Speakers

#TheSAS2020 is exited to announce the brilliant minds who will share the unique knowledge and recent researches in the field of cyber security.

Costin Raiu

Kaspersky

Costin specializes in analyzing advanced persistent threats and high-level malware attacks. He is leading the Global Research & Analysis Team (GReAT) at Kaspersky that researched the inner workings of Stuxnet, Duqu, Carbanak and more recently, Lazarus, BlueNoroff, Moonlight Maze and the Equation group. Costin’s work includes analyzing malicious websites, exploits and online banking malware.

Costin specializes in analyzing advanced persistent threats and high-level malware attacks. He is leading the Global Research & Analysis Team (GReAT) at Kaspersky that researched the inner workings of Stuxnet, Duqu, Carbanak and more recently, Lazarus, BlueNoroff, Moonlight Maze and the Equation group. Costin’s work includes analyzing malicious websites, exploits and online banking malware.

Costin has over 24 years of experience in anti-virus technologies and security research. He is a member of the Virus Bulletin Technical Advisory Board, a member of the Computer AntiVirus Researchers’ Organization (CARO) and a reporter for the Wildlist Organization International.
 

Maddie Stone

Google

Maddie Stone is a Security Engineer on the Android Security team at Google. She has spent many years deep in the circuitry and firmware of embedded devices including 8051, ARM, C166, MIPS, PowerPC, BlackFin, the many flavors of Renesas, and more. Maddie has previously spoken at conferences including REcon Montreal, DerbyCon, and the Women in Cybersecurity Conference.
 

Maddie Stone is a Security Engineer on the Android Security team at Google. She has spent many years deep in the circuitry and firmware of embedded devices including 8051, ARM, C166, MIPS, PowerPC, BlackFin, the many flavors of Renesas, and more. Maddie has previously spoken at conferences including REcon Montreal, DerbyCon, and the Women in Cybersecurity Conference.
 

Thomas Rid

Johns Hopkins SAIS

Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies, previously serving as a Professor of Security Studies in the Department of War Studies at King’s College London, where he developed a Cyber Security module that bridged the gap between technological and political debates.

He has held positions at the RAND Corporation in Washington, the Institut Français des Relations Internationales in Paris, and served as a visiting scholar at Hebrew University and Shalem Center in Jerusalem. From 2007 to 2008, Rid served as a Visiting Scholar at the Center for Transatlantic Relations at Johns Hopkins SAIS. He holds a PhD and MA in Social Science from Humboldt University in Berlin. 

Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies, previously serving as a Professor of Security Studies in the Department of War Studies at King’s College London, where he developed a Cyber Security module that bridged the gap between technological and political debates.

Thomas has recently shared his expertise on information security through testimony before the U.S. Senate Select Committee on Intelligence, as well as insights on intelligence with the German Bundestag and the UK Parliament.

Rid closely tracked the election interference in 2016, and was one of the first named sources to call out the hack-and-leak as a Russian intelligence operation, only one day after details became public.

He has held positions at the RAND Corporation in Washington, the Institut Français des Relations Internationales in Paris, and served as a visiting scholar at Hebrew University and Shalem Center in Jerusalem. From 2007 to 2008, Rid served as a Visiting Scholar at the Center for Transatlantic Relations at Johns Hopkins SAIS. He holds a PhD and MA in Social Science from Humboldt University in Berlin. 

Kris McConkey

PwC

Kris leads our Cyber Threat Detection and Response team which comprises of highly specialised cyber security professionals. He is responsible for the delivery of our cyber threat response capabilities which enables clients to resist, detect and respond to advanced cyber attacks. Focusing on cyber crime, espionage investigations and technical countermeasures, his team is regularly called on to investigate and contain network intrusions and provide actionable threat intelligence to clients in crisis situations.

Kris leads our Cyber Threat Detection and Response team which comprises of highly specialised cyber security professionals. He is responsible for the delivery of our cyber threat response capabilities which enables clients to resist, detect and respond to advanced cyber attacks. Focusing on cyber crime, espionage investigations and technical countermeasures, his team is regularly called on to investigate and contain network intrusions and provide actionable threat intelligence to clients in crisis situations.

Want to be a Speaker next year?

We are especially looking for presentations and research showcasing the following areas:

  • Advanced malware threats
  • Mobile device exploitation
  • Threats against banks, financial institutions:
    • PoS systems
    • ATMs
    • Crypto-currencies
    • E-commerce data breaches
  • Critical infrastructure protection (SCADA/ICS)
  • Internet of Things:
    • Autonomous transportation (self-driving cars, drones)
    • Smart homes and smart devices
    • Smart cities
  • Attacks on medical devices
  • Threats to Gaming industry:
    • Game cheats and defense mechanisms
    • Server and client-side vulnerabilities
    • Industrial espionage targeting gaming industry
    • Mass infections via gaming vendor breach
  • Cross-border law-enforcement coordination and information sharing
  • Vulnerability discovery and responsible disclosure
  • Techniques for development of secure software and systems
  • Side Channel and Physical Attacks
  • Blockchain and smart contracts

We use cookies to make your experience of our websites better. By using and further navigating this website you accept that some of your browsing activity can be recorded in cookies. Detailed information about the use of cookies on this website is available by clicking on more information.