Archive for the talks Category

Level: Mixture of Management and Technical

Abstract:

The talk takes the user through a journey of how to take enterprises to another level of Maturity (read: Security). Presenting how Cyber Security improvements (read: getting the budget, planning, deploying, communicating, etc) took the organisation away from spending hours to investigate incidents, to rather do the same thing in minutes. This talk will cover maturity models, real life examples, and also how tight integration has allowed us to deliver cutting edge security whilst saving money.

Bio:

Milos Pesic is an analytical decision-maker, experienced as Head of Information and Cyber Security on a global scale for major pharmaceutical enterprise organisations.

Ambitious and result-driven executive with strong relationship building skills and a proven record in directing diverse teams to deliver and achieve conforming business programmes. Extensive experience and leadership in Risk Assessments, Incident Resolutions, Threat Hunting, Forensic Investigation and Guest Speaking at cyber security conferences.

An executive leader who aims to utilise over 10+ years of global experience and strategic planning to drive efficiency and profit for a forward-thinking business.

Education: Information Security B.A. and Masters for Information Security at Royal Holloway, University of London, with thesis Protecting Users from Ransomware.

Level: Technical

Abstract:

Obfuscation is the deliberate act of introducing anomalies in a binary, source or machine instructions in order to deter analysis and effectively “harden” the binary. In this talk, the speaker will attempt to introduce the concept of obfuscation with a focus on ELF & PE binaries to demonstrate the effectiveness of such techniques in deterring analysis and throwing the analyst on a wild goose chase. We’ll cover a range of techniques, how and why they work, and how do different analysis tools react to those changes.

This talk will involve a live ransomware sample (safety helmets will be provided by BSides Ljubljana).

Basic knowledge of reverse-engineering and programming is required for this talk.

Bio:

Abdullah Joseph is the mobile security team lead of Adjust, providing mobile analytics services to clients around the globe and overseeing the security of mobile open-source libraries integrated in over 22,000 mobile apps and hitting over 400+ billion data points per month. His team works on researching current and future mobile ad fraud schemes and developing appropriate countermeasures. He is also the holder of GREM, GMOB and GPEN certifications.

Blog: https://riverbird.co

Level: Between Low and Technical

Abstract:

Most everyone has heard of the 2017 Equifax breach and during the aftermath the narrative was pushed that it was all because of a missing patch. But it was much much more than that! The excellent House and Senate reports point out many issues and it certainly was a failure of leadership. In this presentation, I take some of the many discrete failures brought to light in these reports and line them up with their respective functional areas in the NIST CyberSecurity framework. This will highlight the cascade of failures than enabled this the breach and will hopefully get attendees to consider using this very approachable framework if they have not already done so.

With this presentation, attendees will gain a fuller understanding of this serious incident. This understanding can be used to avoid the same mistakes Equifax made and be used as a cautionary tale of what can happen to management when they fail to instruct the implementation of best security practices.

Bio:

Jim Nemetz is originally from the United States and was the first kid on his block with an Atari 2600. (And the coolest until another kid down the street got an Intellivision.) He has been working in the computer/network/cyber security field for 20 years and can be frequently found on the European conference circuit.

Level: Low Tech

Abstract:

Like in the memorable Matrix scene, we the CISOs and security leaders have to realize that our goal is not to bend organizations out of shape. There is no “organizational spoon” inherently resisting security changes. Instead, it is us who have to be flexible and adaptable, to be able to run our security programs in sync with the business goals – and in fact, “become one” with the business goals.

In this presentation, we’ll discuss the steps on the path to this “enlightenment”, how to strengthen the relationship with the business, and how to bring the “good message” to the Management. We’ll cover topics such as structuring a Security Program, and creating metrics frameworks for measuring – and proving – the effectiveness of your Security Program. We’ll talk about leveraging Threat Modeling as a conduit for a dialogue with the Business, about shaping a Security budget, but also about the subtle art of giving a frack and learning how to establish the networks of support with your peers in the organization. Ultimately, we’re advocating for the paradigm change that Security is not IT function, but a Business function.

The talk is targeted not only at CISOs and Security managers, but it’s also equally relevant to those who are just starting in Infosec, to give them a new, more rounded, perspective on the field, and thus hopefully make them more successful.

But if you’re yawning by now and your eyes are glazing over, fear not! The talk will be generously peppered with movie memes and catchy metaphors. The narrative will be structured as Neo’s evolution in the Matrix trilogy – with one of the underlying themes being, just like in the movies, the transition from the “us vs. them” into just “us”.

Bio:

Currently working as Director for Security Advisory Services Europe at Wolters Kluwer, Sebastian Avarvarei has been in IT and Security for over 20 years, covering a multitude of roles ranging from Security Architect and Consultant, to Software Developer and Security Auditor, giving him a unique multi-faceted view on today’s Security challenges. He has led multiple security improvement programs, performed security governance assessments and designed the security architecture for a wide variety of environments – while continuously asking himself “Hmm, I wonder if we could do this in another way?”

Level: Low Tech

Abstract:

Too many Blue Teams rely solely on commercial tools to defend their organizations, and don’t realize there are a lot of free or inexpensive tactics and techniques that every organization can leverage to make it harder for attackers to enter your environment. This presentation is a collection of basic tips and tricks learned from around the world. These are tactics that either stop attackers in their tracks, or make it more difficult for them to succeed. You’ll walk away with actionable tips to fill your security gaps and help reduce your attack surface.

Bio:

Robert Wagner is a security professional with 15+ years of InfoSec experience. He is a co-founder of “Hak4Kidz”, a co-organizer of BurbSecCon in Chicago, and is on the Board of Directors of the ISSA Chicago Chapter.