Speakers

#SASatHome took place on 28-30, April. We are excited to introduce the brilliant minds who shared the unique knowledge and recent researches for the whole cyber security world in these difficult quarantine times.

Costin Raiu

Kaspersky

Costin specializes in analyzing advanced persistent threats and high-level malware attacks. He is leading the Global Research & Analysis Team (GReAT) at Kaspersky that researched the inner workings of Stuxnet, Duqu, Carbanak and more recently, Lazarus, BlueNoroff, Moonlight Maze and the Equation group. Costin’s work includes analyzing malicious websites, exploits and online banking malware.

Costin specializes in analyzing advanced persistent threats and high-level malware attacks. He is leading the Global Research & Analysis Team (GReAT) at Kaspersky that researched the inner workings of Stuxnet, Duqu, Carbanak and more recently, Lazarus, BlueNoroff, Moonlight Maze and the Equation group. Costin’s work includes analyzing malicious websites, exploits and online banking malware.

Costin has over 24 years of experience in anti-virus technologies and security research. He is a member of the Virus Bulletin Technical Advisory Board, a member of the Computer AntiVirus Researchers’ Organization (CARO) and a reporter for the Wildlist Organization International.
 

Thomas Rid

Johns Hopkins SAIS

Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies, previously serving as a Professor of Security Studies in the Department of War Studies at King’s College London, where he developed a Cyber Security module that bridged the gap between technological and political debates.

He has held positions at the RAND Corporation in Washington, the Institut Français des Relations Internationales in Paris, and served as a visiting scholar at Hebrew University and Shalem Center in Jerusalem. From 2007 to 2008, Rid served as a Visiting Scholar at the Center for Transatlantic Relations at Johns Hopkins SAIS. He holds a PhD and MA in Social Science from Humboldt University in Berlin. 

Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies, previously serving as a Professor of Security Studies in the Department of War Studies at King’s College London, where he developed a Cyber Security module that bridged the gap between technological and political debates.

Thomas has recently shared his expertise on information security through testimony before the U.S. Senate Select Committee on Intelligence, as well as insights on intelligence with the German Bundestag and the UK Parliament.

Rid closely tracked the election interference in 2016, and was one of the first named sources to call out the hack-and-leak as a Russian intelligence operation, only one day after details became public.

He has held positions at the RAND Corporation in Washington, the Institut Français des Relations Internationales in Paris, and served as a visiting scholar at Hebrew University and Shalem Center in Jerusalem. From 2007 to 2008, Rid served as a Visiting Scholar at the Center for Transatlantic Relations at Johns Hopkins SAIS. He holds a PhD and MA in Social Science from Humboldt University in Berlin. 

Joe Fitzpatrick

SecuringHardware.com

Joe is a Trainer and Researcher at SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and penetration testing of CPUS, SOCs, and microcontrollers.

Joe is a Trainer and Researcher at SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and penetration testing of CPUS, SOCs, and microcontrollers. He has spend the past 5 years developing and leading hardware security related training, instructing hundreds of security researchers, pen testers, and hardware validators worldwide. When not teaching Applied Physical Attacks courses, Joe is busy developing new course content or working on contributions to the NSA Playset and other misdirected hardware projects, which he regularly presents at all sorts of fun conferences.

Anton Ivanov

Kaspersky

Anton joined Kaspersky in 2011 as a malware analyst. For five years he worked as a senior malware analyst in the company’s heuristic detection group. In 2016, Anton started leading the behavioral detection team. The team’s main focus was to proactively protect customers from different kinds of malware threats, including ransomware.

Anton joined Kaspersky in 2011 as a malware analyst. For five years he worked as a senior malware analyst in the company’s heuristic detection group. In 2016, Anton started leading the behavioral detection team. The team’s main focus was to proactively protect customers from different kinds of malware threats, including ransomware.

In 2019, Anton became Vice President of Threat Research. In addition, Anton is a well-known speaker at security conferences.

Anton graduated from Russia’s Higher School of Economics in 2013, with a degree in information technology. In 2015, he received a master's degree in economics from the Russian Presidential Academy of National Economy and Public Administration under the President of the Russian Federation. He is the author of several patents in the field of malware detection.

Want to be a Speaker next year?

We are especially looking for presentations and research showcasing the following areas:

  • Advanced malware threats
  • Mobile device exploitation
  • Threats against banks, financial institutions:
    • PoS systems
    • ATMs
    • Crypto-currencies
    • E-commerce data breaches
  • Critical infrastructure protection (SCADA/ICS)
  • Internet of Things:
    • Autonomous transportation (self-driving cars, drones)
    • Smart homes and smart devices
    • Smart cities
  • Attacks on medical devices
  • Threats to Gaming industry:
    • Game cheats and defense mechanisms
    • Server and client-side vulnerabilities
    • Industrial espionage targeting gaming industry
    • Mass infections via gaming vendor breach
  • Cross-border law-enforcement coordination and information sharing
  • Vulnerability discovery and responsible disclosure
  • Techniques for development of secure software and systems
  • Side Channel and Physical Attacks
  • Blockchain and smart contracts

We use cookies to make your experience of our websites better. By using and further navigating this website you accept that some of your browsing activity can be recorded in cookies. Detailed information about the use of cookies on this website is available by clicking on more information.