Follow GISEC
Dark Stage   Hall 7 Moderators Opening remarks Dark Stage - Hall 7
Speakers

Big Hass Radio Host, Pulse 95 FM

Dark Stage   Hall 7 Cloud Offensive Security Dark Stage - Hall 7 “To know your Enemy, you must become your Enemy. “- Sun Tzu, The Art of War

Security in the cloud is a shared responsibility by the cloud providers and consumers. Cloud is a bigger target for hackers than any single environment, the payout is bigger since these environments tend to have more data than a single on-prem environment.
This talk will go into the foundations of offensive cybersecurity… The offensive approach.
Speakers

Francisco Z. Gaspar Lead Cybersecurity, Telefónica, Germany

Dark Stage   Hall 7 Raising the Curtains on Dark Stage Dark Stage - Hall 7
Speakers

Big Hass

Dark Stage   Hall 7 FragAttacks: Recent Flaws in WPA2/3 and New Defenses Dark Stage - Hall 7
Speakers

Mathy Vanhoef Krack Attack discoverer, Belgium

Dark Stage   -Inspire Hall 7 Moderators Opening Remarks Dark Stage - Hall 7
Speakers

Big Hass Radio Host, Pulse 95 FM

Dark Stage   Hall 7 Understanding and fighting extortion Ransomware attacks Dark Stage - Hall 7 Mitigating ransomware and extortion attacks is an urgent priority for organizations because of the high impact of these attacks and high likelihood an organization will experience one. In this session you will hear from Microsoft experts on ransomware concepts and trends, recommendations, and strategies to stay prepared. You will learn how security comes to life in detecting and remediating ransomware:

• Extortion and ransomware concepts
• Human Operated Ransomware, real incidents & attacks
• Recommendations and strategies to be prepared for and mitigate attacks
• Empower and modernize SecOps ransomware detection capabilities with integrated security tools and automation (Demo)
Speakers

Hesham Saad Sr. Regional Cybersecurity Technical Specialist, Microsoft

Dark Stage   -Inspire Hall 7 PANEL: Making change happen: The gender and the talent gap Dark Stage - Hall 7 Aside from a gender gap, there is also a severe talent gap, with 53% of organizations reporting a “problematic shortage” of cybersecurity skills. What are the initiatives to inspire the next generation for a career in cybersecurity through STEM programs in schools & universities?
Speakers

Eman Alkhatib Regional Sales Director, CyberKnight Technologies

Khaula Karim Co-Founder, SheSec Pakistan

Inass Farouk Marketing Director, Microsoft United Arab Emirates

Hessa Al Nahdi CISO, Department of Culture & Tourism

Hila Meller Co- Founder, Leading Cyber Ladies

Heide Young Co-Founder, Women in Cyber Security Middle East

Dark Stage   Hall 7 Ransomwares attacks against critical infrastructures and in particular in the healthcare sector is on the rise: what can hospitals do? DARK STAGE - Hall 7 The Session will cover how to identify attack paths targeting Active Directory, by focusing, as an example, on the Healthcare sector among the Critical Infrastructures. We will also understand how to insert Active Directory monitoring and protection into a global Risk Based Vulnerability Management program.
Speakers

Bernard Montel Technical Director and Security Strategist, Tenable

Dark Stage   Hall 7 “Why your CTI Program isn’t working, and how to fix it” DARK STAGE - Hall 7 A Cyber Threat Intelligence Program can significantly accelerate any organization’s security mission. However, the cost and complexity of implementing and operating one can be daunting. In this session, we will break down those complexities and provide an easy-to-implement, step by step approach to building out, maturing and measuring the success of your CTI program.
Speakers

Renze H. Jongman Manager, Intelligence Enablement, Mandiant

Dark Stage   Hall 7 Data Security & Privacy in the Quantum Era Dark Stage - Hall 7 Without quantum-safe encryption, everything that has been transmitted, or will ever be transmitted over a network is vulnerable to eavesdropping and public disclosure. In this session, attendees will learn how quantum cybersecurity can provide more robust and compelling opportunities to safeguard critical and personal data than currently possible. 
Speakers

Siddhartha Murthinty Chief Technology Officer, Spire Solutions

Dark Stage   Hall 7 Faster and more-scalable AppSec through automation, orchestration, and correlation Dark Stage - Hall 7 On average, organizations use more than 10 different AppSec tools to secure their applications. As development velocity increases, managing those AppSec tools and the results they produce can be difficult in combination with agility and innovation. As a result, many organizations are forced to choose between speed and security. But it doesn’t have to be that way. It’s possible to use intelligent automation and machine learning to secure your applications at the speed of DevOps—you just need a modern approach to AppSec and the right technology. Join Lucas von Stockhausen from Synopsys to learn:
• How AppSec orchestration technology triggers the right tests at the right time
• How AppSec correlation technology reduces noise and streamlines vulnerability triage
• How machine learning helps prioritize vulnerability remediation efforts
• How normalization allows you to get an overview on your overall AppSec situation With the right approach you can transform your AppSec program from a bottleneck to an enabler of DevSecOps.
Dark Stage   Hall 7 Dark Web Threat Intelligence and Forensics Dark Stage - Hall 7
Speakers

Deepak Kumar Senior Digital Forensic & Cyber Intelligence Professional, India

Dark Stage   -Inspire Hall 7 Fireside Chat: What is keeping women from cybersecurity? Dark Stage - Hall 7 The importance of mentorship programs, highlighting the main challenges and creating an action-oriented roadmap.
Speakers

Shamma Bin Hammad Founder-CEO, CyberHero

Carmen Marsh President, United Cybersecurity Alliance

Christine de Souza Board of Directors, Cyber Security Forum Initiative (CSFI), US

Jelena Zelenovic Senior Head, CISO & OpRisk, President, European Investment Bank, Women4Cyber Foundation

Dark Stage   Hall 7 Challenges and Benefits of DevSecOps and Cloud Era Dark Stage - Hall 7 • Brief the Benefits of DevSecOps with graphical representations
• Regulatory and Privacy concerns underlying cloud services with scenarios
• Understand DevOps Vs ''Cargo Cult DevOps''
• Lesson learned and way forward
Speakers

Finto Thomas Head of Security, Alef Education

Dark Stage   Hall 7 Automated Security Validation - a live ethical attack! Dark Stage - Hall 7 The session will showcase how a platform like the Automated Security Validation platform ensures you can proactively assess, report, and remediate risks based on most business impact. Gone are the days of a risk being prioritized on just a CVSS score. The technology reduces the perpetual lag and backlog of manual tasks, helps remove your teams' resource constraints, and improves the accuracy of testing, detection and remediation. 
Speakers

Jannis Utz Head of Sales Engineering EMEA & APAC, Pentera

Dark Stage   Hall 7 OT Security - Enterprise-Wide Dark Stage - Hall 7 Today's ransomware gangs use attack tools and techniques that only a few years ago were used only by nation states. In the face of these threats, today's connected automation gives us big increases in operational efficiencies, and gives us just as big increases in OT cyber risks. This is a real problem. Join us to explore why many enterprises are adding a layer of hardware-enforced Unidirectional Gateways at their IT/OT interfaces. The gateways provide physical protection from cyber threats, not just software protection. Unidirectional Gateways give us the benefits of modern connected automation without the risks - enterprise-wide
Speakers

Andrew Ginter VP Industrial Security, Waterfall Security

Dark Stage   -Inspire Hall 7 Break Dark Stage - Hall 7
Dark Stage   Hall 7 Exploit in 4 (not so simple) steps Dark Stage - Hall 7 A deep dive into Java serialisation vulnerability type, as an example I will share my methods and talk about my mindset while I’m hacking old java-based frameworks. Together with the crowd I can explore the exploits based on the following CVEs CVE-2014-1972,CVE-2018-12532,CVE-2018-12533
Speakers

Daniel Kalinowski Poland

Dark Stage   Hall 7 Discover Critical Active Directory Exposures & Targeted Attacks Dark Stage - Hall 7
Speakers

Bahi Hour Director of Systems Engineering – META, Attivo Networks

Dark Stage   Hall 7 Break Dark Stage - Hall 7
Dark Stage   Hall 7 Break Dark Stage - Hall 7
Dark Stage   -Inspire Hall 7 Connected Vehicles Security & Governance Dark Stage - Hall 7 How security is fueling the connected and autonomous vehicle experience
Speakers

Dr. Lopa Mudraa Basuu Leading Security Evangelist, India

Dark Stage   Hall 7 Profiling Hackers – The Psychology of Cybercrime Dark Stage - Hall 7 What motivates hackers? What are the latest Social Engineering techniques, used by Cybercriminals? How can you become a “human firewall”? More than 90% of Cybersecurity breaches are caused by human error, – humans are clearly the weakest link
Speakers

Mark T. Hofmann Behavioral- & Cyber-Profiling, Germany

Dark Stage   Hall 7 Zero Trust vs VPN: Live Hack Dark Stage - Hall 7 Legacy business VPN remote access solutions weren’t designed to handle the security challenges of today’s distributed workforce and escalating threat landscapes. Zero Trust Network Access (ZTNA) is the new industry standard for secure access to anything, from anywhere, by anyone. Join this session as we deep dive into:

• How replacing VPN can strengthen security and reduce your attack surface
• How the inherent trust model of a VPN means it is open and visible to hackers
• Demonstrating how ZTNA completely cloaks infrastructure, only providing access to the right resource at the right time to the right person
Speakers

Matthew Ellison Channel Sales Engineer, Appgate, UK

Dark Stage   Hall 7 HACKVERSE SPOTLIGHT Dark Stage - Hall 7
Speakers

Jayson E. Street World class hacker & author, who notoriously robbed banks across 5 continents

Dark Stage   -Inspire Hall 7 How to prevent Cyberbullying? Dark Stage - Hall 7 •  How do parents protects their children from Cyberbullying? What do you do if your child is a bully?
•  Cyberbullying types
•  Cyberbullying signs & causes
•  General statistics on Cyberbullying
Speakers

Shamma Bin Hammad Founder-CEO, CyberHero

Dark Stage   Hall 7 Simulations of Social Engineering Drills to Navigate & Exploit Enterprise Vulnerabilities. Dark Stage - Hall 7 Today Enterprises are using various Email Security Solution for monitoring and filtering malicious mail. This talk focuses on the overall methodology to bypass such solutions and target the decision makers to leak out critical information of enterprise with an entire Open-Source approach. The idea is to help enterprises understand the specific areas that they need to be concerned and to evaluate the blind spots which are constantly targeted by attackers. With Covid-19 in place various enterprise have given their employees access to work remotely and that has resulted in generation of targeted attacks specifically on remote employees through active & passive approach, my talk aims to highlight and showcase demos of how a successfully social engineering drills can be taken forward & simulated in an Infrastructure through Black & Grey Box perspectives. The talk focuses on enterprise grade security exploitation with the use of social engineering that is possible.
Speakers

Smith Gonsalves One of India’s Youngest Cyber Evangelist & Information Security Professional

Dark Stage   -Inspire Hall 7 Empowering & Building a Resilient Workforce to Secure Critical Infrastructure Dark Stage - Hall 7
Speakers

Hila Meller Co- Founder, Leading Cyber Ladies

Dark Stage   Hall 7 How we managed to break into an ISO27001 organization (with their permission) Dark Stage - Hall 7 • What was exposed, and what kind of expertise was required
• Examples of the vulnerabilities used to break in
• Interesting discoveries once the team was in (password files, service misconfiguration, etc.)
• How this was remedied
Speakers

Rami Kayyali Chief Technology Officer & Regional Director, The Kernel

Dark Stage   Hall 7 Azure Active Directory Hacking Hall 7 The session will showcase most prolific ways that threat actors use to compromise Azure Active Directory as well as some of common techniques threat actors rely upon to perform reconnaissance, get a foot hold, maintain access, escalate privileges and pivot between on-prem and the cloud.
Speakers

Tarek Naja Subject Matter Expert, Qualys, Dark Stage Technical Advisor

Dark Stage   -Inspire Hall 7 Panel: Gender diversity in cybersecurity: The key to getting ahead of hackers? Dark Stage - Hall 7 Is the key to unlocking a strong cybersecurity strategy in addressing the labor imbalance for women in cybersecurity?
Speakers

Heide Young Co-Founder, Women in Cyber Security Middle East

Mariam Alhammadi Information Security Specialist, Ministry of Interior

Mansi Thapar Divisional Head - Global Cybersecurity, Apollo Tyres Ltd.

Khaula Karim Co-Founder, SheSec Pakistan

Dark Stage   Hall 7 Scoring Bounties with Grafana” - The visualization and monitoring open-source that keeps on getting pwned Dark Stage - Hall 7 In this session we will go over on a complete workflow on how to score bounties and find bugs related to publicly accessible Grafana instances, Starting with understanding what Grafana is and who uses it, later we will dive in the motivation for the session and why it’s found beneficial to focus on Grafana for bug bounty journey.
Speakers

Gal Nagli Bug Bounty Hunter, Top 5 in HackerOne leaderboards

Dark Stage   Hall 7 From Initial Access to Ransomware Attack Dark Stage - Hall 7 How long does it take for a ransomware attack to occur from the moment of purchasing the access? The session willdemonstrate a direct connection between these threat actors' network access listings and actual ransomware attacks.
Dark Stage   Hall 7 Catching Log4j initiated attacks with NDR Dark Stage - Hall 7 The session will demonstrate an attacker using a Log4j vulnerable service to breach a Windows network - but who iswatching and what can they see?
Speakers

Jamie Moles Senior Technical Manager, ExtraHop

Dark Stage   Hall 7 Making Crisis & Incident Response Effective - Today! Dark Stage - Hall 7
Speakers

Oren Elimelech Co-founder and CEO, CYBERTEAM360

Dark Stage   -Inspire Hall 7 Closing remarks Dark Stage - Hall 7
Dark Stage   Hall 7 It’s all about risks, threats and response! Dark Stage - Hall 7 The variety and frequency of cyber-risks are growing beyond our imagination. Organizations are constantly exposed to several threats of which some may have negligible impact and others considerably disruptive. How can cybersecurity leaders devise a proactive response plan that is evolving at pace, if not faster, than the threat landscape? This session will focus on identifying important risks, assessing internal and external threats, and mitigating impact with a 360-degree response plan.
Speakers

Rami Refaat Head, Risks, Threats and Response, Spire Solutions

Dark Stage   Hall 7 Webshells – Evasive, Intrusive and Destructive! Dark Stage - Hall 7 • The lasting, devastating effects of webshells
• A quick dive into Log4Shell and similar historic vulnerabilities
• How identity stores and server farms get exploited using webshells
• A demo of a vulnerable web server compromise with few lines of code
• How to protect yourself, and how CrowdStrike leading technology helps you detect and stop destructive attacks
Speakers

Roland Daccache Sales Engineering Manager - MEA, CrowdStrike

Dark Stage   -Inspire Hall 7 Close Dark Stage - Hall 7
Dark Stage   Hall 7 Prevent vs Pay: A Better Ransomware Plan Dark Stage - Hall 7 Ransomware attacks are multiplying, paralysing private companies and public organizations alike. As devastating as these attacks are, the root cause of this is often an unmonitored, vulnerable asset that opens the door to the target technological infrastructure. A remote access, a login page to cloud services or even IoT devices: your employees and suppliers are leaving doors open that could represent 40% of your potential attack surface, and these entry points may be outside your radar.

• How ransomware gangs are scanning your external-facing assets for vulnerabilities
• How to secure your attack surface and integrate unmonitored, vulnerable assets
• How to prevent attacks by lowering the digital footprint of your organization and suppliers
Speakers

Camille Charaudeau Vice President of Product Strategy, CybelAngel

Dark Stage   Hall 7 The Open Source Supply Chain: Yes, You are Likely at Risk Dark Stage - Hall 7 The vast majority of software running in government, infrastructure, and business uses at least some open source libraries within that code. This fact, combined with the relative ease of launching an attack against the open source ecosystem, makes it an attractive target for attackers seeking to create a significant impact - with relatively small effort. For these reasons and others, software supply chain attacks are on the rise and are not likely to go away any time soon, as we saw in the recent Log4j debacle.

In this session, you will see how easy it is to launch an open source supply chain attack, and share some of the exciting findings in the context of risk within the current ecosystem, and its limitations to detect and block multiple kinds of attacks.
Speakers

Pete Chestna CISO of North America at Checkmarx

Dark Stage   Hall 7 Hacking like a White Hat Witch Hall 7 “We’ve all got both light and dark inside us. What matters is the part we choose to act on...that’s who we really are” – J.K. Rowling. Threat actors and security researchers both have cyber skills – we defer in our choices. In this session we’ll go through some magical cyberattacks exposed
Speakers

Maya Horowitz VP Research, Check Point Software Technologies

Dark Stage   Hall 7 Ransomware: Paying Conventional or Crypto, Is there another option? Dark Stage - Hall 7 Ransomware, a category of "malware," blocks access to a computer or network with no option other than to pay. The analysis of some of the notable ransomware attacks of the recent past shows that cryptocurrencies are a number one choice for hackers to receive ransom. While cryptocurrencies & ransomware are corelated, is there a way to analyze the top crypto backed ransomware attacks?

• What really happened with Colonial pipeline, Kaseya & JBS in 2021
• Are ransomware and cryptocurrencies intrinsically linked?
• How much security is enough?
Speakers

Syed Abid Ali Co-Founder & Chief Commercial Officer of PhishRod

Dark Stage   Hall 7 2022: What the H@ck is going on Dark Stage - Hall 7 Hackers and criminals are proving to be increasingly effective at breaching corporate networks and gaining footholds. In 2022, we have already seen an insane amount of breaches / public hacks that are not just the typical ransomware attacks,  in this talk you will find out a lot more about what is going on and what to worry about. 
Speakers

Bryan Seely Strategic Advisor, Spire Solutions

Dark Stage   Hall 7 Log4j: Dangerous Supply Chain Attacks Are Growing In Popularity Hall 7
Speakers

Mihai Barpascu Senior Solutions Architect, Bitdefender

Dark Stage   Hall 7 End of Dark Stage – Day 1 Hall 7
Dark Stage   Hall 7 HACKVERSE SPOTLIGHT: Reducing fear, uncertainty and doubt in Etheruem smart contracts for non-fungible token Dark Stage - Hall 7 Future cybercities and cybercitizens will have to place their trust into blockchain and smart contract based technologies that drive development of Web3 and Metaverse. Current blockchain technologies are transforming to support decentralized trust and transaction processing, large scale of transactions, and related big data. Let's review best practices in development, testing and usage of ERC 721, a standard interface for non-fungible tokens on Ethereum. We will demonstrate how common programming mistakes could lead into significant financial loss and will provide guidelines on adopting a secure software development lifecycle for smart contracts.
Speakers

Victor Polic CISO & Head of Information Security and Assurance Services, ILO, Switzerland

Dark Stage   Hall 7 The evil truth why supply chain attacks are here to stay Dark Stage - Hall 7 For threat actors, it’s often more lucrative to compromise a supplier and then gain access to their customers. In thissession we look into the fundamentals of supply chain security, then dive into the biggest supply chain attacks, andshare practical steps you can do to improve your security posture.
Speakers

Milad Aslaner Head of Technology Advisory Group, SentinelOne

Dark Stage   Hall 7 End of Dark Stage – Day 2 Dark Stage - Hall 7
Dark Stage   Hall 7 Moderators Opening remarks Dark Stage - Hall 7
Speakers

Big Hass Radio Host, Pulse 95 FM

Dark Stage   Hall 7 Cloud Offensive Security Dark Stage - Hall 7 “To know your Enemy, you must become your Enemy. “- Sun Tzu, The Art of War

Security in the cloud is a shared responsibility by the cloud providers and consumers. Cloud is a bigger target for hackers than any single environment, the payout is bigger since these environments tend to have more data than a single on-prem environment.
This talk will go into the foundations of offensive cybersecurity… The offensive approach.
Speakers

Francisco Z. Gaspar Lead Cybersecurity, Telefónica, Germany

Dark Stage   Hall 7 Raising the Curtains on Dark Stage Dark Stage - Hall 7
Speakers

Big Hass

Dark Stage   Hall 7 FragAttacks: Recent Flaws in WPA2/3 and New Defenses Dark Stage - Hall 7
Speakers

Mathy Vanhoef Krack Attack discoverer, Belgium

Dark Stage   -Inspire Hall 7 Moderators Opening Remarks Dark Stage - Hall 7
Speakers

Big Hass Radio Host, Pulse 95 FM

Dark Stage   Hall 7 Understanding and fighting extortion Ransomware attacks Dark Stage - Hall 7 Mitigating ransomware and extortion attacks is an urgent priority for organizations because of the high impact of these attacks and high likelihood an organization will experience one. In this session you will hear from Microsoft experts on ransomware concepts and trends, recommendations, and strategies to stay prepared. You will learn how security comes to life in detecting and remediating ransomware:

• Extortion and ransomware concepts
• Human Operated Ransomware, real incidents & attacks
• Recommendations and strategies to be prepared for and mitigate attacks
• Empower and modernize SecOps ransomware detection capabilities with integrated security tools and automation (Demo)
Speakers

Hesham Saad Sr. Regional Cybersecurity Technical Specialist, Microsoft

Dark Stage   -Inspire Hall 7 PANEL: Making change happen: The gender and the talent gap Dark Stage - Hall 7 Aside from a gender gap, there is also a severe talent gap, with 53% of organizations reporting a “problematic shortage” of cybersecurity skills. What are the initiatives to inspire the next generation for a career in cybersecurity through STEM programs in schools & universities?
Speakers

Eman Alkhatib Regional Sales Director, CyberKnight Technologies

Khaula Karim Co-Founder, SheSec Pakistan

Inass Farouk Marketing Director, Microsoft United Arab Emirates

Hessa Al Nahdi CISO, Department of Culture & Tourism

Hila Meller Co- Founder, Leading Cyber Ladies

Heide Young Co-Founder, Women in Cyber Security Middle East

Dark Stage   Hall 7 Ransomwares attacks against critical infrastructures and in particular in the healthcare sector is on the rise: what can hospitals do? DARK STAGE - Hall 7 The Session will cover how to identify attack paths targeting Active Directory, by focusing, as an example, on the Healthcare sector among the Critical Infrastructures. We will also understand how to insert Active Directory monitoring and protection into a global Risk Based Vulnerability Management program.
Speakers

Bernard Montel Technical Director and Security Strategist, Tenable

Dark Stage   Hall 7 “Why your CTI Program isn’t working, and how to fix it” DARK STAGE - Hall 7 A Cyber Threat Intelligence Program can significantly accelerate any organization’s security mission. However, the cost and complexity of implementing and operating one can be daunting. In this session, we will break down those complexities and provide an easy-to-implement, step by step approach to building out, maturing and measuring the success of your CTI program.
Speakers

Renze H. Jongman Manager, Intelligence Enablement, Mandiant

Dark Stage   Hall 7 Data Security & Privacy in the Quantum Era Dark Stage - Hall 7 Without quantum-safe encryption, everything that has been transmitted, or will ever be transmitted over a network is vulnerable to eavesdropping and public disclosure. In this session, attendees will learn how quantum cybersecurity can provide more robust and compelling opportunities to safeguard critical and personal data than currently possible. 
Speakers

Siddhartha Murthinty Chief Technology Officer, Spire Solutions

Dark Stage   Hall 7 Faster and more-scalable AppSec through automation, orchestration, and correlation Dark Stage - Hall 7 On average, organizations use more than 10 different AppSec tools to secure their applications. As development velocity increases, managing those AppSec tools and the results they produce can be difficult in combination with agility and innovation. As a result, many organizations are forced to choose between speed and security. But it doesn’t have to be that way. It’s possible to use intelligent automation and machine learning to secure your applications at the speed of DevOps—you just need a modern approach to AppSec and the right technology. Join Lucas von Stockhausen from Synopsys to learn:
• How AppSec orchestration technology triggers the right tests at the right time
• How AppSec correlation technology reduces noise and streamlines vulnerability triage
• How machine learning helps prioritize vulnerability remediation efforts
• How normalization allows you to get an overview on your overall AppSec situation With the right approach you can transform your AppSec program from a bottleneck to an enabler of DevSecOps.
Dark Stage   Hall 7 Dark Web Threat Intelligence and Forensics Dark Stage - Hall 7
Speakers

Deepak Kumar Senior Digital Forensic & Cyber Intelligence Professional, India

Dark Stage   -Inspire Hall 7 Fireside Chat: What is keeping women from cybersecurity? Dark Stage - Hall 7 The importance of mentorship programs, highlighting the main challenges and creating an action-oriented roadmap.
Speakers

Shamma Bin Hammad Founder-CEO, CyberHero

Carmen Marsh President, United Cybersecurity Alliance

Christine de Souza Board of Directors, Cyber Security Forum Initiative (CSFI), US

Jelena Zelenovic Senior Head, CISO & OpRisk, President, European Investment Bank, Women4Cyber Foundation

Dark Stage   Hall 7 Challenges and Benefits of DevSecOps and Cloud Era Dark Stage - Hall 7 • Brief the Benefits of DevSecOps with graphical representations
• Regulatory and Privacy concerns underlying cloud services with scenarios
• Understand DevOps Vs ''Cargo Cult DevOps''
• Lesson learned and way forward
Speakers

Finto Thomas Head of Security, Alef Education

Dark Stage   Hall 7 Automated Security Validation - a live ethical attack! Dark Stage - Hall 7 The session will showcase how a platform like the Automated Security Validation platform ensures you can proactively assess, report, and remediate risks based on most business impact. Gone are the days of a risk being prioritized on just a CVSS score. The technology reduces the perpetual lag and backlog of manual tasks, helps remove your teams' resource constraints, and improves the accuracy of testing, detection and remediation. 
Speakers

Jannis Utz Head of Sales Engineering EMEA & APAC, Pentera

Dark Stage   Hall 7 OT Security - Enterprise-Wide Dark Stage - Hall 7 Today's ransomware gangs use attack tools and techniques that only a few years ago were used only by nation states. In the face of these threats, today's connected automation gives us big increases in operational efficiencies, and gives us just as big increases in OT cyber risks. This is a real problem. Join us to explore why many enterprises are adding a layer of hardware-enforced Unidirectional Gateways at their IT/OT interfaces. The gateways provide physical protection from cyber threats, not just software protection. Unidirectional Gateways give us the benefits of modern connected automation without the risks - enterprise-wide
Speakers

Andrew Ginter VP Industrial Security, Waterfall Security

Dark Stage   -Inspire Hall 7 Break Dark Stage - Hall 7
Dark Stage   Hall 7 Exploit in 4 (not so simple) steps Dark Stage - Hall 7 A deep dive into Java serialisation vulnerability type, as an example I will share my methods and talk about my mindset while I’m hacking old java-based frameworks. Together with the crowd I can explore the exploits based on the following CVEs CVE-2014-1972,CVE-2018-12532,CVE-2018-12533
Speakers

Daniel Kalinowski Poland

Dark Stage   Hall 7 Discover Critical Active Directory Exposures & Targeted Attacks Dark Stage - Hall 7
Speakers

Bahi Hour Director of Systems Engineering – META, Attivo Networks

Dark Stage   Hall 7 Break Dark Stage - Hall 7
Dark Stage   Hall 7 Break Dark Stage - Hall 7
Dark Stage   -Inspire Hall 7 Connected Vehicles Security & Governance Dark Stage - Hall 7 How security is fueling the connected and autonomous vehicle experience
Speakers

Dr. Lopa Mudraa Basuu Leading Security Evangelist, India

Dark Stage   Hall 7 Profiling Hackers – The Psychology of Cybercrime Dark Stage - Hall 7 What motivates hackers? What are the latest Social Engineering techniques, used by Cybercriminals? How can you become a “human firewall”? More than 90% of Cybersecurity breaches are caused by human error, – humans are clearly the weakest link
Speakers

Mark T. Hofmann Behavioral- & Cyber-Profiling, Germany

Dark Stage   Hall 7 Zero Trust vs VPN: Live Hack Dark Stage - Hall 7 Legacy business VPN remote access solutions weren’t designed to handle the security challenges of today’s distributed workforce and escalating threat landscapes. Zero Trust Network Access (ZTNA) is the new industry standard for secure access to anything, from anywhere, by anyone. Join this session as we deep dive into:

• How replacing VPN can strengthen security and reduce your attack surface
• How the inherent trust model of a VPN means it is open and visible to hackers
• Demonstrating how ZTNA completely cloaks infrastructure, only providing access to the right resource at the right time to the right person
Speakers

Matthew Ellison Channel Sales Engineer, Appgate, UK

Dark Stage   Hall 7 HACKVERSE SPOTLIGHT Dark Stage - Hall 7
Speakers

Jayson E. Street World class hacker & author, who notoriously robbed banks across 5 continents

Dark Stage   -Inspire Hall 7 How to prevent Cyberbullying? Dark Stage - Hall 7 •  How do parents protects their children from Cyberbullying? What do you do if your child is a bully?
•  Cyberbullying types
•  Cyberbullying signs & causes
•  General statistics on Cyberbullying
Speakers

Shamma Bin Hammad Founder-CEO, CyberHero

Dark Stage   Hall 7 Simulations of Social Engineering Drills to Navigate & Exploit Enterprise Vulnerabilities. Dark Stage - Hall 7 Today Enterprises are using various Email Security Solution for monitoring and filtering malicious mail. This talk focuses on the overall methodology to bypass such solutions and target the decision makers to leak out critical information of enterprise with an entire Open-Source approach. The idea is to help enterprises understand the specific areas that they need to be concerned and to evaluate the blind spots which are constantly targeted by attackers. With Covid-19 in place various enterprise have given their employees access to work remotely and that has resulted in generation of targeted attacks specifically on remote employees through active & passive approach, my talk aims to highlight and showcase demos of how a successfully social engineering drills can be taken forward & simulated in an Infrastructure through Black & Grey Box perspectives. The talk focuses on enterprise grade security exploitation with the use of social engineering that is possible.
Speakers

Smith Gonsalves One of India’s Youngest Cyber Evangelist & Information Security Professional

Dark Stage   -Inspire Hall 7 Empowering & Building a Resilient Workforce to Secure Critical Infrastructure Dark Stage - Hall 7
Speakers

Hila Meller Co- Founder, Leading Cyber Ladies

Dark Stage   Hall 7 How we managed to break into an ISO27001 organization (with their permission) Dark Stage - Hall 7 • What was exposed, and what kind of expertise was required
• Examples of the vulnerabilities used to break in
• Interesting discoveries once the team was in (password files, service misconfiguration, etc.)
• How this was remedied
Speakers

Rami Kayyali Chief Technology Officer & Regional Director, The Kernel

Dark Stage   Hall 7 Azure Active Directory Hacking Hall 7 The session will showcase most prolific ways that threat actors use to compromise Azure Active Directory as well as some of common techniques threat actors rely upon to perform reconnaissance, get a foot hold, maintain access, escalate privileges and pivot between on-prem and the cloud.
Speakers

Tarek Naja Subject Matter Expert, Qualys, Dark Stage Technical Advisor

Dark Stage   -Inspire Hall 7 Panel: Gender diversity in cybersecurity: The key to getting ahead of hackers? Dark Stage - Hall 7 Is the key to unlocking a strong cybersecurity strategy in addressing the labor imbalance for women in cybersecurity?
Speakers

Heide Young Co-Founder, Women in Cyber Security Middle East

Mariam Alhammadi Information Security Specialist, Ministry of Interior

Mansi Thapar Divisional Head - Global Cybersecurity, Apollo Tyres Ltd.

Khaula Karim Co-Founder, SheSec Pakistan

Dark Stage   Hall 7 Scoring Bounties with Grafana” - The visualization and monitoring open-source that keeps on getting pwned Dark Stage - Hall 7 In this session we will go over on a complete workflow on how to score bounties and find bugs related to publicly accessible Grafana instances, Starting with understanding what Grafana is and who uses it, later we will dive in the motivation for the session and why it’s found beneficial to focus on Grafana for bug bounty journey.
Speakers

Gal Nagli Bug Bounty Hunter, Top 5 in HackerOne leaderboards