Inbar Raz

Hacker of Things

BIOGRAPHY

Inbar has been teaching and lecturing about Internet Security and Reverse Engineering for nearly as long as he has been doing that himself. He started programming at the age of 9 on his Dragon 64. At 13 he got a PC, and promptly started Reverse Engineering at the age of 14. Through high-school he was a key figure in the Israeli BBS scene. He spent most of his career in the Internet and Data Security field, and the only reason he’s not in jail right now is because he chose the right side of the law at an earlier age.

Inbar specializes in outside-the-box approach to analyzing security and finding vulnerabilities. Using his extensive experience of over 20 years in the Internet and Data security fields, he spent 3 years at Check Point, running the Malware and Security Research, and 2 years at PerimeterX, performing fascinating research on Bots and Automated Attacks and educating both customers and the public about the subjects.

Inbar has presented at a number of conferences, including Defcon, Kaspersky SAS, Hack.lu, CCC, Virus Bulletin, ZeroNights, ShowMeCon, several Law Enforcement events and Check Point events.

In Soviet Russia, Vulnerability Finds You

Many times, security researchers pick a subject or a field, and then go hunting for interesting stuff. And let’s face it – in lack of real Security-by-Design policies and adequate security practices, pretty much every stone you’ll turn will reveal something under it.

But sometimes, interesting things just run into you while you’re going about your business. Something just appears before your eyes, begging for your attention.

The stories in this talk are all about research that started because I ran into something and it caught my attention – I wasn’t looking for it. From Web Automation, through Loyalty Card fraud, Bots on Tinder and Airport Security fails, I just stumbled into all of them. Some allow you to steal PII, some allow you to steal money, and some allow you to steal, well, an airport.

Clarification: While the presentation is named after the famous meme, none of the cases actually happened in Russia.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Yehia Mamdouh

Penetration Tester Specialist and Security Researcher DTS-Solution

SPEAKER INTERVIEW AVAILABLE

Paul Coggin

Red Team Engineer Financial Institution

Gabriel Cirlig

Senior Software Engineer Ixia, a Keysight business

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

At Orange Business Services, we help our customers transform their industries, reimagine their services, create a positive impact and unleash the power of their data into an amazing and trusted resource.

With the dual expertise as a global operator coupled with the agility of an end-to-end integrator, Orange Business Services is a global network-native, digital services company. From connectivity, smart mobility services and the cloud to artificial intelligence (AI), analytics and cybersecurity, Orange Business Services helps businesses at every stage of their data management. Orange Business Services is represented in Romania by the business division of Orange Romania and helps large companies, SMEs and public authorities to transform their organizations through the use of technology and digital information.

www.orange.ro

Platinum Partners
Gold Partners

Silver Partners

Bronze Partner

HACKING VILLAGE PARTNERS

COMMUNITY & MEDIA PARTNERS