Archives: Speakers

ulas
Ulaşcan Aytolun

Three years ago, I wrote a graduation thesis about ML for Malware Detection. That work first lead to a fraud detection system for a global game company which has millions of daily users and then lead to Trapmine’s Threat Score Machine Learning Engine. Trapmine’s ThreatScore is a machine learning-based malware detection engine used by our…

Bio Details →
denis-markrushin
Denis Markrushin

Patient-doctor confidentiality is a sacred bond. A time to share anxieties and concerns with an entrusted caretaker and no one else. So how do we account for that silent third-party watching the doctors? Medical infrastructure is a highly sought after target for motivated cybercriminals. That ‘infrastructure’ is in reality a combination of unusual outdated devices…

Bio Details →
egebalci
Ege Balcı

Presentation is about design and implementation of a packing methodology that can turn PE files into reflective payloads that can load and execute itself in memory. Possible use cases on penetration tests for bypassing security products such as anti-virus, IDS,IPS and application white-listing mitigations. Real life scenarios and analysis about how such attack vector can…

Bio Details →
briangorenc
Brian Gorenc

Bug bounty programs are nearly ubiquitous today, but that wasn’t always the case. When the Zero Day Initiative (ZDI) was founded in 2005, bug bounty programs were considered to be a rare and somewhat controversial commodity. Now they are seen as an indispensable means for companies to acquire bug reports. Our initial goals were similar. The…

Bio Details →
zoltan
Zoltan Balazs

Zero-day exploits targeting browsers are usually very short-lived. These zero-days are actively gathered and analyzed by security researchers. Whenever a new 0-day becomes known by the security industry, protections against the exploit are shared, AV/IDS signatures are made, patches are deployed, and the precious 0-day loses its value. One example is when Ahmed Mansoor was…

Bio Details →
utkusen
Utku Sen

Machine learning techniques are widely being used for defense purposes on network&endpoint security. They work well and getting better by time. Because of that, black box network pen testing becomes harder and requires more high skilled professionals. But when we compare penetration testing needs with number of high skilled professionals, they aren’t match. Because of…

Bio Details →
noam
Noam Rathaus

Biography As Chief Technology Officer of Beyond Security, Noam Rathaus brings vast knowledge of the computer security field, having 10 years experience in security for several platforms and over 8 years of C/C++ programming experience. In 1998, he started the popular SecuriTeam.com security portal, one of the largest internet security databases. One year later he…

Bio Details →
photo_abdul
AbdulAziz Hariri

Virtual machines play a crucial role in modern computing. They often are used to isolate multiple customers with instances on the same physical server. Virtual machines are also used by researchers and security practitioners to isolate potentially harmful code for analysis and review. The assumption being made is that by running in a virtual machine,…

Bio Details →
Jasiel
Jasiel Spelman

Virtual machines play a crucial role in modern computing. They often are used to isolate multiple customers with instances on the same physical server. Virtual machines are also used by researchers and security practitioners to isolate potentially harmful code for analysis and review. The assumption being made is that by running in a virtual machine,…

Bio Details →
back to top