DefCamp 2019 Schedule

Worldwide recognized speakers will showcase the naked truth about sensitive topics like red & blue teaming, incident management, infrastructure (in)security, GDPR, cyber warfare, ransomware, malware, social engineering, offensive & defensive security measurements and more!

Save the Date! 7th-8th Nov 2019

Subscribe to our newsletter to be the first who receives news about the upcoming edition and follow our Facebook, LinkedIn and Twitter pages to stay updated with latest announcements!

More than

60

speakers will be on stage this year sharing their research & engaging into panels on different topics related to cyber security.

Track #1

Thursday, 7th November

08:00 - 09:00

Registration

Pick up your badge & grab your coffee.

09:00 - 09:30

Opening Speech

09:30 - 10:15
Technical

The Advanced Threats Evolution: Researchers Arm Race

Alex Matrosov / Offensive Security Research Lead NVIDIA

10:30 - 11:00
Technical

Simjacker – billion dollar mobile security vs. one tiny piece of plastic

Ioan Constantin / Cyber Security Expert Orange Romania

11:00 - 11:30

Coffee Break

11:30 - 12:15
Technical

Under Pressure: Real world damage with TPMS spoofing

Inbar Raz / Security Architect Argus Cyber Security

Raziel Einhorn / Technical Product Manager Argus Cyber Security

12:30 - 13:00
Technical

In the Midst of Fire – Lessons Learned from Serious Incidents

Chris Yule / Senior Security Researcher Secureworks

13:00 - 14:00

Lunch break

14:00 - 14:45
Business

I PWN thee, I PWN thee not!

Jayson E. Street / VP of InfoSec SphereNY

15:00 - 15:45
Business

The Road to Hell is Paved with Bad Passwords

Christina Kubecka / CEO HypaSec

16:00 - 16:30
Business

Machine Learning and Advanced Analytics in Today’s Cyber Security

Koen Vanhees / Security Operations Manager Cegeka

16:45 - 17:30
Business

#Spouseware and #Stalkerware: Where Do We Go from Here?

Eva Galperin / Director of Cybersecurity EFF

Track #1

Friday, 8th November

08:00 - 09:00

Registration

Pick up your badge & grab your coffee.

09:00 - 09:45
Business

More Tales from the Crypt...Analyst

Jeff Man / InfoSec Curmudgeon Security Weekly

10:00 - 10:45
Technical

Next-Gen IoT Botnets #3 - Moar ownage

Alex “Jay” Balan / Chief Security Researcher Bitdefender

10:45 - 11:15

Coffee Break

11:15 - 12:00
Business

The U.S. Election System, Can we fix it? YES WE CAN!

Bianca Lewis / CEO Girls Who Hack

12:15 - 12:45
Technical

Fuzzing the Stack for Fun and Profit

Alexandru Razvan Caciulescu / Senior Software Engineer UiPath

12:45 - 14:00

Lunch break

14:00 - 14:30
Business

Implementing Continuous Offense, to Measure and Monitor Cybersecurity Defenses

Steve McGregory / Senior Director, Threat Intelligence Ixia, a Keysight Business

14:45 - 15:30
Technical

Secure them all—From Silicon to the Cloud

JUN LI / Senior Security Researcher 360 Security Technology

15:45 - 16:15
Technical

Raise Ya False Flags: A history about pirates and APTs

Dan Demeter / Security Researcher - Global Research and Analysis Team Kaspersky

16:30 - 17:00
Business

How come we have not solved security by now?

Dan Tofan / Security Program Manager SecureWorks

17:00 - 18:00

DefCamp 2019 Award Ceremony

1) D-CTF 2) IoT Village 3) Car Hacking Village 4) Critical Infrastructure Attack 5) Defend the Castle 6) Hack the Bank 7) EA - Lazy Dave 8) Brainpick CTF 9) Hack the Hackers 10) Unlock the SAFE 11) Capture the Firmware 12) Path Hunt 13) Target John 14) Lock Pick Village 15) Passport to Prizes

Track #2

Thursday, 7th November

08:00 - 09:00

Registration

Pick up your badge & grab your coffee.

09:00 - 09:30
Technical

CAN Bit-Stomping attack Prevention

Gabriel Ciubotaru / Lead Security Researcher Garrett - Advancing Motion

Mihai Petre / Lead Software Engineer Garrett - Advancing Motion

09:30 - 10:15
Technical

Intelligent Threat Intel - 'LEAD' Framework

Filip Stojkovski / Threat Intelligence Manager Adobe

10:30 - 11:00
Technical

Why usual pentests suck?

Martin Žember / Red Team Zembered Teaming

11:00 - 11:30

Coffee Break

11:30 - 12:15
Technical

Security & Compliance in the Cloud

Tudor Damian / CIO and Managing Partner Avaelgo

12:30 - 13:00
Technical

Consensual Surveillance

Mircea Hasegan / Principal Software Engineer Ixia, a Keysight Business

13:00 - 14:00

Lunch break

14:00 - 14:45
Technical

Post quantum digital signature with OQRNG (optical quantum random number generator)

Maksim Iavich / Professor, Head of cyber security direction at Caucasus University, President Scientific Cyber Security Association (SCSA)

15:00 - 15:45
Technical

A Secure Distributed e-Health System for the Management of Personal Health Metrics Data

Razvan Bocu / Lecturer and Researcher Transilvania University of Brasov, Romania

16:00 - 16:30
Technical

Breaking Smart. Hacking health, wearable and smart apps to prevent leaking

Yury Chemerkin / Security Expert JCS Advanced Monitoring

16:45 - 17:30
Technical

How to implement a quantum key distribution protocol on IBM's quantum computer (a practical example of quantum programming)

Mihail-Iulian Pleșa / Engineer Military Technical Academy

Track #2

Friday, 8th November

08:00 - 09:00

Registration

Pick up your badge & grab your coffee.

09:00 - 09:45
Technical

Messaging Layer Security: Towards a New Era of Secure Group Messaging

Raphael Robert / Head of Security Wire Swiss GmbH

10:00 - 10:45
Technical

Penetration Testing of Vehicle Components (ECU and FMS)

Arun Mane / Founder and Director Amynasec labs LLP

10:45 - 11:15

Coffee Break

11:15 - 12:00
Technical

Can Your Cloud Keep a Secret?

Raluca Stanciu / Senior Software Engineer BullGuard

Cristian Gogosila / Software Developer BullGuard

12:15 - 12:45
Technical

Security meets the world of gaming

Mihai Belu / Security Operations Director Electronic Arts

12:45 - 14:00

Lunch break

14:00 - 14:30
Technical

Hacking The Hacker : The Story

Constantin Cosmin Craciun / Application Security Engineer Axway

14:45 - 15:30
Technical

Cybergames with AMPIRE. NextGen Cyber Warfare and Operations Awareness & Training Polygon

Ilya Kostyulin / Expert Researcher JSC Advanced Monitoring

Sergey Ovchinnikov / Expert Researcher JSC Advanced Monitoring

15:45 - 16:15
Technical

5G: Need of a comprehensive Cyber Security Framework

Rosalia d’Alessandro / Security Associate Manager Accenture Italia

16:30 - 17:00
Technical

Connected Vehicle Security

Dragos Dabija / Security Manager Accenture

17:15 - 17:45
Business

Privacy in the healthcare: The good, the bad and the ugly

Jelena Milosevic / nurse/infosecurity researcher/ speaker/ trainer

Track #3

Thursday, 7th November

08:00 - 09:00

Registration

Pick up your badge & grab your coffee.

09:00 - 09:30
Technical

Emulating Packed Linux Malware Using the Unicorn Emulator Framework

Adrian Hada / Principal Security Researcher Ixia, a Keysight Business

09:30 - 10:15
Technical

Hacking ICS devices for Fun

Arun Mane / Founder and Director Amynasec labs LLP

10:30 - 11:00
Technical

Story of the new Android banking Trojan – Cerberus

Lukas Štefanko / Malware Researcher ESET

11:00 - 11:30

Coffee Break

11:30 - 12:15
Business

Live smart, live longer. On modern intelligent cyberweapon

Andrei Masalovich / CEO Lavina Pulse

12:30 - 13:00
Business

Pentesting on Steroids – How to perform faster and better pentest engagements (live demo)

Adrian Furtuna / Founder and Ethical Hacker Pentest-Tools.com

13:00 - 14:00

Lunch break

14:00 - 14:45
Technical

Your Face Isn’t Yours Anymore

Konrad Jędrzejczyk / Vice President (Cyber Threat Defense) Credit Suisse

15:00 - 15:45
Technical

How to exploit Cloud adoption for making your IT more secure and convenient for end users

Petr Kunstat / Presales Consultant Thales

16:00 - 16:30
Technical

HID (Human Interface Danger)

Milan Gabor / CEO Viris

16:45 - 17:30
Technical

Project SCOUT. Deep Learning for malicious code detection

Tiberiu Boros / Software Developer / Computer Scientist Adobe

Marius Manica / Cyber Incident Response Adobe

Track #3

Friday, 8th November

08:00 - 09:00

Registration

Pick up your badge & grab your coffee.

09:00 - 09:45
Technical

Red Team Engagements and The Forgotten Risk of Mobile Devices

Luca Pellegrino / Penetration Tester Dionach

10:00 - 10:45
Business

The Decalogue(ish) of Contractual Security Sins

Sebastian Avarvarei / Director for Security Advisory Services Wolters Kluwer

10:45 - 11:15

Coffee Break

11:15 - 12:00
Technical

Rotten to the core: Android worms in the wild

Gabriel Cirlig / Security Researcher WhiteOps

12:15 - 12:45
Technical

Windows Based Exploit Chains and Their Detection Mechanism

Muhammad Mudassar Yamin / Research Fellow Norwegian University of Science and Technology

12:45 - 14:00

Lunch break

14:00 - 14:30
Technical

Investigating Windows Graphics Vulnerabilities: A Reverse Engineering and Fuzzing Story

Radu Emanuel Chiscariu / Senior Security Research Engineer Ixia, a Keysight Business

14:45 - 15:30
Technical

Threat Intelligence – Common Mistakes & Stories Form The Field

Ionel Chirita / Threat Intelligence Manager Signify

15:45 - 16:15
Technical

Challenges in creating challenges

Valentin Necoara / CTO certSIGN

16:30 - 17:00
Technical

Securing DevOps: Common misconceptions

Neil Roebert / Senior Information Security Consultant F-Secure Consulting

17:15 - 17:45
Technical

LIONS AT THE WATERING HOLE – ONE YEAR AFTER

Andrei Bozeanu / Cybersecurity Researcher Dekeneas

Awesome Line-up right?

You can jump on the fast train and book your seat by now to get ahead of the competition and also catch an Early Bird.

7th-8th
NOV 2019
Bucharest
Romania
0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange „brings you closer to what matters to you”.

This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNER
VIP & SPEAKERS LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS