Raj Samani, McAfee EMEA
Raj Samani is an active member of the information Security industry, through involvment with numerous initiatives to improve the awarness and application of security in business and society. he is currently working as the VP, Chief Technical Officer for McAfee EMEA, having previously worked as the Chief Information Security officer for a large public sector organisation in the UK and recently industed into the Infosecurity Europe Hall of Fame (2012). He previously worked across numerous public sector organisations, in many cyber security and research orientated working groups across Europe. Examples include midata Interoperability Board, as well as representing DIGITALEUROPE on the Smart Grids Reference Group established by the European Commission in support of the Smart Grid mandate, and is author of the recent Syngress book "Applied cyber Security and the Smart Grid". In addition, Raj is currently the Cloud Security Alliance's Chief Innovation Officer and previously served as Vice president for Comunications in the ISSA UK Chapter where he presided over the award of Chapter Communications Programme of the year 2008 and 2009. he is also Special Advisor for the European cyberCrime Centre, also on the advisory council for the Infosecurity Europe show, Infosecurity magazine, and expert on both searchsecurity.co.uk and Infosec portal, and regular columnist on Computer Weekly. He has had numerous security papers published, and appeared on televison commenting on computer security issues. he has also provided assistance in the 2006 RSA Wireless Security Survey and part of the consultation committee for the RIPA Bill (Part 3).
Federico Maggi, Politecnico di Milano
Federico Maggi is interested in various topics under the “cyber security” and "cyber crime" umbrella terms, including threat analysis and intelligence, malware analysis, mobile malware, fraud analysis and detection, web- and social-network security and data visualization. A distinctive aspect of his work on threat analysis is the use of learning-based and otherwise data-driven approaches.
He is currently an Assistant Professor at Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano in Italy. He has been the General Chair of DIMVA 2015, PC chair of EUC 2014 and PC member of several conferences and workshops including TRUST, MALCON, DIMVA, CSS, SecureComm, WISTP. He received a National grant (FIRB 2013) of about 250kEUR to investigate on advanced techniques for malware detection. Moreover, he is and has been actively involved in 3 successful EU projects and 1 national project. He has given several lectures and talks as an invited speaker at international venues and research schools. His research is recognized by other research groups with which he collaborates, namely: UCSB, FORTH, NEU, Stony Brook, KU Leven, and RHUL. During his Doctorate, he made contributions in the field of intrusion detection: he has developed and tested anomaly-based tools to mitigate Internet threats by (1) avoiding their spread via vulnerable web applications, (2) detecting unexpected activities in the operating system’s kernel (sing of malware infections or compromised processes), and (3) dealing with high number of alerts using alert correlation.
Zubair Khan, Tranchulas
Zubair Khan is CEO of Tranchulas. He has more than a decade of industry experience in assessing and implementing IT security of large enterprises. Zubair has conducted security trainings at various forums. He has previously presented at renowned security conferences including Hack.lu Luxembourg, Hack In The Box Malaysia, ISS World. He is Honoree for Asia-Pacific Information Security Leadership Achievement Program by (ISC)2. He is CISA, CISM and also ISO27001 Auditor. Zubair holds a bachelor’s degree in Business IT from Curtin University of Technology, Australia.
Jurica Čular, Croatian Government's CERT
Jurica Čular graduated at Faculty of electronics and computer science, Zagreb, Croatia as Master of Computer Science. Got an MBA in finance and marketing at Kelley School of Business, Indiana University. Holds several information security certificates CISA, CISSP, ISO 27001 LA.Worked as an information security consultant for financial institutions and for Deloitte. Currently working as an expert advisor in Information Systems Security Bureau.
Miroslav Štampar, Croatian Goverment's CERT
IT Security Advisor - Expert at Croatian Government's CERT, part of the Information Systems Security Bureau (ZSIS), born 1982 in Vukovar, Croatia. Writing computer code for as long as I can remember. A PhD candidate with Master's Degree in Computer Science at Faculty of Electrical Engineering and Computing (FER), University of Zagreb, Croatia. Hacker, problem solver, occasional CTFer and one of sqlmap authors, open source project for automated detection and exploitation of SQL injection vulnerabilities. Also, Croatian Chapter Lead for The Honeynet Project.
Zsolt Nemeth, Camphora Consulting
Zsolt Nemeth is a serial entrepreneur who set up and run businesses in cyber security. His main interests are cryptography and network security. He founded MDS Ltd in the UK. He has consulted for financial institutions and built up bespoke solutions for them. After selling the company he has founded MDS Holding that has scouted, bought and licenced technologies. Now he runs a startup based on Fraunhofer's technology. He has 11 years of experience in startups. Zsolt holds a Master of Science degree in Economics from Szechenyi Istvan University and a Master of Science degree in Applied Mathematics from Ecole National Superieure. Zsolt also obtained a business degree at Brookes University, Oxford.
Saša Jušić, Infigo IS d.o.o.
Saša graduated in 2001 at the Faculty of Electrical Engineering and Computing, University of Zagreb. He was employed in the Department of Electronic Systems and Information Processing (ZESOI) as an associate on information security projects. At the Faculty of Electrical Engineering and Computing he managed and actively participated in numerous projects related to planning, testing and assessment of information systems security. Since 2006, he continues his professional career as a senior information security consultant for INFIGO IS. During his professional career, he demonstrated a special interest for security vulnerabilities detection, exploitation and prevention techniques. Within INFIGO IS, Saša is in charge of development and planning of information security technical services, such as penetration tests, forensic analysis, security incident solutions and similar. Saša is a certified information systems auditor (CISA), and also a certified information security specialist (CISSP and CompTIA Security+). Saša has 15 years of experience as an information security expert/consultant.
Nenad Andrejević, Comtrade d.o.o.
Experienced IT professional with twenty years of experience in all phases of implementation, integration and support of complex IT projects, Smart Meter Infrastructure (SMI), Meter Data Management (MDM) and Disaster Recovery (DR) projects to utilities, and local/provincial governments.
Mitja Kolšek, Acros d.o.o.
Mitja Kolsek’s last 15 years of career comprise co-leading a small security outfit which ran APT-like attack simulations before China was guilty of everything, using SQL injection before it had a name, and discovering vulnerability types which were previously unknown. In addition to finding and exploiting vulnerabilities, his next 15 years will be augmented by fixing them. Most of all he’d like to leave information security some day in a state where it’ll be seriously difficult to break into a typical network deploying standard and inexpensive security solutions.
Jorge Sebastiao, CISSP
ICT Expert and Cloud Practice Leader Huawei
Mr. Sebastiao has been the speaker at numerous international security conferences.
He is seasoned security and ICT professional focused on business value; Jorge brings experience, creativity, structure & innovation to. With over 28 years of ICT experience, covering, information security, managed services, as well as risk management, compliance, auditing, certification, business continuity, and disaster recovery. Served sectors include oil & gas, banking, financial, telecom, government, defense, health care, and education. He created the process A6 of security: Assess, Architect, Apply, Administer, Awareness and Agility. He architects practical & business focused solutions using standards and industry best practices.
Personal Quote “Information security is a continuous skilled process…that requires thought…”
Take advantage of a special price, only valid until 08.04.2020!
Prices do not include VATREGISTER NOW