image":null,"full_public_name":"Kost","abstract":"Vlatko Kosturjak is security consultant at Diverto where he helps clients to reach desired security level(s). He likes to break and build depending on the mood and time of day(night). Beside security, his passion is open and free software, so he authored many open source offensive tools and contributed code to various free security software like OpenVAS, Nmap and Metasploit.","description":"","links":[],"events":[{"id":339,"guid":"c3979c81-55c5-4690-843c-c74ace57f8bc","title":"Lazy Red","logo":null,"type":"lecture"}]},{"id":164,"image":"/system/avatars/164/medium/MacLemon_Logo_256.png?1561484254","full_public_name":"MacLemon","abstract":"Sysadmin by trade, strong supporter of anonymity and privacy, that odd person doing strange things with Macs, Hackspace and community affiliations: Chaos Computer Club Vienna; BSidesVienna, BSDStammtisch Wien, Metalab, Cocoaheads","description":"","links":[{"url":"https://maclemon.at/","title":"Something like a blog or so"},{"url":"https://chaos.social/@MacLemon","title":"Fediverse (Mastodon) - preferred"},{"url":"https://twitter.com/MacLemon","title":"Twitter"},{"url":"@MacLemon:maclemon.at","title":"Matrix"}],"events":[{"id":305,"guid":"d056efd5-4192-41ec-a9db-59602480b246","title":"Emoji, how do they even work?","logo":"/system/logos/305/medium/Emoji__how_do_they_even_work_.png?1563879879","type":"lecture"},{"id":306,"guid":"15afe985-7cf8-4592-a0ad-098b6ad4313d","title":"Karaoke Night","logo":"/system/logos/306/medium/Performous.png?1561484144","type":"meeting"}]},{"id":301,"image":"/system/avatars/301/medium/12.jpg?1567549699","full_public_name":"Matheus Albuquerque","abstract":"I'm a client-side architect \u2013 with an iOS and node.js background \u2013 currently working as a front-end engineer at STRV, a San Francisco-based strategy, design, and engineering company with clients across the whole America and Europe.","description":"My areas of interest/passions include JavaScript and compile-to-JS languages, architecture patterns, User Interface libraries & frameworks (like React), developer tooling and performance optimization. \r\n\r\nI also try to help as much as I can Brazilian local communities like The Developers Conference, Dev I/O Foundation, CocoaHeads Fortaleza,  and many others!","links":[{"url":"https://github.com/ythecombinator","title":"Github"},{"url":"https://twitter.com/ythecombinator","title":"Twitter"},{"url":"https://speakerdeck.com/ythecombinator","title":"Speakerdeck"},{"url":"https://www.ythecombinator.space","title":"Web"},{"url":"https://www.linkedin.com/in/ythecombinator","title":"LinkedIn"}],"events":[{"id":302,"guid":"2b57d7b7-7bc7-401f-857b-de3e334eefc5","title":"The day I reverse engineered a Gameboy Advance game","logo":"/system/logos/302/medium/Screen_Shot_2019-06-19_at_18.57.24.png?1560981468","type":"lecture"}]},{"id":237,"image":"/system/avatars/237/medium/Foto1_quadratisch_sw_1000.jpg?1563870904","full_public_name":"Max Mehl","abstract":"Max Mehl is Programme Manager at the Free Software Foundation Europe (FSFE) and coordinates initiatives in the areas of politics, public awareness and licensing. But he is also frequently to be found in the virtual server room of the FSFE. He sees Free Software as an important component to solve urgent technical and social problems. Every day, he is fascinated how many advantages software freedom brings for different aspects - from ethics to politics and economy to security technology.","description":"","links":[{"url":"https://fsfe.org/about/mehl/","title":"FSFE Profile"},{"url":"https://mehl.mx","title":"Personal homepage"}],"events":[{"id":325,"guid":"306ff682-499d-4379-995f-7b0b88728bd8","title":"No IT security without Free Software","logo":"/system/logos/325/medium/cityhall-code-001.v01.jpg?1561975205","type":"lecture"}]},{"id":74,"image":null,"full_public_name":"Milan Gabor","abstract":"Milan Gabor is a Founder and CEO of Viris, Slovenian company specialized in information security. He is security professional, pen-tester and researcher. ","description":"Milan is a distinguished and popular speaker on information security. He has previously been invited to speak at various events at different IT conferences in Slovenia and loves to talk to IT students at different Universities. He also leads teaches ethical hacking. He is always on a hunt for new and uncovered things and he really loves and enjoys his job.\r\n\r\nHe organized big number of different workshops and presentations around the world. Lately he has been presenting at this conferences:\r\n \r\n\u2022         Conference Hackito Ergo Sum 2014, France\r\n\u2022         Conference OTS 2014, Slovenia\r\n\u2022         Conference BIT\u2019s 3rd Annual World Congress of InfoTech 2014, China\r\n\u2022         Conference BSidesLV 2014, USA\r\n\u2022         Conference DEF CON, Workshop Wall of Sheep 2014, USA\r\n\u2022         Conference BalCCon 2014, Republic of Serbia\r\n\u2022         Conference Hacktivity 2014, Hungary\r\n\u2022         Conference GrrCON 2014, USA\r\n\u2022         Conference DeepSec 2014, Austria\r\n\r\nHe held this workshops:\r\n\u2022         Housing Slovenia (6 times -  Ethical hacking workshop 5 days each)\r\n\u2022         Palsit Slovenia (Ethical hacking 5 days workshops)\r\n\u2022         Hacking mobile applications (BSides Ljubljana (2015), OTS conference Maribor (2015), Hacktivity conference Budapest (2014))\r\n\r\n","links":[],"events":[{"id":330,"guid":"e63bc379-c826-48ee-b8b0-353d6b365efd","title":"HID Apocalipse is here!","logo":null,"type":"lecture"}]},{"id":279,"image":"/system/avatars/279/medium/avatartwitter.jpg?1561549779","full_public_name":"Milos Radic","abstract":"Security and infrastructure engineer. In love with security, automation and infrastructure as code concept. ","description":"Milo\u0161 Radi\u0107 (1990) is Senior security and infrastructure engineer  coming from  DevOps, Security and telecommunication industry.  Found and reported more than 100 severe vulnerabilities in apps, on servers and in information systems in big tech companies, banks, governmental organisations, blockchain projects, and on the darknet.  Member of eSigurnost, Serbian non-profit association of ICT professionals  aiming to raise awareness around significance of infosec as well as high tech crime.\r\nYou can find me on Twitter: @developPepper","links":[],"events":[{"id":329,"guid":"57379c4b-89ea-42dd-a7d2-76fb0ef41b4a","title":"DevSecOps as Culture & Philosophy","logo":null,"type":"lightning_talk"}]},{"id":256,"image":"/system/avatars/256/medium/1811111-hal-9000-1155p_a6911350a03c931077af0ec13fbdc8ef.jpg?1568042390","full_public_name":"Mr.Gadget","abstract":"Passionate robotics engineer, maker and tinkerer. ","description":"","links":[],"events":[{"id":307,"guid":"9998fd54-982d-4a01-9879-4bff20f99360","title":"Eyes for Robots","logo":"/system/logos/307/medium/hqdefault.jpg?1561632049","type":"lecture"}]},{"id":264,"image":"/system/avatars/264/medium/NikolaLuburic.jpg?1559548835","full_public_name":"Nikola Luburi\u0107","abstract":"My passion is teaching, and my mission is to cure an ailment that affects many students - apathy towards learning. My strategy for combating this affliction includes the merger of experience obtained from the industry, theory learned through scientific research, and teaching methods selected through analysis and experiments. The ultimate goal is to create a fun, relaxed environment in which useful information can be obtained, and critical thinking can be developed.","description":"My work is the synthesis of a three-pronged background, which includes:\r\n 1) The experience I've acquired teaching a university course on secure software engineering,\r\n 2) The research I\u2019ve conducted as part of my Ph.D. studies, covering the security development lifecycle,\r\n 3) The work I\u2019ve done as a security advisor for a prominent software vendor.\r\n\r\nFrom the start of my career as a teaching assistant, I have held to the principle that how something is taught is equally important as what is taught. Over the years I have experimented with different teaching approaches, examining gamification (inspired by board games and tabletop RPG games), e-learning, case study analysis, and the hybrid-flipped classroom. My primary course covers secure software engineering, where I have developed a set of mature learning objectives as a result of my experience in the industry and as a scientific researcher.\r\n\r\nAs part of my Ph.D., I have studied the different secure software engineering methodologies and practices, covering both standard-defined processes and industry-proven methods. My narrow research focus covers the intersection of security requirements engineering and secure design construction, particularly threat modeling and security design analysis. I have published several papers, most notably a methodology for training software engineers the practice of security design analysis.\r\n\r\nThrough my work at Schneider Electric DMS NS, I have performed threat modeling and security design analysis on several modules of a complex software system for energy management and have taken part in dozens of security analysis activities, examining tools, APIs, and 3rd party components. Currently, my primary focus is on introducing the security development lifecycle, as defined by IEC 62443-4-1, to the organization.\r\n\r\nBy combining the different skillsets developed through my background, I have focused my expertise towards performing and teaching others to conduct various software security practices, dedicated to enhancing the security posture of a software system efficiently and measurably.","links":[{"url":"https://www.linkedin.com/in/nikola-luburic/","title":"LinkedIn"}],"events":[{"id":290,"guid":"489b5bb6-0833-468a-9db4-419fcec547a3","title":"Secure Design Principles","logo":"/system/logos/290/medium/logo.png?1559550780","type":"lecture"}]},{"id":292,"image":"/system/avatars/292/medium/PhilippKrenn2.jpg?1562024879","full_public_name":"Philipp Krenn","abstract":"Philipp lives to demo interesting technology. Having worked as a web, infrastructure, and database engineer for over ten years, Philipp is now working as a developer advocate at Elastic \u2014 the company behind the open source Elastic Stack consisting of Elasticsearch, Kibana, Beats, and Logstash. Based in Vienna, Austria, he is constantly traveling Europe and beyond to speak and discuss open source software, search, databases, infrastructure, and security.","description":"","links":[{"url":"https://twitter.com/xeraa","title":"Twitter"}],"events":[{"id":334,"guid":"36583196-1f22-4edb-b870-9362ab770cb0","title":"seccomp \u2014 Your Next Layer of Defence","logo":null,"type":"lecture"}]},{"id":282,"image":"/system/avatars/282/medium/photo_3.jpg?1561709670","full_public_name":"Rafal Leszko","abstract":"Cloud Software Engineer @ Hazelcast","description":"Cloud software engineer at Hazelcast, author of the book \"Continuous Delivery with Docker and Jenkins\", trainer, and conference speaker. He specializes in Java development, Cloud environments, and Continuous Delivery. Former employee in a number of companies and scientific organizations: Google, CERN, AGH University, and more.","links":[],"events":[{"id":308,"guid":"8093040e-ab7b-4bd8-b37c-a6027d9e1ad8","title":"Where is my cache? Architectural patterns for caching microservices by example","logo":null,"type":"lecture"}]},{"id":78,"image":"/system/avatars/78/medium/avatar.png?1563742290","full_public_name":"Robert Simmons","abstract":"Robert Simmons is an independent malware researcher. His expertise is using automation and open source software to improve information security.","description":"Robert Simmons is an independent malware researcher. With an expertise in building automated malware analysis systems based on open source tools, he has been tracking malware and phishing attacks and picking them apart for years. Robert has spoken on malware analysis at many of the top security conferences including DEFCON, HOPE, botconf, and DerbyCon among others.\r\n\r\nRobert, also known as Utkonos, has a background in biology, linguistics, and Russian area studies. He has lived extensively in Russia and Ukraine and has been known to swear profusely and constantly in Russian.","links":[],"events":[{"id":324,"guid":"9f8714eb-3935-4439-a1f9-292403b2e1c2","title":"Reversing Golang Malware","logo":null,"type":"lecture"}]},{"id":273,"image":"/system/avatars/273/medium/profile.png?1560888882","full_public_name":"Sam Lanning","abstract":"Sam has worked for Semmle since 2014, both as a full-time developer, and developer advocate. His interests include vulnerability research, privacy, security and cryptography, having previously contributed to Signal, among other open source projects.","description":"Sam started working at Semmle in October 2014, after deciding to drop out of his Masters at Oxford University after having completed his undergraduate Computer Science degree there. Sam was the first full-time developer for Semmle\u2019s LGTM platform, and worked on it for over 3 years before becoming a developer advocate. Sam\u2019s has been an active member of the security and privacy community for a while, with a particular interest in vulnerability research, cryptography and peer-to-peer networks, having previously contributed to Signal\u2019s Android and Desktop clients, among other open source projects. Most recently, in his free time he\u2019s been working on an open source project that ties together music and lighting.","links":[{"url":"https://twitter.com/samlanning","title":"Twitter"}],"events":[{"id":300,"guid":"41c27498-1f72-44f8-ac70-8bd8c20104a9","title":"No More Whack-a-Mole: How to Find and Prevent Entire Classes of Security Vulnerabilities","logo":null,"type":"lecture"}]},{"id":299,"image":null,"full_public_name":"Senad Aruc","abstract":"Seasoned cyber security professional with more than 10-years experience in: Incident management, CSOC and MSSP experience, IT Security, IDS & IPS, SIEM, Network and Digital Forensics, Malware Analyses, ISMS-RISK management, Ethical Hacking, Vulnerability Management, Anti Fraud & Phishing, Drop zone and Bot-Net interception. Skills include written & verbal communications in 6 different languages. Taking leadership role with focus on technical design, support & troubleshooting of networking & security solutions.","description":"Senad have a deep knowledge of effective cyber security in fields like Incident response and management,\u00a024/7\u00a0Security operations experience, IT Security, IDS and IPS solutions, SIEM solutions, Network Forensics, Malware Analyses, ISMS-RISK management, Ethical Hacking, Vulnerability Management, Anti Fraud and Cyber Security. He includes 15 years of serving in vital positions, notably Consulting Cybersecurity Engineer - Advanced Threats Group at Cisco, Principal Advisor, SOC Senior Lead, Senior Security Specialist and Security Consultant with organizations such as UL-Underwriters Laboratories, ServiceNOW Inc BV, Reply / Communication Valley S.p.a and DfLabs S.r.l. Senad's educational background covers multiple subjects of study and learning about modern developments in the areas of organizational leadership, cybersecurity and information security holding the following certificates; Advanced Infrastructure Hacking \u2013 BlackHat Edition, SANS SEC511- Continuous Monitoring & Security Operations, Incident Response - Black Hat Edition, Mandiant Redline Training\u2013 Mandiant, CEH - Ethical Hacking and Countermeasures (CEHv7), ISMS - MASTER (PECB), Certified Risk Manager iso27005 (RABQSA) Veridion, Lead Implementer iso27001 (PECB), Lead Auditor iso27001 (PECB). He published more than 20 research articles focusing on botnets and malware reasearch. Skills include written and verbal communications in 6 different languages.\r\n\r\nPUBLICATIONS\r\nRevealing Unique MitB Builder C&C Server - Awareness publication\u20192015\r\nNAS Botnet Revealed - Bluekaizen magazine\u20192015\r\nInside Cryptolocker C&C server \u2013 eForensics magazine\u20192014\r\nAre 2 factor authentications enough to protect your money? \u2013 eForensics magazine\u20192014 Kins origin malware acting like a Real E-banking web app\u2013 Awareness publication\u20192014 Infostealer Botnet Reveal \u2013 Awareness publication\u20192014\r\nState of ART Phishing Attack stealing 50K Credit Cards Reveal \u2013Awareness publication\u20192014 One shot eight banks \u2013 Awareness publication\u20192014\r\nTarget List of Hesper-BOT Malware \u2013 Awareness publication\u20192014\r\nPassword cracking: proving your login. Password Cracking - Hakin9 magazine\u20192013\r\nTime to alert Spar Kasse Bank Macedonia - Awareness disclosure\u20192013 Simple hack into web server of Customs of MK- Awareness disclosure\u20192013 Information security awareness at RM- Awareness disclosure\u20192012\r\nI discovered a new way of Sim Carrier unlock\u20192012\r\nWeb Site Count 126 can be HACKED - Awareness disclosure\u20192010 Interview for iPhone hack and security at www.kirilica.com.mk \u20182010\r\nI managed to hack the iPhone with sim-clone method\u20192007\r\n\u2022 Full PDF version of my research publications: http://goo.gl/MHzIvC\r\n","links":[{"url":"https://www.linkedin.com/in/senadaruc","title":"Linkedin"},{"url":"https://twitter.com/senadaruc","title":"Twitter"}],"events":[{"id":343,"guid":"9ca90c22-d729-4c3b-b4e6-616151ca6415","title":"Busting Advance Botnets","logo":null,"type":"lecture"},{"id":344,"guid":"f8770978-8cbb-4e69-b70e-b684c7f86cf8","title":"Threat Hunting Workshop ","logo":null,"type":"workshop"}]},{"id":263,"image":null,"full_public_name":"Stevan Gostoji\u0107","abstract":"Stevan Gostoji\u0107 is an associate professor at Faculty of Technical Sciences, University of Novi Sad. He is the head of the Digital Forensics Laboratory and a court-appointed IT expert witness.","description":"","links":[],"events":[{"id":289,"guid":"0c883cb7-3632-4680-84a9-4cdf63a3237c","title":"Digital (Anti-)Forensics","logo":null,"type":"lecture"}]},{"id":199,"image":null,"full_public_name":"Tanoy \"NoTTY\" Bose","abstract":"Tanoy Bose (handle n0tty - pronounced \"No TTY\") is a geek who works as a security researcher at xen1thlabs. An experienced security practitioner, he has a few security hall of fames, CVEs and CTF wins. He has also been awarded by the Prime Minister of India for winning Global Cyber Challenge Scada CTF. In particular he enjoys finding vulnerabilities in core systems used by modern networks, such as infrastructure management stacks and defensive tools system administrators rely on.","description":"","links":[{"url":"https://twitter.com/TanoyBose","title":"Twitter"}],"events":[{"id":315,"guid":"1ee52d6e-a0b1-4230-9467-04c333828a0e","title":"Network Access Uncontrolled","logo":null,"type":"lecture"}]},{"id":170,"image":null,"full_public_name":"Tonimir Kisasondi","abstract":"Security Researcher from Croatia","description":"Tonimir Ki\u0161asondi is the founder of Oru (www.oru.hr), a boutique information security consultancy from Vara\u017edin, Croatia. In his spare time, he\u2019s involved with the OWASP project where he leads the Croatia chapter and contributes to various open source tools. His professional and research area of interest is security architecture, application security, security testing/analysis and applied cryptography.","links":[],"events":[{"id":342,"guid":"ccd2d489-17c4-4e6b-a842-1683618f3e01","title":"Application security screw-ups, vintage of 2019","logo":null,"type":""}]},{"id":293,"image":"/system/avatars/293/medium/th-dots.jpg?1562099098","full_public_name":"Trammell Hudson","abstract":"I take things apart.","description":"","links":[{"url":"https://trmm.net/","title":"trmm.net"}],"events":[{"id":338,"guid":"6a9a7bc3-d3b1-44a7-aaa8-efe214110464","title":"spispy: Open source SPI flash emulation","logo":"/system/logos/338/medium/48104848193_51977da875_k_(1).jpg?1562099201","type":"lecture"}]},{"id":232,"image":"/system/avatars/232/medium/Thecount.png?1529312118","full_public_name":"Vanja","abstract":"Vanja Svajcer is Technical Leader at Cisco Talos Threat Intelligence organisation. ","description":"Vanja Svajcer works as a Technical Leader at Cisco Talos Threat Intelligence organisation. \r\n\r\nHe is a security researcher with more than 15 years of experience in malware research and detection development. Prior to joining Talos, Vanja worked for SophosLabs and led a Security Research Team at Hewlett Packard Enterprise. \r\n\r\nVanja enjoys tinkering with automated analysis systems, reversing binaries and Android malware. He thinks time spent scraping telemetry data for signs of new attacks is well worth the effort.\r\n\r\nIn his free time, he is trying to improve his acoustic guitar skills and often plays basketball, which at his age is not a recommended activity.","links":[],"events":[{"id":314,"guid":"8c29b53b-b8d3-4ccc-bfde-18f0e71f3bb2","title":"Legitimate tools or weapons of mass compromise?","logo":null,"type":"lecture"}]},{"id":182,"image":null,"full_public_name":"Vladan Nikolic","abstract":"Senior penetration tester, specialized in SCADA, vehicles, mobile and embedded devices security.","description":"<b>Vladan Nikoli\u0107</b> has been in the IT industry for more than 20 years as an engineer, system administrator and security expert. Experience includes different infrastructure technologies (networking, linux and windows), compliance with standards (SoX, ISO27001, PCI), software development, reverse engineering, penetration testing, application and wireless security, and a rich knowledge of digital electronics enabling him to successfully tackle most complex engagements. Since 2008 Vladan has worked as security consultant for IBM Professional Security Services (now X-Force Red) taking part in various security related projects, mostly in energy, pharmaceutical, telco and finance sectors.  He holds multiple industry certificates including Certified Information Systems Security Professional (CISSP) from (ISC)2, and Offensive Security Certified Expert (OSCE). He was presenter at numerous security conferences, latest of them being 2017 Recon held in Brussels.","links":[],"events":[{"id":285,"guid":"8c1824a4-4133-40a0-9f65-60c23523a951","title":"Infotainment systems hacking","logo":null,"type":"lecture"}]},{"id":200,"image":null,"full_public_name":"Zoz","abstract":"Zoz is a hacker, robotics engineer and pyrotechnician with broad interests in software, hardware and security applications. He has taught subjects including robotics, digital fabrication, cybersecurity and ethical hacking at top international universities and as a private industry consultant. He has hosted and appeared on numerous international television shows including Prototype This!, Time Warp and RoboNationTV, and speaks frequently at prominent security and hacking conferences including DEF CON, HackCon and BruCon. He believes that your digital data is part of your human right to privacy and is yours to secure or destroy at will.\r\n","description":"","links":[],"events":[{"id":310,"guid":"3dcf9484-6021-45e7-a5b4-2258055d51b4","title":"Ultimate Mobile OPSEC","logo":null,"type":"lecture"},{"id":312,"guid":"f7b9f9e3-547b-452c-b175-70a31a4aa584","title":"Lock Picking 101/102","logo":null,"type":"lecture"}]},{"id":87,"image":null,"full_public_name":"abakalov","abstract":"","description":"","links":[{"url":"http://mechanicalmind.org/","title":"Aleksandar Bakalov's Web Log"}],"events":[{"id":323,"guid":"9c2ec2fc-397e-46e8-b7aa-d6378f28ea18","title":"Amateur radio activity days","logo":"/system/logos/323/medium/logo-retro.jpg?1561927064","type":"meeting"}]},{"id":298,"image":null,"full_public_name":"benadski","abstract":"","description":"","links":[],"events":[{"id":341,"guid":"e33d0742-d991-4c25-8bb7-19cf3c47efbd","title":"Hebocon","logo":"/system/logos/341/medium/images.jpg?1564479294","type":"workshop"}]},{"id":233,"image":null,"full_public_name":"bojanz","abstract":"Penetration testing team leader in INFIGO IS. SANS Internet Storm Center handler and SANS instructor (SEC542).","description":"Bojan graduated in 1998 at the Faculty of Electrical Engineering and Computing, University of Zagreb. After graduation he started working in the LSS group as an associate on information security projects.\r\n\r\nAt the Faculty of Electrical Engineering and Computing, he managed and actively participated in numerous projects related to computer network planning and information systems security testing and assessment. Bojan performed forensic analysis for the Croatian CERT and was a member of several CERT IRTs (Incident Response Team). He is a long-standing author for Bug and Mre\u017e@ computer magazines and has his own security column in the magazine Mre\u017e@. He is also the author of the book \u201eWhat are the viruses and how they work?\u201c, published by SysPrint.\r\n\r\nSince 2003, he worked at the University of Auckland, New Zealand, as information security specialist, where he actively participated as IT/Security architect in numerous enterprise projects. His duties included handling of new security technologies introduced to the University as well as being a project member responsible for security on all enterprise projects. \r\n\r\nIn 2005 he became one of the handlers of SANS Internet Storm Center (ISC), a voluntary organization with a goal to detect security problems, analyze risks and distribute technical information. ISC is the most often quoted source of security information in the world today. \r\nSince 2006 Bojan works in INFIGO IS as a senior information security consultant.\r\n\r\nBojan is also teaching two SANS courses, including the most popular SEC504 (Hacker Tools, Techniques, Exploits, and Incident Handling) and SEC542 (Web App Penetration Testing and Ethical Hacking).\r\n","links":[],"events":[{"id":301,"guid":"6a5312cb-bd92-4050-8d97-a8010e1081e8","title":"A BEAST and a POODLE celebrating SWEET32","logo":null,"type":"lecture"}]},{"id":195,"image":"/system/avatars/195/medium/19420399_1422479404479921_1522571404896470715_n.jpg?1498499737","full_public_name":"cluosh","abstract":"Student at TU Wien, research assistant at SBA Research. Playing CTFs with We_0wn_Y0u CTF team. ","description":"","links":[],"events":[{"id":295,"guid":"c89bca50-427f-48f9-a9c8-b600c613ac40","title":"Intro: BalCCon Beginner CTF","logo":null,"type":"lecture"}]},{"id":261,"image":"/system/avatars/261/medium/dpavlin.jpg?1559374201","full_public_name":"dpavlin","abstract":"Geek with blog at https://blog.rot13.org/","description":"","links":[{"url":"https://blog.rot13.org","title":"blog"}],"events":[{"id":287,"guid":"f35a5b15-82d9-4d08-8eae-b3c96446c5a2","title":"So, is Android a Linux?","logo":null,"type":"lecture"}]},{"id":163,"image":"/system/avatars/163/medium/161005_105.jpg?1532857359","full_public_name":"leyrer","abstract":"Providing IT-Wizardry for money for over 20 years. Boldly managing systems where angels fear to tread. Easily distracted by everything shiny, blinky and new. ","description":"","links":[{"url":"https://martin.leyrer.priv.at","title":"Blog"},{"url":"https://twitter.com/leyrer","title":"Twitter"}],"events":[{"id":335,"guid":"e76ca9ac-1054-478a-95bf-41b3bb45d940","title":"Workshop: Kali Linux and Metasploit for Beginners","logo":"/system/logos/335/medium/proxy.duckduckgo.com.jpg?1562060306","type":"workshop"},{"id":337,"guid":"274d04eb-e31e-42e0-85ec-0209d3857504","title":"Modern Commandline-Tools (Final Last Version)","logo":"/system/logos/337/medium/wargames.gif?1562060977","type":"lecture"}]},{"id":274,"image":"/system/avatars/274/medium/46949332_1806803356097011_6179554118911131648_n.jpg?1560981129","full_public_name":"macabeus","abstract":"Hello! I'm Bruno Macabeus, and I work at Loggi, on the growth team. I'm living at S\u00e3o Paulo, Brazil.","description":"I love open source, because I first learned to program on open source communities. Nowadays, whenever I contribute to open source projects, I feel happy for recontributing for the help I received.\r\n\r\nI like to create open source projects and to collaborate on other community projects as well. For example, I was one of the top contributors in one of Rocket.Chat's native iOS app releases. I have collaborated on open source projects since I was 15, when I made my first OpenKore commit.\r\n\r\nOn this subject, I have a blog where I write what I'm studying and share my past talks. I like to write blogposts and give talks because this is a good way for me to learn and teach.\r\n\r\nI've helped the organization of local meetups in the city I used to live (e.g. CocoaHeads Fortaleza or Python User Group Fortaleza) in many areas which included presenting tech talks and gathering speakers and sponsors.","links":[{"url":"https://github.com/macabeus","title":"github"},{"url":"http://macalogs.com.br","title":"blog"},{"url":"http://macalogs.com.br/pages/talks.html","title":"previous talks"}],"events":[{"id":302,"guid":"2b57d7b7-7bc7-401f-857b-de3e334eefc5","title":"The day I reverse engineered a Gameboy Advance game","logo":"/system/logos/302/medium/Screen_Shot_2019-06-19_at_18.57.24.png?1560981468","type":"lecture"}]},{"id":270,"image":null,"full_public_name":"pcdog","abstract":"","description":"","links":[],"events":[{"id":297,"guid":"46d99e09-f718-4f1b-a357-2adb1f8de903","title":"RPKI Validation","logo":null,"type":"lecture"},{"id":298,"guid":"2fd7878f-c5a1-455b-9a3a-a6e81c727af6","title":"BGP Workshop","logo":null,"type":"workshop"}]},{"id":260,"image":"/system/avatars/260/medium/MINI.jpg?1566990544","full_public_name":"\u041c\u0430\u0440\u043a\u043e \u041a\u0430\u0436\u0438\u045b","abstract":"Marko Ka\u017ei\u0107 is the founder of Zamphyr, free school of technology. Pioneer of Free Education, and Education 2.0 movement.","description":"Marko Ka\u017ei\u0107 is the founder of Zamphyr, free school of technology. Pioneer of Free Education, and Education 2.0 movement. Works on moonshots and invests in extraordinary humans. Gave up consulting startups and venture capital funds from Silicon Valley to Hong Kong, returned to Serbia to work on the vision of crowdsourced, universal school accessible to entire humanity. As a free culture and free education activist advocates for a fundamental shift of paradigm in education and for a post-scarcity society.","links":[],"events":[{"id":286,"guid":"75b8aeb7-8567-44dd-b6b4-929d46fb8cd5","title":"Building the School 2.0","logo":null,"type":"lecture"}]}]}}