Yury Chemerkin

Security Expert JSC Advanced Monitoring

BIOGRAPHY

Yury Chemerkin has ten years of experience in information security. He is multi-skilled security expert on security & compliance and mainly focused on privacy and leakage showdown. Key activity fields are EMM and Mobile Computing, IAM, Cloud Computing, Forensics & Compliance. He published many papers on mobile and cloud security, regularly speaks at conferences such as CyberCrimeForum, DefCamp, HackerHalted, NullCon, OWASP, CONFidence, Hacktivity, Hackfest, DeepSec Intelligence, HackMiami, NotaCon, BalcCon, Intelligence Sec, InfoSec NetSysAdmins, RootCon, PHDays, etc.

Mobile, IoT, Clouds… It’s time to hire your own risk manager!

This talk is about how to use different techniques (including forensics) to break into data of mobile devices to define and quantify the severity of issues found by these methods. Some examples will be shown on popular apps everyone uses daily, some cases of various apps to highlight the exciting problems. This compilation is to answer questions about profiling of devices and apps: what, where, how, what features only and why based on your daily activities and places you visit (home, work, vacation, away from home). Also, games aka “privacy policy vs. technical audit” and practical cases are included. The scope of forensic solutions, and what it offers for security researchers and mobile customers covered by this talk include Elcomsoft, Paraben, MOBILedit, Cellebrite, and BelkaSoft.
The presentation will systematically review
i) security techniques to protect data used by developers,
ii) security techniques to protect data offered by OS vendor and either should be implemented by developers or activated by default,
iii) risk mitigation, profile activities and opportunities provided by security solutions,
iv) combining of knowledge of breaking tools into a database to manage risks,
v) current limitations and future directions of the solution. Also, future directions will be included in both common features and risk-defensive features of thinking about these problems that might help many customers.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Adrian Tudor

SOC Team Lead SecureWorks

Ionut-Cristian Bucur

Security Research Intern, Application & Threat Intelligence Ixia, a Keysight Business

Jayson E. Street

VP Infosec at SphereNY

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange „brings you closer to what matters to you”.

This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNER
VIP & SPEAKERS LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS