Hunting for APT in network logs (Workshop)

Hunting for APT in network logs (Workshop)

You have already seen Bogdan in “Attacks on Windows Infrastructure” announce. So let us introduce to you his team-mate Oleh Levytskyi.Oleh has 4 years experience as a full time IT-Security Analyst I am currently responsible for malicious software analysis, forensics,...
Centralised Monitoring and Alerting system over AWS

Centralised Monitoring and Alerting system over AWS

Please meet Divyanshu Mehta. He is a Security Engineer @ CRED By the way, Saransh Rana is a Security Engineer@CRED also. He likes to break network, cloud and application logics and in free time like to automate all the findings to take away the pain of re-testing the...
Android Application Hacking with Damn Vulnerable Bank

Android Application Hacking with Damn Vulnerable Bank

Rewanth Tammana is a security ninja, open-source contributor, and Senior Security Architect at Emirates NBD. He is passionate about DevSecOps, Application, and Container Security. He added 17,000+ lines of code to Nmap (famous as Swiss Army knife of network...
Why the Options Pattern is Great for Security

Why the Options Pattern is Great for Security

Dima Kotik is application security engineer and lead curriculum contributor for Go, Python, and ES6 at @SecurityJourney. Aspiring to become a gentle FOSS maverick by age 60. The speaker will demonstrate three security benefits of the options pattern for object...