Speakers

The second #SASatHome event will take place on 6 - 8, October. We are excited to introduce the brilliant minds who will share the unique knowledge and recent researches for the whole cyber security world in these difficult quarantine times.

Costin Raiu

Kaspersky

Costin specializes in analyzing advanced persistent threats and high-level malware attacks. He is leading the Global Research & Analysis Team (GReAT) at Kaspersky that researched the inner workings of Stuxnet, Duqu, Carbanak and more recently, Lazarus, BlueNoroff, Moonlight Maze and the Equation group. Costin’s work includes analyzing malicious websites, exploits and online banking malware.

Costin specializes in analyzing advanced persistent threats and high-level malware attacks. He is leading the Global Research & Analysis Team (GReAT) at Kaspersky that researched the inner workings of Stuxnet, Duqu, Carbanak and more recently, Lazarus, BlueNoroff, Moonlight Maze and the Equation group. Costin’s work includes analyzing malicious websites, exploits and online banking malware.

Costin has over 24 years of experience in anti-virus technologies and security research. He is a member of the Virus Bulletin Technical Advisory Board, a member of the Computer AntiVirus Researchers’ Organization (CARO) and a reporter for the Wildlist Organization International.
 

Katie Moussouris

Luta Security

As a computer hacker with more than 20 years of professional cybersecurity

experience, Katie has a unique and unparalleled perspective on security research,

vulnerability disclosure, and bug bounties. Katie currently serves as the CEO and

Founder of Luta Security.

As a computer hacker with more than 20 years of professional cybersecurity

experience, Katie has a unique and unparalleled perspective on security research,

vulnerability disclosure, and bug bounties. Katie currently serves as the CEO and

Founder of Luta Security. She also serves as an advisor for several governments and

large organizations around the world. Working with the U.S. Department of Defense,

Katie led the launch of the U.S. government’s first bug bounty program, "Hack the

Pentagon." During her tenure with Microsoft, her work included industry-leading

initiatives such as Microsoft Vulnerability Research and the company's first bug

bounty program. Katie is also the co-author and co-editor of ISO 29147 vulnerability

disclosure, ISO 30111 vulnerability handling processes, and ISO 27034 secure

development. She is a visiting scholar with the MIT Sloan School and a cybersecurity

fellow at New America and the National Security Institute. Additionally, Katie also

served as a Harvard Belfer affiliate, an advisor to the Center for Democracy and

Technology, as well as a CFP review board member for several conferences including

RSA USA, O'Reilly Security, Hack In The Box (HITB), and Shakacon. In 2018, Katie

was featured in two, Forbes’ lists: The World’s Top 50 Women in Tech and America’s

Top 50 Women in Tech.  

Joe Fitzpatrick

SecuringHardware.com

Joe is a Trainer and Researcher at SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and penetration testing of CPUS, SOCs, and microcontrollers.

Joe is a Trainer and Researcher at SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and penetration testing of CPUS, SOCs, and microcontrollers. He has spend the past 5 years developing and leading hardware security related training, instructing hundreds of security researchers, pen testers, and hardware validators worldwide. When not teaching Applied Physical Attacks courses, Joe is busy developing new course content or working on contributions to the NSA Playset and other misdirected hardware projects, which he regularly presents at all sorts of fun conferences.

Kris McConkey

PwC

Kris leads our Cyber Threat Detection and Response team which comprises of highly specialised cybersecurity professionals. He is responsible for the delivery of our cyber threat response capabilities which enables clients to resist, detect and respond to advanced cyber attacks. Focusing on cybercrime, espionage investigations and technical countermeasures, his team is regularly called on to investigate and contain network intrusions and provide actionable threat intelligence to clients in crisis situations.

Kris leads our Cyber Threat Detection and Response team which comprises of highly specialised cybersecurity professionals. He is responsible for the delivery of our cyber threat response capabilities which enables clients to resist, detect and respond to advanced cyber attacks. Focusing on cybercrime, espionage investigations and technical countermeasures, his team is regularly called on to investigate and contain network intrusions and provide actionable threat intelligence to clients in crisis situations.

Since joining PwC, Kris has led complex and multinational civil and criminal investigations that require advanced digital forensics and data mining. He also has a strong background working closely with legal counsel on strategies for data retention, collection, analysis and disclosure on a number of high profile regulatory compliance investigations involving both structured and unstructured data. Kris has a wealth of experience in malware reverse engineering and secure systems and network architecture design.

Want to be a Speaker next year?

We are especially looking for presentations and research showcasing the following areas:

  • Advanced malware threats
  • Mobile device exploitation
  • Threats against banks, financial institutions:
    • PoS systems
    • ATMs
    • Crypto-currencies
    • E-commerce data breaches
  • Critical infrastructure protection (SCADA/ICS)
  • Internet of Things:
    • Autonomous transportation (self-driving cars, drones)
    • Smart homes and smart devices
    • Smart cities
  • Attacks on medical devices
  • Threats to Gaming industry:
    • Game cheats and defense mechanisms
    • Server and client-side vulnerabilities
    • Industrial espionage targeting gaming industry
    • Mass infections via gaming vendor breach
  • Cross-border law-enforcement coordination and information sharing
  • Vulnerability discovery and responsible disclosure
  • Techniques for development of secure software and systems
  • Side Channel and Physical Attacks
  • Blockchain and smart contracts

We use cookies to make your experience of our websites better. By using and further navigating this website you accept that some of your browsing activity can be recorded in cookies. Detailed information about the use of cookies on this website is available by clicking on more information.