15 - 15 April, 2021

Hero banner description
Hosted by
Hero Banner
SCROLLDOWN
About speaker:

Alexandru Colțuneac

Cyber Security Specialist & Co-Founder
LooseByte

I'm a Cyber Security Specialist with experience in Penetration Testing, Vulnerability Assessment, and Secure Code Review.

I started my journey in the Cyber Security field 9 years ago by being an active "Ethical Hacker" and finding security vulnerabilities in critical services offered by worldwide companies, including Google, Microsoft, eBay, LinkedIn, and Facebook.

My interest in white-hat hacking gradually turned into a career and I had the opportunity to work at two international companies as a Security Engineer and Security Tester. There I've performed offensive security activities on a great variety of applications and networks, which allowed me to expand my skill set. In 2019, I decided that I could give more to the community and the world as an entrepreneur, so I started my own Cyber Security company called LooseByte.

We now offer our experience and knowledge in the form of personalized security solutions that help companies stay proactive in a rapidly changing world.

Alexandru 's sessions:
Opening Speech
Welcome to Virtualized
Alexandru 's sessions:
Opening Speech
Welcome to Virtualized
About speaker:

Alexandru Luca

Mobile Division Manager, BU Cybersecurity
certSIGN

Alexandru Luca is an experienced Senior Consultant for Mobile Technologies with over 15 years experience in IT & C field. Over the years, Mr. Luca has gained valuable experience in this field both by taking key roles in the companies in which he has worked and by acquiring important certifications in this field such as Certified Enterprise Mobility Management, Certified Solution Design & Deployment and Certified System Architecture.


Mr. Luca is a member of the certSIGN team for more than 4 years during which, his activity was an important part of certSIGN’s work and business in this field. The company, with its own mobile security department, has developed and now owns its proprietary mobile products, such as Trust4Mobile – Voice and Messages Encryption application, Fides – Electronic Signature application, and, at this moment, is giving increased interest in continuously improving products and maintaining them at a constantly up-to-date technological level.

Alexandru 's sessions:
Work from anywhere. Work Safe!
During the pandemic crisis most companies are put in a position to change the way employees work.
Alexandru 's sessions:
Work from anywhere. Work Safe!
During the pandemic crisis most companies are put in a position to change the way employees work.
About speaker:

Constantin Burdun

Deputy CEO
certSIGN

A absolvit Academia Tehnică Militară din București, tot în cadrul acestei facultăți obținând și titlul de Doctor în Stiinta Calculatoarelor, urmând să fie chiar cadru didactic al acestei instituții.
Și-a completat ulterior studiile la Universitatea București, absolvind un master MBA – Business Administration, Management and Operations.


Domnul Burdun este un renumit specialist implicat în zeci de proiecte ample, in Romania, dar si in alte tari, de implementare de infrastructuri cu chei publice pentru diverse organizatii. De asemenea a participat in peste 10 proiecte de cercetare și dezvoltare, implementate de certSIGN, publicând peste 15 articole în securitatea informațiilor. A facut parte din echipa de proiectare si realizare a produsului certSAFE pentru Autorități de Certificare și a altor aplicații criptografice.
Domeniile sale de expertiza includ scheme avansate de semnături electronice, interoperabilitatea PKI și aspectele legale ale semnăturilor electronice.
 

Constantin 's sessions:
Opening Speech
Welcome to Virtualized
Constantin 's sessions:
Opening Speech
Welcome to Virtualized
About speaker:

Corina Staicu

Chief Operating Officer
eSolutions

With almost 15 years of experience in the IT field, in various roles: from programmer to service manager and from team lead to project manager, Corina is currently COO at eSolutions, leading the execution of the organizational strategy and overseeing the operational functions of the business. She trusts that embracing Agile methodology helps to adapt more quickly and easily to increasingly market dynamics and development speed, often delivering speeches and workshops on this topic.

Corina leads through example and believes in the power of kindness, always putting people first. In her spare time, she is part of the board of a public speaking organization, where she implements programs for high school students.
 

Corina 's sessions:
Opening Speech
Welcome to Virtualized
Corina 's sessions:
Opening Speech
Welcome to Virtualized
About speaker:

Flavius Burca

CTO
Spark Consult

IT professional with International experience on IT strategy, acquisitions and enterprise architecture in the public and private sectors. Broad and deep knowledge, combined with hands-on experience in data science, AI and ML, systems integration and the full spectrum of information technologies. Successful track record of helping clients through IT strategy alignment and realization, developing business and improving revenue.

Flavius 's sessions:
Spark OneData: A Framework for Cyber Threat Hunting
This session presents a reference model for how to effectively conduct threat hunting within an organization.
Spark OneData: A Framework for Cyber Threat Hunting
This session presents a reference model for how to effectively conduct threat hunting within an organization.
Flavius 's sessions:
Spark OneData: A Framework for Cyber Threat Hunting
This session presents a reference model for how to effectively conduct threat hunting within an organization.
Spark OneData: A Framework for Cyber Threat Hunting
This session presents a reference model for how to effectively conduct threat hunting within an organization.
About speaker:

Gabriel Nicolaescu

Business Development Manager
METAMINDS

-

Gabriel 's sessions:
Opening Speech
Welcome to Virtualized
Gabriel 's sessions:
Opening Speech
Welcome to Virtualized
About speaker:

John Bambenek

President
Bambenek Labs

John Bambenek is President of Bambenek Labs, a global threat intelligence firm, and a handler with the SANS Internet Storm Centre.

He has over 20 years’ experience in Information Security and leads several International investigative efforts tracking cybercriminals - some of which have led to high profile arrests and legal action.

He currently tracks neo-Nazi fundraising via cryptocurrency and publishes that online to twitter and has other monitoring solutions for cryptocurrency activity. He specializes in disruptive activities designed to greatly diminish the effectiveness of online criminal operations. He has produced some of the largest bodies of open-source intelligence, used by thousands of entities across the world.

John's sessions:
Hijacking the Home Office: Ransomware in the Age of Covid-19
This talk will cover how threat actors have adapted to these new realities and how organizations can protect themselves against ransomware entering the enterprise through home networks.
John's sessions:
Hijacking the Home Office: Ransomware in the Age of Covid-19
This talk will cover how threat actors have adapted to these new realities and how organizations can protect themselves against ransomware entering the enterprise through home networks.
About speaker:

Josh Pyorre

Senior Security Research Analyst
Cisco Umbrella

Josh Pyorre is a senior security research analyst with Cisco Umbrella. Previously, he was a threat analyst at NASA, working as part of the team that built and operated the NASA Security Operations Center at Ames Research Center. He has also worked at Mandiant, helping to build their SOC while conducting incident response for multiple clients. Before working in security, Josh was the technical director for a non-profit providing assistance to the houseless in San Francisco.

His professional interests involve network, computer and data security with a goal of maintaining and improving the security of as many systems and networks as possible.

Josh has presented at conferences and locations around the world, including DEF CON, B Sides, Source, Derbycon, InfoSecurity World, DeepSec, Qubit, NASA and various companies and government entities. He was also the host of season one of the security podcast, 'Root Access’.
 

Josh's sessions:
Our clouds have thunder - Cloud adoption and risks as affected by the pandemic
This presentation will talk about the challenges of sudden cloud adoption due to the pandemic and the risks that can come with trusting someone else with your assets. We’ll also talk about some methods for mitigating risks while continuing to enjoy the convenience of cloud services.
Josh's sessions:
Our clouds have thunder - Cloud adoption and risks as affected by the pandemic
This presentation will talk about the challenges of sudden cloud adoption due to the pandemic and the risks that can come with trusting someone else with your assets. We’ll also talk about some methods for mitigating risks while continuing to enjoy the convenience of cloud services.
About speaker:

Paul C Dwyer

CEO of Cyber Risk International, founder and President of the International Cyber Threat Task Force
ICTTF - International Cyber Threat Task Force

Paul C Dwyer is recognised as one of the world’s foremost experts on cyber security, risk and privacy.

As CEO of Cyber Risk International he specialises in corporate and enterprise security, development of cyber defence programs, and business operations protection for CRI clients.


With responsibility for the protection of trillions of euros in global money movement and critical infrastructure technologies that protect hundreds of thousands of companies’ and governments’ interests in more than 100 countries.
 

Paul C's sessions:
Covid-19 Versus the Cyber Security Ecosystem
This presentation outlines a key strategy to deal with the dynamic cyber risk landscape and outlines methods of how to adjust and support new business models.
Paul C's sessions:
Covid-19 Versus the Cyber Security Ecosystem
This presentation outlines a key strategy to deal with the dynamic cyber risk landscape and outlines methods of how to adjust and support new business models.
About speaker:

Rashed Rabie

Cybersecurity Engineer
Deloitte & Touche LLP

Cybersecurity engineer, threat hunter, and ICS researcher. Published author with IEEE and awarded a Cisco Global Cybersecurity Scholarship. With more than ten years of working experience in multiple industries, both IT and OT.

Rashed's sessions:
A Game Theory Approach for Holistically Defending the ICS-SCADA Environment: Win the game using ICS MITRE
This presentation will describe how to map the ICS threat landscape to MITRE ICS ATT&CK. This approach correlates game theory modeling and the ICS ATT&CK framework to identify the leading security solution to win the game against the adversary.
Rashed's sessions:
A Game Theory Approach for Holistically Defending the ICS-SCADA Environment: Win the game using ICS MITRE
This presentation will describe how to map the ICS threat landscape to MITRE ICS ATT&CK. This approach correlates game theory modeling and the ICS ATT&CK framework to identify the leading security solution to win the game against the adversary.
About speaker:

Righard Zwienenberg

Senior Research Fellow
ESET

Zwienenberg started dealing with computer viruses in 1988 after encountering the first virus problems.

His interest thus kindled he has studied virus behaviour and presented solutions and detection schemes ever since. Starting as an independent consultant, later as R&D Manager at CSE Ltd, as a researcher for ThunderBYTE, as Chief Research Officer at Norman, and currently as Senior Research Fellow at ESET.

Over the years he has served in many extra roles in different industry organizations. Currently he is still serving on the board of AVAR, on the Technical Overview Board of the WildList and as the Vice Chair of the Executive Committee of IEEE ICSG.

In 2018, Zwienenberg joined the Europol European Cyber Crime Center (EC3) Advisory Group as an ESET representative. Zwienenberg has been a member of CARO since late 1991. He is a frequent speaker at conferences and general security seminars.

Righard 's sessions:
The devil in the-skies?
In this presentation, ESET Senior Research Fellow Righard Zwienenberg, using recent events, will explore examples where moving from self-hosted to managed solutions indeed can be an improvement, but also will show that it’s not a reason to be less attentive and careful.
The devil in the-skies?
In this presentation, ESET Senior Research Fellow Righard Zwienenberg, using recent events, will explore examples where moving from self-hosted to managed solutions indeed can be an improvement, but also will show that it’s not a reason to be less attentive and careful.
Righard 's sessions:
The devil in the-skies?
In this presentation, ESET Senior Research Fellow Righard Zwienenberg, using recent events, will explore examples where moving from self-hosted to managed solutions indeed can be an improvement, but also will show that it’s not a reason to be less attentive and careful.
The devil in the-skies?
In this presentation, ESET Senior Research Fellow Righard Zwienenberg, using recent events, will explore examples where moving from self-hosted to managed solutions indeed can be an improvement, but also will show that it’s not a reason to be less attentive and careful.
About speaker:

Sergiu Popa

Cybersecurity Research Director
METAMINDS

Researcher & RedTeam Leader. Expertise in malware, APTs, SDR. The more you know .. the less you know

Sergiu's sessions:
Sergiu's sessions:
About speaker:

Tudor Cristea

Regional Sales Manager - CORTEX - Eastern Europe
Palo Alto Networks

Tudor joined Palo Alto Networks in 2016 and is now responsible for Cortex sales in Eastern Europe. He is in charge of developing the Cortex business and he talks passionately about cyberspace and how we should protect our digital way of life. Zero Trust model, behavioral analytics, security operations centers are among his favourite topics today.

Tudor 's sessions:
Superior detection powered by rich data
Cortex XDR integrates data from across your digital domain and accelerates investigations so you can stop attacks before the damage is done
Tudor 's sessions:
Superior detection powered by rich data
Cortex XDR integrates data from across your digital domain and accelerates investigations so you can stop attacks before the damage is done
Exchange business card with test 1..

Exchange business card with test 1..asdads