Stefan Mitroi

InfoSec Team Lead Secureworks

BIOGRAPHY

Stefan Mitroi is working as an InfoSec Team Lead at Secureworks. He has nine years of experience in the digital forensics and IT security field, starting his career as a cybercrime investigator for Romanian Police where he had the chance to improve his analytical skills and knowledge in the digital field.

While being involved in different digital investigations, he became curious, inquisitive and eager to learn more about IT security field, the root cause and conditions that favor incidents. He was engaged in digital forensics where he gained experience with different tools and technologies and had different responsibilities like performing data recovery on electronic devices, identifying and preserving digital evidence, analyzing traffic data and conducting forensic research to identify illegal intrusions. He is experienced in cybersecurity investigations, forensic analysis and malware infections.

Trust, but verify – Bypassing MFA

Ever wonder why phishing is still ranked as a top Cybersecurity Attack when more and more companies implement MFA? Why are we not seeing a significant drop in this attack vector? How are users accounts still getting compromised even when MFA is implemented? Unfortunately this type of activity still exploits the most vulnerable piece in the information security defense: the user.
In order to better understand this situation we must first understand what MFA is, what it’s based on and how it’s implemented in a large scale environment. With the ever increasing focus on confidentiality of the data it was realized that better security was needed, something that didn’t just rely on the memory of the user but something that was harder to obtain (something the user has or something the user is).
This talk will present the basics of the MFA and deep-dive on how can this be bypassed in order to gain access to the user’s account.

This presentation is co-presented with Mircea Nenciu, Senior Advisor – Technical Team Lead at Secureworks

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Gabriel Cirlig

Senior Software Engineer, Application & Threat Intelligence Ixia, a Keysight business

Mike Spicer

Consultant

SPEAKER INTERVIEW AVAILABLE

Alex Negrea

Co-Founder & CTO Appsulate

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS