Yury Chemerkin

InfoSecurity Researcher

ABOUT

Yury Chemerkin started as a reverser and security developer and continued to gain experience on malware and mobile security. Last years he has been researching Mobile and Cloud solutions (and IAM solutions in general) for exploitation from different viewpoints (incl. forensics) based on misunderstood security principles and developing as a distributed spyware infrastructure. Now he is a multi-skilled security expert on security & compliance and mainly focused on privacy and leakage showdown. Key activity fields are EMM and Mobile Computing, IAM, Cloud Computing, Forensics & Compliance.

Presentation: Privacy in Mobile Apps. Enterprise Opportunities

Enterprise mobility management is a partially new security approach & framework that helps to protect any activities raised by mobile environment. EMM key components (solutions) are MDM, MAM, MIM, MEM and other 3rd party components (solutions). The most important one to research is MAM & MIM (Mobile Application Management & Mobile Information Management) handle all data flow on data protection and access. Before you start managing applications, you need to know something more about in-security and in-privacy of chosen applications. This knowledge is must have knowledge to repackage (redevelop) original application with implementation of missing security interfaces allowed to centralized management.
The research goal is analyzes methods developed to reveal resources must be protected. These methods help to evaluate and estimate effectiveness of application & information security against available activities and features; evaluate how critical the emerging risk is. Another part of research is adoption of digital forensics in alignment of mobile computing needs; on other hand, it’s recreation of decision-making knowledge database to help to pick up information to provide a wanted granularity to manage an application & information security. Finally, this knowledge database is cornerstone right before you develop your application (security) wrapper and repackage it.
Extra Bonus – BlackPhone

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Silviu Sofronie

Forensics, Sysadmin, DEV-Ops, Networking, Jazz and (in)Security Addict

Raoul “Nobody” Chiesa

Founder & President The Security Brokers

Matthew Halchyshak

Security Technician Security Innovation

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange „brings you closer to what matters to you”.

This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNER
VIP & SPEAKERS LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS