Rogerio Winter

Brazilian Army (BR)

BIOGRAPHY

He is Rogerio Winter and he is a researcher in Brazilian Army Cyber Defense.

Luke 8:17 – Misleading implementations that compromise the privacy and information security

The security of information has grown in importance in the world. Businessperson need more often moving around between offices, cities and even countries. Notably, many devices are stolen each year and many of the company’s strategic information are lost. Our work has evolved to an analysis of three existing consecrated encryption systems on the market: Bitlocker, Bitdefender and TrueCrypt. We were able to prove that outdated concepts are still being used to protect the information of people, companies and governments. We show how failures in their development, commercial inconsistencies and poor implementation can continue exposing secrets of people, businesses and governments.

Abstract [email protected] Technique

This presentation will based on book [email protected]: the end of antivirus.
https://www.facebook.com/apocalypseantivirus

The [email protected] technique is based on the exploration of the vulnerability of the anti-malware systems. It allows to infect in the furtive form a target equipment destroying the operating systems and data. Apocalypse technique is not a malware; we call a cyber autoimmune disease.

Properly used, [email protected] technique permit to explore failures as cyber weapon. The efficiency of this technique was successfully tested in 150 anti-malware systems.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Teodor Cimpoesu

Technical Director CERTSIGN

Beau Woods

Cyber Safety Advocate I Am The Cavalry initiative (USA)

SPEAKER INTERVIEW AVAILABLE

Anton Prokhorov

Co-Founder AVULN Security Industries & Embedded System Cryptography Expert (RU)

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS