Hi Folks, there is only ONE DAY LEFT until #Hacktivity2021 – The IT Security Festival in CEE and we would like to provide some important information for you regarding the conference.
Hi Folks, there is only ONE DAY LEFT until #Hacktivity2021 – The IT Security Festival in CEE and we would like to provide some important information for you regarding the conference.
Hi Folks, our partner in crime, Binary Confidence will prepare a special blue-team capture the flag (CTF) online competition exclusively for the participants of #Hacktivity2021.
Hi Folks, we are thrilled to announce the official program of #Hacktivity2021! Just like last year, we have received tons of excellent papers and the Program Committee had a hard time selecting the best of them. This time we’ll have 43 speakers from 14 countries so the international atmosphere and the professional content is guaranteed as always.
Hi Folks, this is just a quick reminder, that there are only 2 DAYS LEFT of the EARLY BIRD purchasing period for #Hacktivity2021.
We are thrilled to announce that on 8th October 2021, we are going to organize #Hacktivity2021 as a traditional on-site event again!
In 2020 coronavirus means a huge challenge to the world, and the Hacktivity cybersecurity conference team would like to thank the public sector for their great work in the frontline by expanding the Hackademy program.
A 2020-as évben a koronavírus járvány óriási kihívás elé állította a világot, a Hacktivity kiberbiztonsági konferencia csapata pedig szeretné meghálálni a közszférában dolgozók helytállását és áldozatos munkáját a Hackademy program kibővítésével.
Hi Folks, we are happy to announce the comprehensive workshop sessions for #Hacktivity2020! This year we are offering 7 different, comprehensive courses in 2 parallel tracks. There will be 2, 4 and even 8 hours long sessions during the first 2 days of the conference.
Hi Folks, as you all know, we are facing difficult times and due to the uncertain international situation, we have made a decision to move #Hacktivity2020 into the virtual space. So clear your calendars for 8-10 October 2020 and make sure to take part! Good news is that you can do it from all over the world!
Hi Folks, we are happy to announce a new sweepstake with a valuable prize! What is it? A training coupon worth of 100 000 HUF that can be used to take part in any of our partner, Masterfield’s IT-related trainings.
Hi Folks, we are happy to announce that despite the COVID-19 coronavirus #Hacktivity2020 is still going to happen!
Hi Folks, we are thrilled to announce the winner of the #Hacktivity2019 Badge Contest in December! Dhiraj Mishra, one of our workshop leaders in 2019 has made the best egg for the gadget in December! Congratulations to him! We will launch a new contest for the #Hacktivity2019 badge soon!
Hi Folks, we are happy to announce, that the OFFICIAL CALL FOR PAPERS has been launched for the next Hacktivity Conference in 2020.
Hi Folks, we are thrilled to announce that the presentation videos from #Hacktivity2019 have been uploaded to our official Youtube channel and available for watching.
Hi Folks, we are happy to announce a series of challenges regarding the #Hacktivity2019 Electronic Badge!
We would like to announce a new monthly challenge from now on until the next Hacktivity conference. We are looking forward to the most imaginative, interesting, and useful applications and developments for the #Hacktivity2019 Badge.
Hi Folks, #Hacktivity2019 was a blast and we would like to thank all of our speakers, sponsors, exhibitors, partners, and most importantly our visitors to come and make it the best conference, we’ve had so far!
Hi Folks, if you have any questions, or ideas regarding the #Hacktivity2019 Badge, we have created a community space for you at Reddit.
There is only ONE DAY LEFT until #Hacktivity2019 – The IT Security Festival in CEE and we would like to provide some important information for you regarding the conference.
Hi Folks! If you want to take part in one or more workshop sessions at #Hacktivity2019, please make sure to register yourself a seat!
Hi Folks, there is only ONE WEEK LEFT until the online ticket sales ends for #Hacktivity2019, meaning that we are closing the ticket selling page at midnight, on 23rd October.
Hi Folks, we are glad to announce that the CTF game powered by Avatao is closed and we have the winners who can enter #Hacktivity2019 for free!
We have developed a system that discovers 0day vulnerabilities automatically.
Hi Folks, We are glad to announce, that our partner in crime, Avatao has developed another great CAPTURE THE FLAG GAME for #Hacktivity2019. Participants with the best 3 results will WIN A FREE TICKET for the conference, and we also distribute one ticket among the contestants.
Hi Folks, #Hacktivity2019 is coming in 45 days and we would like to highlight some major program elements of the conference for you.
Hi Folks, as you might already know it, we provide 3 DAYS LONG COMPREHENSIVE TRAINING SESSIONS right before #Hacktivity2019 IT Security Festival. We are bringing the best trainers to create an opportunity for IT-professionals to deepen their knowledge and develop their skills.
Hi Folks, we are thrilled to announce the official program of #Hacktivity2019! Just like last year, we have received tons of excellent papers and the Program Committee had a hard time selecting the best of them. This time we’ll have 46 speakers from 16 countries so the international atmosphere and the professional content is guaranteed.
Hi Folks, we are excited to launch the CALL FOR IDEAS for #Hacktivity2019! This year we are offering free entry to people who are willing to share their knowledge/techniques/tools with the IT security community.
Hi Folks, we are thrilled to announce the keynote speakers for #Hacktivity2019 and some of the presentations/workshop sessions for the conference as well!
Hi Folks, we are happy to inform you that the first 3 sessions of #Hacktivity2019 Training has been published and we also launched the EARLY BIRD ticket purchasing period for them.
After the successful first Hacktivity badge in 2018, organizers of the conference have reached huge step forward: thanks to the Cyber Risk Services team of Deloitte Hungary, EVERY TICKET BUYER will receive a cool electronic hardware-hacking badge!
Hi Folks, we are happy to inform you, that EARLY BIRD tickets are available from today! If you want to take part in #Hacktivity2019 with 10% discount, do not waste any time, and get your ticket now! The early bird purchasing period ends on 15th June 2019.
Hi Folks, we are thrilled to launch the new website for #Hacktivity2019! The last version was not the best, and we received a lot of comments about it, so we decided to build a brand new page for the 16th edition of our conference that is much faster and fully responsive. Hope you like it. 🙂
Hi Folks, we are officially launching the Call For Papers for #Hacktivity2019! If you want to be a presenter this is your chance to get on the schedule. We cannot wait to receive all the exciting papers! The deadline for your submissions to be sent is 15th July.
Hi Folks! First of all, we would like to THANK YOU for coming to #Hacktivity2018! It was a huge success with a 94% participation rate & we had a blast, as always. Good news is that the videos of the presentations finally have been uploaded to our official YouTube Channel.
The team of Hacktivity is proudly supporting the Hungarian IT Security Community with its HACKADEMY Scholarship Programme. The conference has 9 higher education institutions as a partner so far.
Hacktivity is a very impressive conference and it’s definitely one of my favourite events in the world.
I really like the atmosphere of Hacktivity, and it’s great that the organizers are supporting students as well.
Hacktivity has a really good cost/benefit ratio, the quality of the talks is really good in international comparison.
Hacktivity provides great opportunity for social interaction with people who have similar interest in IT security.
I think the range of speakers is very impressive, with a very good mix of local and foreign cybersecurity professionals.
Hacktivity has a great tradition and I’ve met a lot of brilliant people around here. I’m super happy with this event.
Hacktivity is a very special opportunity to get to know people in the cybersecurity community of Hungary.
Short biography:
A well-known computer magazine once wrote that Tobias Schrödel is the “first IT-comedian”. And really, he explains technical vulnerabilities and correlations in a way everybody can understand while not letting the fun miss out. As a qualified IT-specialist, Tobias worked many years as a consultant for one of the biggest worldwide IT- and telecommunications corporations – so he knows what he is talking about.
Short biography:
Robert Moody is a threat intelligence and incident response expert. He currently leads the Threat Intelligence Team of THD Inc., an S&P50 global retail corporation. He is experienced in insider threat hunting as well as working with the legal community and private sector on large scale multinational projects. His background includes working in telecommunication, consulting, retail, and financial services industries. He has a M.Sc. in Cybersecurity from the ie University, and holds CRTIA, CISA, CDPSE, and CISM certifications.
Short biography:
Éric Filiol is a professor at ENSIBS, Vannes, France, and at National Research University Higher School of Economics, Moscow, Russia in the field of information and systems security. He is also a senior consultant in cybersecurity and intelligence. He directed the research and the cybersecurity laboratory of a French engineer school for 12 years. He spent 22 years in the French Army (Infantry/French Marine Corps). He holds an engineering degree in Cryptology, a PhD in Applied Mathematics and Computer Science from Ecole Polytechnique, and a Habilitation to Conduct Research (HDR) in Information from the University of Rennes. He holds several NATO certifications in the field of intelligence. He is editor-in-chief of the research journal in Computer Virology and Hacking Techniques published by Springer. He regularly gives international conferences in the field of security.
Short biography:
Bence Horvath is a seasoned cybersecurity executive focused on next-generation cyber defense and intelligence-led offensive operations. He currently leads the Next-Gen Security Operations and Advanced Security Testing Teams for EY’s Cybersecurity Practice in London, focused on Tier 1 clients in the financial services and CNI sectors. His background includes working in telecommunication, aerospace and defense, financial services and consulting. He has an MBA from ie Business School, an M.Sc. in Business Information Systems from the Corvinus University, and holds CRTIA, CISSP and CISM certifications.
Short biography:
José Garduño is a senior security consultant at Dreamlab Technologies since 2014, where he usually takes part in security audits, pentesting, and red teaming engagements. He has participated as a speaker in several technical conferences like Hackito Ergo Sum (France), Swiss Cybersecurity days (Switzerland), DSS ITSEC (Latvia), 8.8 Security Conference (Chile, Bolivia), OWASP Patagonia (Argentina), Congreso Seguridad en Computo UNAM (Mexico), DragonJar Security Conference (Colombia), where he has presented his work on privacy attacks on Latin-America (The government as your hacking partner), Hacking with open hardware platforms (revisiting hardware keyloggers, say hi to Mikey: an offensive hardware keylogger) and C2 detection (RATSPOTTING: Analysis of popular Remote Administration Tools & discovery of C2 servers on the wild).
Short biography:
My name is Mark Modly and as an IT (security) architect and teacher I always had the responsibility to aim for the highest standards for every design and knowledge sharing session. In my life I had the privilege to work on a lot of projects for companies in various domains like banking institutes and telecommunication companies in different countries. For a long time I was only one of the attendees at conferences like this, but now I think it is time for me to give back some value to the community. I mainly specialize on web technologies as I got hooked on it in the early 2000s so if you are interested in a working pure CSS “key logger” feel free to pop in!
Short biography:
Penetration tester and security auditor with 10+ years of experience. I am passionate about searching bugs, vulnerabilities in the source code of different applications, have vast experience in banking systems and web application penetration testing. Also a security trainer and lecturer in a university.
Short biography:
Currently Penetration Testing Lead @ Standard Chartered Bank where he is responsible for the technical part of the whole penetration testing team (more than 20 pentesters). In the security industry for more than 14 years. Experience in the area of penetration testing, reverse engineering or vulnerability finding. Multiple conferences speaker in Poland (Confidence, WTH) and abroad (HiTB, PacSec, DefCamp, H2HC).
Short biography:
Currently working as Penetration Tester in Standard Chartered Bank. For past years handled multiple roles related to IT security / application security / software development in the financial sector. Fan of automating stuff, always curious, hanging around looking for systems/processes that can be abused.
Short biography:
You might know me as @xdavidhu. I am a 19-year-old CS student who has been around the IT security field ever since I can remember, sort of. I wrote my first hacking tools five years ago, and stumble upon bug bounties in 2018. Most recently I have been exclusively hacking on Google VRP, Google’s bug bounty program, where every product of the company is in scope, from the thermostat on your wall to the production Google applications serving billions of users. I found quite a few bugs, and moved up on the leaderboard, currently being one of the top 40 Google VRP hackers worldwide.
Short biography:
I have been working on the field of cryptography since 2001. My specialties are e-signatures, encryptions, cryptography-based protocols (SSL/TLS) and cryptography-enabled devices (PKI smart cards, MIFARE-supported NFC cards). Recently I started to work with post-quantum cryptography technologies, I analyzed virtual currencies and e-voting models (direct democracy). For more reference on cryptography (and e-government) you can check my blog: http://kormanyablak.org/it_security_index.php
Short biography:
After 13 years in itsec and 20 in IT Abraham is now the CEO of 7ASecurity (7asecurity.com), a company specializing in penetration testing of web/mobile apps, infrastructure, code reviews and training. Security Trainer at Blackhat USA, HITB, OWASP Global AppSec and many other events. Former senior penetration tester / team lead at Cure53 (cure53.de) and Version 1 (www.version1.com). Creator of “Practical Web Defense” – a hands-on eLearnSecurity attack / defense course (www.elearnsecurity.com/PWD), OWASP OWTF project leader, an OWASP flagship project (owtf.org), Major degree and Diploma in Computer Science, some certs: CISSP, OSCP, GWEB, OSWP, CPTS, CEH, MCSE:Security, MCSA:Security, Security+. As a shell scripting fan trained by unix dinosaurs, Abraham wears a proud manly beard. He writes on Twitter as @7asecurity @7a_ @owtfp or https://7asecurity.com/blog. Multiple presentations, pentest reports and recordings can be found at https://7asecurity.com/publications
Short biography:
Matek Kamillo (k4m1ll0) is a white hat hacker. For him, it does not just a job, it’s a lifestyle. k4m1ll0 published several vulnerabilities and made several penetration testing tools during the years. As a senior member of the KPMG Hungary Sec Lab team, he usually takes part in Penetration Testing and Source Code Reviews. His favorite topics are Exploit Development and Reverse Engineering.
Certifications:
Kamilló published the following CVE-s:
Short biography:
Barak Sternberg is an Experienced Security Researcher who specializes in Offensive Security. Founder of “WildPointer”, and previously an author at SentinelLabs (“Hacking smart devices for fun and profit”, Defcon 2020 IoT Village) and leading innovative cybersecurity research. Barak spent more than six years at Unit 8200, IDF, as a team leader of 5-10 security researchers. He is highly skilled in offensive cyber-security, from vulnerabilities research in various areas: Linux, IoT, embedded and web apps to analyzing malware in the wild. Barak is also a CTF’s addict, posting write-ups and technical vulnerability analysis in its blog (livingbeef.blogspot.com).
Barak also acquires BSc, MSC (in CS) focused on algorithms from Tel-Aviv University and a DJ certificate from BPM college. @livingbeef // https://www.linkedin.com/in/barakolo/
Short biography:
I’ve been working Principal Security Engineer and Security Researcher at Zup Innovation and Security Researcher and Instructor at Hacker Security…I’m Hacking is NOT crime Advocate..I’m part of the Staff team of DEFCON Group São Paulo-Brazil, International Speakers in Security and New technologies events in many countrie such as US, Canada, Germany, Poland and others, I’ve been served as University Professor in graduation and MBA courses at colleges as FIAP / Mackenzie / UNIBTA and UNICIV, in addition, I’m Founder and Instructor of the Course Malware Attack Types with Kill Chain Methodology (PentestMagazine) and Malware Analysis – Fundamentals (HackerSec Company).
Short biography:
Chloé Messdaghi is an award-winning changemaker who is innovating tech and information security sectors to meet today and future demands by accelerating startups and providing solutions that empower organizations and people to stand out from the crowd. She is an international keynote speaker at major information security and tech conferences and events, and serves as a trusted source to reporters and editors, such as Forbes and Business Insider. Additionally, she is one of the Business Insider’s 50 Power Players. Outside of her work, she is the co-founder of Hacking is NOT a Crime and We Open Tech.
Short biography:
Ph.D. in Computer Science, CISSP, CSSLP. Over ten years of working experience in application security. Current position is a Principal Security Engineer at Huawei Russian Research Institute. Associate Professor at Bauman Moscow State Technical University, OWASP contributor.
Short biogprahy:
Yutai worked in various security areas for more than 5 years for an electric public company and a semiconductor manufacturing company. His main job was to respond to incidents and analyze them. After that, he made a start-up company that provides security service based bigdata and machine learning to enterprises.
Short biography:
Seungyeon worked in various security areas for more than 5 years for an electric public company and a semiconductor manufacturing company. His main job was to respond to incidents and analyze them. After that, he made a start-up company that provides security service based big data and machine learning to enterprises.
Short biography:
Istvan works as an IT security specialist for Deloitte, mainly focusing on security review and penetration testing of AWS Cloud infrastructures and web applications. He is keen on engaging in a wide range of ethical hacking projects, discussions, and solving hacking challenges in his free time. Istvan also held workshops at the Hacktivity conference in 2018 and 2020 regarding web application penetration testing and game hacking.
Short biography:
Changmin worked in various security areas for more than 5 years for an electric public company and a semiconductor manufacturing company. His main job was to respond to incidents and analyze them. After that, he made a start-up company that provides security service based bigdata and machine learning to enterprises.
Short biography:
Levente lives in a world of zeros and ones. Founder and CTO of the bug bounty platform called HACKRATE. He is an active bug hunter, successfully reported bugs to US DoD, Adobe, Logitech, BMW, Sony, and other big enterprises. As an IT Security Engineer, he planned, implemented, and managed various IT security solutions. He worked on international projects in Kuwait and Oman as an ethical hacker.
Short biography:
Rashid Feroze is head of infrastructure security at CRED, one of the fastest growing fintech in India. He loves to break into networks, cloud, applications while implementing defenses for the same. He is an active community speaker and likes to talk about securing infrastructure on a scale. He has helped to secure multiple banks, financial entities and govt agencies across the globe. He has previously given talks at security conferences such as Nullcon, Bsides and Rootconf.
Short biography:
Patrick (0xn00b), a DEF CON 26 Black Badge holder, is the co-founder of Village Idiot Labs which helps run IoT Village across the globe. Patrick has created a fully immersible/virtual web-based lab environment that people can learn how to hack IoT without the need for their own tools, equipment or even prior knowledge.
Short biography:
Senior Engineer running petabyte-scale Log Management program at the second largest bank in Switzerland, former SIEM Consultant for Tieto, Nordea, and UBS. Enthusiast of Cloud Security and Zero Trust architecture. Holder of multiple industry certifications, including CISSP, CCSP, CISA and a few others. Member of ISACA Zurich. Constantly looking for the holy grail of Log Management.
Short biography:
Balazs is an electrical engineer who is interested in low-level programming, printed circuit board design, embedded firmware development, and FPGA’s. His favorite reverse engineering project was re-creating the full schematic of the 6502 processor by analyzing its silicon die images. He has worked as a private entrepreneur for 20 years and is a co-founder of a Californian software development company called Screamingbox LLC. He spends his free time in nature: hiking, running, flying a glider, or a Cessna 172.
Short biography:
Simon is a self-taught Vulnerability Researcher at SonarSource who is passionate about playing CTF, traveling, and sports. He has come up with ways to find 0days in some of the most popular web applications such as WordPress, MyBB, and Magento2. He has also developed exploits for the Linux Kernel and Counter-Strike: Global Offensive.
Short biography:
Szilárd graduated from the University of Óbuda with a degree in electrical engineering. He gained 15+ years of experience in the development of network security products in C/C++ and Python languages. During these years the developments have been made in a Linux environment using free software. As committed to free culture and content, network and data security he is a regular speaker at conferences and trainings and regularly publishes articles on these topics. With many years of development leadership behind him, he is a believer in agility. He currently works as a security engineer and evangelist at Balasys IT Security. Its primary responsibilities include expert participation in R&D projects and IT security evangelism. In his spare time, he develops a command line tool and Python library for checking cryptographic (TLS/SSL/SSH) settings of client/server applications, of course under a free software license.
Short biography:
Eugene Neelou is a security researcher and author of the industry report that covers the past 10 years of AI vulnerability research, the field known as adversarial machine learning. He is a Co-Founder & CTO of Adversa.AI, an Israeli startup on a mission to protect AI systems from cyber threats, privacy issues, and safety incidents.
Short biography:
Marcel Seibert, Senior Associate at PwC Germany, is a passionate Penetration Tester specialised on the topics Embedded and IoT. Besides testing embedded and IoT systems he supports customers with prototype implementation of security-relevant mechanisms, e.g. secure automatic hard drive encryption/decryption on Linux. He is mainly engaged in penetration tests of control units in many sectors such as marine, rail, automotive and critical infrastructure. He also has project experience in fuzzing firmware or applications, reverse engineering x86 and ARM and general pentesting knowledge, e.g. web applications etc. As a fan of automation and efficiency, he likes to code in C++, Go and Python. Besides work and his passion for interesting technical stuff, you can find him bouldering or biking with friends.
Short biography:
Mohit Sharma is working as a Developer Advocate at MongoDB, helping developers architect clean and testable app’s. He has been working with Android for more than 10 years, since Android 2.2, previously with OLX group and believes that sharing knowledge is the best way of learning something new.
Short biography:
Ákos Csilling is a senior manager at the Bosch Engineering Center in Budapest. He leads an automotive communications testing team, as well as a cross-organizational core team for product security. He earned a PhD in Physics from Eötvös University and an MBA in international management from the University of Geneva. As a Bosch Scientist, he is also promoting collaboration between industry and academia for research and education.
Short biography:
Peter works as a senior red teamer and security specialist and holds the OSCP and OSWE certifications. While his main area of interest is red teaming, he also routinely performs penetration tests for web and binary applications where he enjoys white box testing in particular, getting to know the applications inside and out and finding vulnerabilities in the source code that would otherwise remain hidden.
Short biography:
Aseel is a security researcher at Kaspersky’s GReAT (Global Research and Analysis Team). Her research mainly focuses on threat groups and attacks active in the Middle East region. Aseel received her Bachelor’s degree in computer science and English literature, and speaks Arabic, Hebrew and English. Some of her work has been presented at security conferences such as Virus Bulletin, CCC, Botconf, and TheSASCon.
Short biography:
Software developer turned rogue, went from developing apps for small businesses to 2M+ DAU Facebook games while keeping an eye for everything shiny and new. For a couple of years, I’ve shifted gears and started my career as a security researcher while speaking at various conferences (SAS, AVAR, PHDays) in my free time showcasing whatever random stuff I hacked. Fortunately, after joining WhiteOps, I turned this passion into my full-time job. With a background in electronics engineering and various programming languages, I like to dismantle and hopefully put back whatever I get my hands on.
Short biography:
Mark Lechtik is a Senior Security Researcher at Kaspersky`s GReAT (Global Research & Analysis Team), based in Israel. After working as a researcher and manager in Check Point’s malware research team, he is focused mainly on analysing malware of all shapes and forms, digging up its underlying stories and profiling the actors behind it. Today he is tasked with breaking down implants and campaigns in the realm of APT and putting it all into intelligence reports for Kapserky’s customers. Mark has previously presented some of his work at known security conferences including REcon, CCC, CARO Workshop, AVAR and TheSASCon.
Short biography:
Csaba graduated in 2006 as a computer engineer. He worked for 6 years as a network engineer, troubleshooting and designing big networks. After that he worked for 8 years as a blue and red teamer focusing on network forensics, malware analysis, adversary simulation, and defense bypasses. Currently, he is working as a content developer at Offensive Security. He gave talks and workshops on various international IT security conferences, including Hacktivity, hack.lu, Troopers, SecurityFest, DEFCON, NULLCON and Objective By The Sea.
Csaba spends his free time with his family, practices ashtanga yoga before sunrise or simply hikes in the mountains.
Short biography:
Paul Rascagneres is a security researcher within Kaspersky GReAT (Global Research & Analysis Team). As a researcher, he performs investigations to identify new threats and presents his findings as publications and at international security conferences throughout the world. He has been involved in security research for ten years, mainly focusing on malware analysis, malware hunting and more specially on advanced persistent threat (APT) campaigns and rootkit capabilities. He previously worked for several incident response teams within the private and public sectors.
Short biography:
Dániel Komáromy earned computer science degrees from BME and Georgia Tech. He’s worked in the mobile security field ever since, gaining a decade-plus of vulnerability research experience playing both defense and offense. At Qualcomm, he hunted baseband 0-days, authored exploit mitigations, trained developers, and fought the SDLC machine. Later, he worked as a security consultant in the automotive security industry, followed by years of playing offense: at Pwn2Own, at CTFs around the world, and also for real. Today he is the founder and director of security research at TASZK Security Labs, still following the motto: there’s no crying in baseband!
Short biography:
Zoltan (@zh4ck) is the Head of Vulnerability Research Lab at CUJO AI, a company focusing on smart home security. Before joining CUJO AI he worked as a CTO for an AV Tester company, as an IT Security expert in the financial industry, and as a senior IT security consultant. He is also the developer of the Hardware Firewall Bypass Kernel Driver (HWFWBypass), the Encrypted Browser Exploit Delivery tool (#IRONSQUIRREL) and the Sandbox tester tool to test Malware Analysis Sandboxes. He found and disclosed a vulnerability in IP cameras, and this vulnerability was exploited by the Persirai botnet, running on ˜600 000 cameras.
Short biography
With more than 15 years’ experience in Application and Serverless Security, Tal recently co-founded CloudEssence, a cloud-native Application Security company that was acquired by Contrast Security in 2020, where he now leads the new innovation centre in Israel. Previous to CloudEssence, Tal headed the security research at Protego Labs, a Serverless security startup that was acquired by Check Point. To follow his moto “security through education” ,Tal trains hundreds of developers and security teams around the world while also serving as an AWS Community builder, an Open-Source projects leader and a professor at the cybersecurity master’s program at Quinnipiac University.
Short biography:
Piotr specializes in the use of DNS in cybersecurity systems. For the last 3+ years he has been researching various malware and APT examples for their use of DNS. He has experience in administration, design and implementation of network solutions acquired during over 20 years of work in various types of companies, from a service provider, through integrator, to vendors of network and cybersecurity solutions. Currently working as a senior solution architect at Infoblox, where he deals with the technical side of Secure DNS solutions. Cisco CCIE Emeritus #15966.
Short biography:
Vasiliy joined Kaspersky in 2010 as a member of the Anti-Malware Research Team, specifically the Anti-Rootkit Group. He was responsible for discovering complex threats that are difficult to detect or cure, specifically those that bypass Kaspersky security systems and technologies. Since 2016, he has worked in the Targeted Attacks Research Group (TARG) and researches targeted and complex threats (APTs), writing detection logic that allows Kaspersky products to hunt previously unknown activity of that nature
Short biography:
Loránt Szabó is a security researcher at TASZK Security Labs. An electrical engineer by trade with an MSc from BME, he got introduced to the infosec world by joining the !SpamAndHex CTF team 5 years ago. He has been an avid CTF player and explorer of hardware hacking and embedded and wireless security ever since. He has never met a hardware requirement that he didn’t want to DIY from scratch and his co-workers call him the frequency whisperer, which is an inside joke that he doesn’t like very much.
Short biography:
Attila is a seasoned information security professional with 20+ years of experience in cyber security. He holds CISSP, CISA, CISM certifications. He has worked with various security vendors, implemented security solutions for the largest Hungarian and Eastern European companies. In the last 5 years, he has been focused on designing and building security operations centers (SOC) including incident management, playbook and process design, maturity assessment, and a lot more.
Short biography:
Daniel is a software developer and trainer by the heart, and he enjoys guiding others in the field of IT Security. Daniel partnered with SCADEMY to brings his vision of secure coding education to life. He is a father of two, likes interesting conversations, spending time outdoors with his family, and tinkering with anything IT.
Short biography:
Fõ érdeklõdési területei: exploitok, fuzzolás, malware analízis.
OSCE, ECSA, CHFI, CISSP minõsítésekkel rendelkezik. 2005 Cerified Ethical Hacker képzés mellett forensic analízist, malware analízist, illetve alkalmazások biztonsági tesztelését is tanítja. Rendszeresen oktat külföldön is, így többek között Hollandiában, Szlovákiában, Romániában és az USA-ban is tartott már képzéseket IT-biztonsági témákban.
Az oktatás mellett szabadúszóként etikus hekkerként dolgozik: elsõsorban Windows alkalmazások, valamint belsõ és külsõ hálózatok tesztelését végzi.