Konrad Jędrzejczyk

Vice President (Cyber Threat Defense) Credit Suisse

SPEAKER INTERVIEW AVAILABLE
BIOGRAPHY

Information Security expert and conference speaker with a comprehensive background in IT Security Incident Response, IT Security Risk Assessment, IT Forensics and general network / infrastructure security. Skilled in penetration scoping and testing as well as information security vulnerability and risk assessments. Conducted Incident Response Investigations across Europe, Middle East and Africa (EMEA) for leading global corporations. Played key roles in the Amstelveen data centre exit programme within The Royal Bank of Scotland Group and in the migration of IT security monitoring from Belgium to Poland within the ING Group. Experienced in investigations involving cybersecurity threat hunting, forensic analysis, e-discovery, malware infections and intellectual property theft.

Your Face Isn’t Yours Anymore

We all remember the movie “The Running Man” where the main character played by Arnold Schwarzenegger was framed for murder based on fake news. That was just a sci-fi movie in which an almighty corporation had the best equipment ever and as a result it could craft its own version of reality. But what if you didn’t have to have any special equipment, not even a powerful server to make your own movie with an alternative twist? What if just a PC was enough to make fake movies? And what if we told you that this is already possible and it is called a DeepFake – an AI framework which uses a neural network to replace faces 🙂 Ok, but is this AI framework difficult to use for an inexperienced operator, you may ask. What kind of skills and hardware is needed to start? Why will it be a weapon in future battles and how will it change situational awareness? If you want to know the answers, come and explore the experience of a CUDA programmer and a threat hunter with GPU rig who both started to play with AI with no previous experience.

This talk is co-presented with Marek Zmysłowski, Security Researcher at Cycura Inc.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Maksim Iavich

Professor, Head of cyber security direction at Caucasus University, President Scientific Cyber Security Association (SCSA)

SPEAKER INTERVIEW AVAILABLE

Tiberiu Boros

Software Developer / Computer Scientist Adobe

Razvan Bocu

Lecturer and Researcher Transilvania University of Brasov, Romania

SPEAKER INTERVIEW AVAILABLE

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS