Speakers at SECURE 2017:

John Bambenek

John Bambenek is Manager of Threat Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He has been engaged in security for +17 years researching security threats. He is a published author of several articles, book chapters and one book. He has contributed to IT security courses and certification exams covering such subjects as penetration testing, reverse engineering malware, forensics, and network security. He has participated in many incident investigations spanning the globe. He speaks at conferences around the world and runs several private intelligence groups focusing on takedowns and disruption of criminal entities.

 

Jurriaan Bremer
Working more than 5 years on Cuckoo Sandbox, the leading open source automated malware analysis sandbox. Jurriaan is the development & team lead in charge of realizing its roadmap and managing its future success.

 

Adam Haertle, ZaufanaTrzeciaStrona.pl
Founder and editor-in-chief of one of the most popular security-related websites. Security specialist by passion, a keen speaker and trainer, entertaining and teaching audience in Poland and abroad. For the last several years he had been responsible for information security issues at UPC Polska. Today he focuses on describing threats in the cyber world and educating users.

 

Udo Helmbrecht, ENISA
Prof. Dr. Udo Helmbrecht has more than 40 years of professional management experience in the IT sector. Udo Helmbrecht was born in 1955, in Castrop-Rauxel, North Rhine-Westphalia, Germany. He studied Physics, Mathematics and Computer Science at Ruhr-University, Bochum, and in 1984 he was awarded a PhD in Theoretical Physics. In 2010 Udo Helmbrecht was appointed honorary professor at the Universität der Bundeswehr Munich, Germany. His experience in the field of security has been acquired through work in a variety of areas, including the energy industry, insurance, engineering, aviation, defence, and the space industry.  He became the president of the German Federal Office for Information Security (BSI) in 2003. Udo Helmbrecht took office as Executive Director of the European Union Agency for Network and Information Security (ENISA) in October 2009.

 

Gordon Muehl
Global CTO Security at Huawei. Excellence C-level Technology Leader. Leading teams around the world and communicating from CxO to developer. Driving Security in large software development organizations, from a requirement level to an intrinsic culture of the organization. Solid Business Background in multiple industries (automotive, high-tech, telecommunication,...) and business application areas (CRM, ERP, PLM,…). Definition of technology strategies, into implementation guidelines and development projects. Leading worldwide distributed organizations. Building and running training programs for 20000+ developers around the world. Holder of 17 patents.   

 

Przemek Jaroszewski, CERT Polska
Przemek Jaroszewski is a member of CERT Polska (part of Research and Academic Computer Network in Poland) since 2001, where his current position is the head of incident response. He started his education as a programmer at Warsaw University of Technology, to eventually get his master's degree in Social Psychology from University of Social Sciences and Humanities in Warsaw. Przemek was involved in a number of projects on data exchange and collaboration of incident response teams. He was also a co-author and teacher of trainings for incident responders, including ENISA CERT Exercises and TRANSITS.

 

Vladimir Kropotov, Trend Micro
Vladimir is researcher with Trend Micro FTR team. Active for over 15 years in information security projects and research, he previously built and led incident response teams at some of Fortune 500 companies, was head of Incident Response Team at Positive Technologies since 2014, and holds a masters degree in applied mathematics and information security. He participates in various projects for leading financial, industrial, and telecom companies. His main interests lie in network traffic analysis, incident response, botnet and cybercrime investigations. Vladimir regularly appears at high-profile international conferences such as FIRST, CARO, HITB, Hack.lu, PHDays, ZeroNights, POC, Hitcon, and many others.
 
 
Éireann Leverett
Éireann Leverett once found 10,000 vulnerable industrial systems on the internet. He then worked with Computer Emergency Response Teams around the world for cyber risk reduction. He has since worked on powergrids, incident response metrics, cyber risk, cyber insurance, and medical device vulnerabilities. He likes teaching the basics, and learning the obscure.
 
Aaron Luo
Aaron Luo is the cyber threat expert from Trend Micro core technology group. Prior to joining Trend Micro, Aaron worked in the cybercrime investigation department at a local government as a security consultant. He has started the security research since 2005 and is active around information security communities in Taiwan. He was the founder of PHATE hacker group, and a core member of ZUSO Security. Now he is a member of CHROOT/HITCON security research group. He has several research papers published in HITCON, UISGCON ,BalCCon, CLOUDSEC, SYSCAN360 and DEFCON.

 

Artur Maj

Co-founder of Prevenity company. He is passionate about security for more than 18 years. Together with the Prevenity team he provides security advisory services, performs mobile application security testing and assists organizations in handling security incidents. Speaker at numerous conferences on security. Professional experience gained on Polish and international markets. Before Prevenity he worked for Hewlett Packard and Oracle Corporation. Graduate of the Rzeszów University of Technology. CISM, CISSP and CISA certificates holder.

 
 
Mirko Manske
Mirko joined the German Federal Criminal Police Office (Bundeskriminalamt or BKA for  short) in 1994. During his career, Mirko has served on a variety of positions in the field of Software Development, Counter-Money-Laundering operations, Hostage Negotiations as well as Counter Terrorism Operations. In 2006, he was assigned to lead the BKA’s Cybercrime Intelligence Operations Team and has been serving the global Counter-Cybercrime-Community in this position since. He holds the rank of a First Detective Chief Inspector and can’t get promoted anymore - which makes operational decision easy from time to time.
 

Anna Mierzyńska 
Specialist of social media and public sector marketing. The Head of the Promotion Department at the University of Bialystok. Blogger - runs blog on social media, creating image on the Internet and political marketing. She worked as a journalist of the regional daily "Gazeta Współczesna". Since 2009 she has been dealing with personal marketing, social media and public sector marketing. She worked, among others in a constituency office, and carried out electoral and promotional campaigns. In her free time: an enthusiast of nature, good photography and slow life.

 
Amihai Neiderman
Amihai Neiderman is a security researcher in the field of vulnerability research. Amihai has worked on everything from embedded devices, IoT, OS exploitation and web security. In past years he has worked as an independent researcher for various companies and now works as a researcher for Azimuth Security.
 

 

Inbar Raz

Inbar has been teaching and lecturing about Internet Security and Reverse Engineering for nearly as long as he has been doing that himself. He started programming at the age of 9 on his Dragon 64. At 13 he got a PC, and promptly started Reverse Engineering at the age of 14. Through high-school he was a key figure in the Israeli BBS scene. He spent most of his career in the Internet and Data Security field, and the only reason he's not in jail right now is because he chose the right side of the law at an earlier age. Inbar specializes in outside-the-box approach to analyzing security and finding vulnerabilities. Using his extensive experience of over 25 years in the Internet and Data security fields, he spent 3 years at Check Point, running the Malware and Security Research, and 2 years at PerimeterX, performing fascinating research on Bots and Automated Attacks and educating both customers and the public about the subjects. Inbar has presented at a number of conferences, including Defcon, Kaspersky SAS, Hack.lu, CCC, Virus Bulletin, ZeroNights, ShowMeCon, several Law Enforcement events and Check Point events.

 

 

Eyal Ronen, Weizmann Institute of Science

The PHD student under the supervision of professor Adi Shamir at the Department of Computer Science and Applied Mathematics of the Weizmann Institute of Science. His research interests are security and applied cryptography.

 

Anna Rywczyńska

Polish Safer Internet Centre Coordinator and the head of the Training and Social Projects Team at the Research and Academic Computer Network. She has wide experience in working on international projects and has been a speaker and organizer of a range of conferences on safety in telecommunication. In recent years she has worked as an expert in working groups at ENISA dealing with WEB 2.0 security and online threat awareness raising. Since 2003 she has been one of the organizers of SECURE conference – the oldest cyclical ICT security conference in Poland. Since 2007 she has been a vice chair of the international conference “Keeping Children and Young People Safe Online”. She graduated from the Warsaw University, Institute of Journalism, with specialization in media economics, as well as the Institute of Archaeology, Department of Historical Anthropology – Andean Archaeological Mission.

 

Michał Sajdak

Michał Sajdak has long experience in topics related to technical IT security. He runs penetration tests and security audits, as well as training on IT security. Holder of CISSP, CEH, CTT+ certificates. Founder of sekurak.pl.

 

Raj Samani, McAfee

Raj Samani is a McAfee Fellow and Chief Scientist at McAfee. His prior roles include VP and Chief Technology Officer, EMEA, at Intel Security/McAfee and Chief Information Security Officer for a large public-sector organisation in the United Kingdom. A leading international cybercrime expert, Samani has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3/EUROPOL). Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. Samani has published numerous security papers and is the author of 'Applied Cyber Security and the Smart Grid'. SC Magazine named Samani as one of the Top 10 Influencers in cyber security in 2016. Raj Samani is a sought-after speaker and regularly appears on television commenting on the top IT security issues driving headlines today.

 

Miroslav Stampar

IT Security Advisor - Expert at Croatian Government's CERT, part of the Information Systems Security Bureau (ZSIS). Born in 1982, writing and breaking computer code for as long as he can remember. A PhD candidate with Master's Degree in Computer Science at Faculty of Electrical Engineering and Computing (FER), University of Zagreb, Croatia. Also, open source contributor (sqlmap, Maltrail, tsusen, ipsum, etc.) and Croatian Chapter Lead for The Honeynet Project.

 

Paul Vixie

Paul Vixie was responsible for BIND from 1989 to 1999, and is the author of a dozen or so IETF RFC documents about DNS. He also started the first anti-spam company (MAPS), and was the founder and later president of the first U.S.-based commercial Internet Exchange (PAIX). Today he serves as CEO of Farsight Security, home of the Security Information Exchange (SIE) and the world's leading Passive DNS database (DNSDB). He is also co-inventor of the DNS Response Rate Limiting (RRL) and Response Policy Zone (RPZ) feature-sets now in widening use. He received his Ph.D. from Keio University in 2011, and was inducted into the Internet Hall of Fame in 2014.

 

Radosław Wal

A graduate of the Faculty of Cybernetics at the Military University of Technology. After graduating he worked as a scientist and didactic assistant at the Department of Information and Communication Technology at his home faculty. In 2004-2015 he worked for leading security technology distributor in Poland where he was a consultant and coach. At present he is a system engineer who is responsible for technical sales support. He is a co-author of publication in the field of network security. Speaker at numerous conferences in the field of security. He has more than 10 certificates of competence issued by key security providers.

 

Or Yaacov

Or Yaacov is and experienced security-focused architect at F5 Networks, covering the EMEA region. Specializing in application deliver, secure access, application protection and availability. Consultant and trusted advisor to major accounts in the EMEA region and active speaker in event and conferences, evangelizing F5 Networks within the information security community.

 

Kim Zetter

Kim Zetter is an award-winning investigative journalist and book author who has been covering computer security and the hacking underground since 1999, first for “PC World” magazine and more recently for “WIRED”, where she wrote about security, cybercrime, surveillance and civil liberties for more than a decade. She has broken numerous stories over the years about NSA surveillance, WikiLeaks, and the hacker underground and has three times been voted one of the top ten security journalists in the U.S. by her journalism peers and security industry professionals.
She's considered one of the world's experts on Stuxnet, a virus/worm used to sabotage Iran's nuclear program, and published a highly-acclaimed book on the topic – “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon”. The book is being translated into Polish by Helion, and will be available in Poland in September 2017.

The website uses cookies to help you use the service and for statistical purposes. If you are not blocking these files, you agree to their use and store in the device memory. Please take note that you can manage cookies independently by changing your browser settings. If you do not change browser settings, you express your agreement.