Silviu Sofronie

Forensics, Sysadmin, DEV-Ops, Networking, Jazz and (in)Security Addict

BIOGRAPHY

Silviu is leading the gathering and analysis of Threat Intelligence feeds, from Honeypot deployments to Law Enforcement & CERT collaborations.
He owns 500+ honeypots, providing real time feeds on threats that are emerging, as well as monitoring known threats to observe any changes in behavior from good old hacks and hackers.
TOR Hidden Services opened a new opportunity to bring fresh blood to the team of 20+ whitehats he is relentlessly calling upon to solve real challenges, amongst other of his own inSecurities that must be researched.
Law Enforcement & CERTs collaborations were his best excuse to wonder through Europe and the USA, with Asia coming up.

TOR, Internet of Things, Botnets, Ransomware, Mobile Security, Honeypots, IPv6, politics, good stories, choose any, that’s enough to have him join you for a long documented discussion on the topic.
Silviu lives and breathes Bitdefender since 2009, right after college, starting as a Network&System Admin in the Antispam Lab, and moving trough DevOps to help deliver a Cloud based Antispam Product.
Seeing that Antispam is an important vector of infection for popular botnets, he surprised everybody by moving to a more exposed attack surface, the Internet and all it offers.
User behaviour centric honeypots, TOR Hidden Command and Control Servers, propagating malware and plain old school botnets seemed like a better choice for protecting a bigger chunk of the Internet users.

Silviu can be contacted at ssofronie [@at] bitdefender [.dot] com for any of the above. He will gladly answer or address any of your concerns.

Presentation: A look into Bullet Proof Hosting

Bullet Proof Hosting is a concept that describes the services that hackers use to host their Command and Control Servers.
The service provides anonymity and high availability.
We’ll take a deep, technical look into how Cryptolocker used such an infrastructure to communicate with its victims.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Cernica Ionut-Cosmin

IT Cyber Security Engineer Safetech Innovations

Matthew Halchyshak

Security Technician Security Innovation

Marek Zmysłowski

Application Security Consultant - SpiderLabs Trustwave

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS