Yury Chemerkin
Security Expert JSC Advanced Monitoring
BIOGRAPHY
Yury Chemerkin has ten years of experience in information security. He is multi-skilled security expert on security & compliance and mainly focused on privacy and leakage showdown. Key activity fields are EMM and Mobile Computing, IAM, Cloud Computing, Forensics & Compliance. He published many papers on mobile and cloud security, regularly speaks at conferences such as CyberCrimeForum, DefCamp, HackerHalted, NullCon, OWASP, CONFidence, Hacktivity, Hackfest, DeepSec Intelligence, HackMiami, NotaCon, BalcCon, Intelligence Sec, InfoSec NetSysAdmins, RootCon, PHDays, etc.
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
This talk is about how to use different techniques (including forensics) to break into data of mobile devices to define and quantify the severity of issues found by these methods. Some examples will be shown on popular apps everyone uses daily, some cases of various apps to highlight the exciting problems. This compilation is to answer questions about profiling of devices and apps: what, where, how, what features only and why based on your daily activities and places you visit (home, work, vacation, away from home). Also, games aka “privacy policy vs. technical audit” and practical cases are included. The scope of forensic solutions, and what it offers for security researchers and mobile customers covered by this talk include Elcomsoft, Paraben, MOBILedit, Cellebrite, and BelkaSoft.
The presentation will systematically review
i) security techniques to protect data used by developers,
ii) security techniques to protect data offered by OS vendor and either should be implemented by developers or activated by default,
iii) risk mitigation, profile activities and opportunities provided by security solutions,
iv) combining of knowledge of breaking tools into a database to manage risks,
v) current limitations and future directions of the solution. Also, future directions will be included in both common features and risk-defensive features of thinking about these problems that might help many customers.
Are you the next cyber security superstar?
If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.
Other speakers joining this year
Kirill Puzankov
Telecom Security Expert/Researcher Positive Technologies
Muhammad Mudassar Yamin
Research Fellow Norwegian University of Science and Technology
Georg Knabl
Freelance Technical Director, Senior Software Enginee Page On Stage
SPEAKER INTERVIEW AVAILABLEReady for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
COMPETITIONS
Sponsors & Partners
They help us make this conference possible.
POWERED BY
Orange „brings you closer to what matters to you”.
This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.
PLATINUM PARTNERS
Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.
Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.