[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    RE: [EXTERNAL] CALL FOR PAPERS - Hackers 2 Hackers Conference 16th edition
From:       Michael Artemio Go Rebultan <mrebultan () ap ! equinix ! com>
Date:       2019-04-08 7:00:13
Message-ID: BYAPR04MB4679EC6C5B8F7A098AAA0DE8872C0 () BYAPR04MB4679 ! namprd04 ! prod ! outlook ! com
[Download RAW message or body]

[Attachment #2 (text/plain)]

Hi Rodrigo:
Thank you so much for this CFP. Kindly see attached from my end.

In my talk on the incoming "2019 Industrial Control Systems (ICS) Cyber Security \
Conference | Singapore" (https://www.icscybersecurityconference.com/singapore/), I \
will be covering Zero-day & fileless malware hunting in operational Technology (OT) \
environment which shows the persistence attacks from different threat actors and \
their cleverness.


It's a pleasure be of service!

Warmest regards,
Mike Rebultan, MIT|GrDip-DFCS|CEH|ECSA|CHFI |IFCI-CCI
Global Information Security - Operations/DFIR

-----Original Message-----
From: Rodrigo Rubira Branco (BSDaemon) <rodrigo@kernelhacking.com> 
Sent: Monday, April 8, 2019 12:32 PM
To: bugtraq@securityfocus.com
Subject: [EXTERNAL] CALL FOR PAPERS - Hackers 2 Hackers Conference 16th edition


CALL FOR PAPERS - Hackers 2 Hackers Conference 16th edition

The call for papers for H2HC 16th edition is now open.  H2HC is a hacker conference \
taking place in Sao Paulo, Brazil, on 26th and 27th of October 2019.


[ - INTRODUCTION - ]

For another consecutive year and past success we have been having, the annual Hackers \
2 Hackers Conference will be held again in Sao Paulo, on 26 and 27 of october of 2019 \
and aims to get together industry, government, academia and underground hackers to \
share knowledge and leading-edge ideas about information security and everything \
related to it.

H2HC will feature national and international speakers and attendees with a wide range \
of skills. The atmosphere is favorable to present all facets of computer security \
subject and will be a great opportunity to network with like-minded people and \
enthusiasts.

The conference is a dual-language conference, with ALL talks in the main track in \
English or simultaneously translated to English by professional linguists with \
experience in computer sciences translation.


[ - ABOUT THE LOCAL - ]

H2HC 16th Edition will take place at Novotel Center Norte, and expect to have around \
1300 attendees in each day of the event.  The conference has two tracks, is open-bar \
(whiskey, vodka, beer, water, soda - minors are not allowed to drink alcoholic drink \
during the event) and has many other goodies (Capture-the-flag games, maker spaces \
and many workshops).


[*] About Sao Paulo (taken from fiquemaisumdia.com.br)

The city is the largest in Brazil and first in South America by population. Quite \
often Sao Paulo intimidates people because of its size, its constant pedestrian and \
vehicle traffic, ethnic and cultural multiplicity. Sao Paulo will surprise you \
whether you come here on business or for an expo, a congress or a convention, stay \
for at least one more day. Let yourself be seduced by the cultural diversity of this \
many-faceted city which vibrates, dictates fashion, is always anticipating trends, \
and welcomes Brazilians and foreigners from all over. And oh, do not forget to have \
fun in South America's wildest night life.


[ - TOPICS - ]

H2HC committee gives preference to lectures with practical demonstration. The \
conference staff will try to provide every equipment needed for the presentation in \
the case the author cannot provide them.

The following topics include, but are not limited to:
* Exploit development techniques
* Telecom security and phone phreaking
* Fuzzing and application security test
* Penetration testing
* Web application security
* Techniques for development of secure software and systems
* Hardware hacking, embedded systems and other electronic devices
* Mobile devices exploitation, Symbian, P2K and bluetooth technologies
* Analysis of virus, worms and all sorts of malwares
* Reverse engineering
* Rootkits
* Security in Wi-Fi and VoIP environments
* Information about smartcard and RFID security and similars
* Technical approach to alternative operating systems
* Denial of service attacks and/or countermeasures
* Security aspects in SCADA and industrial environments and "obscure"
networks
* Cryptography
* Lockpicking, trashing, physical security and urban exploration
* Internet, privacy and Big Brother
* Information warfare and industrial espionage


[ - IMPORTANT DATES - ]

Conference and trainings - H2HC Sao Paulo/Brazil

24 and 25, 28 and 29 of october: H2HC Trainings
26 and 27 of october of 2019: H2HC 16th Edition

Deadline and submissions

Deadline for proposal submissions: 17 of July of 2019 Deadline for slides \
submissions: 17 of August of 2019

Notification of acceptance or rejection: no before than 10 of August of 2019

 * E-mail for proposal submissions: cfp *noSPAM* h2hc *dot* com *dot* br


Make sure to provide along with your submission the following details:
* Speaker name or handle, address, e-mail, phone number and general contact \
                information
* A brief but informative description about your talk
* Short biography of the presenter, including organization, company and affiliations
* Estimated time-length of presentation
* General topic of the speech (eg.: network security, secure programming, computer \
                forensics, etc.)
* Any other technical requirements for your lecture
* Whether you need visa to enter Brazil or not (this is very important)

Speakers will be allocated 50 minutes of presentation time, although, if needed, we \
can extend the presentation length if requested in advance.

Preferable file format for papers and slides are both PDF and/or PPT.

Speakers are asked to hand in slides used in their lectures.  We do have recording \
for all talks, let us know if you prefer that we do not make the video of yours \
available.

PLEASE NOTE: Bear in mind no sales pitches will be allowed. If your presentation \
involves advertisement of products or services please do not submit.


[ - INFORMATION TO SPEAKERS - ]

Speakers' privileges are:
* H2HC staff can guarantee and we will provide accommodation for 3 nights
* For each non-Brazil resident speaker we might be able to cover travel expenses up \
                to USD 1,200.00
* For each Brazil resident speaker we cover travel expenses
* Free pass to the conference
* Parties! Plenty of parties... Hope you enjoy it, otherwise you can stay in the \
hotel, sleep and regret!...


[ - Program Committe - ]

pipacs - Maintainer, PaX Project
spender - Maintainer, GRSecurity Project Stefano Zanero - Professor, Politecnico di \
Milano Alexander Matrosov - Embedded Security Lead, NVIDIA BSDaemon - Chief Security \
Researcher, Intel Corporation Natalie Silvanovich - Security Researcher, Google \
Project Zero Marion Marschalek - Senior Security Researcher, Intel Corporation


[ - Other information - ]

For further information please check out our web site https://www.h2hc.com.br/ it \
will be updated with everything regarding the conference.


[ - GPG Key - ]

We recommend to encrypt all communications. Our key fingerprint: 17BA 5D5B 40C0 CA12 \
0965 CD30 C379 9510 8462 0E28


["Hackers 2 Hackers Conference - TALK.txt" (text/plain)]

SPEAKER'S INFO
Name and or Handle *: Mike Art Rebultan aka "Strainer"
Email Address *: mrebultan@equinix.com
Mobile Number *: +65.84820917
Title and Company : DFIR/SecOps/Purple Team (APAC Lead) - Global IT & OT / @Equinix \
Inc. Location *: Singapore
Brief Bio: *:  More than 8 years of Unix Systems Administration experience plus 8 \
years of IT security practitioner in cybercrime investigation and incident response \
in ICS/SCADA environment. Currently based in Singapore as a purple team lead in APAC \
security operations. Holds both a master’s degree in IT and a graduate diploma in \
digital forensics and cybersecurity.


PRESENTATION INFO
Presentation Title *: LET'S LAUNCH CYBER-KINETIC ATTACK | As Easy As 1-2-3
Abstract *:
The “how” is no longer a question in today’s advanced persistent threat (APT) as \
exploits’ availability becomes rampant from both shallow and the dark web but “when” \
where every control system’s security professionals and incident responders are not \
yet ready. 

And just imagine life without electricity and fuel that controls and gives every \
comfort we have today; air-condition, communications, medical supplies, \
transportations, foods and drinks, and even military defense that supposed to protect \
the Filipino people is down. With the very fast evolving landscape of cybersecurity \
threats to all critical and industrial firms, this precious life can be destroyed in \
just a blink of an eye anytime that no one is prepared for survival.

By leveraging the open source intelligence (OSINT), this presentation will showcase \
how simply an attacker could launch a cyber-kinetic attack and educate military, \
government authorities, and private sectors on defending their turf to prevent \
“Firesale” and cause catastrophic incident proactively.

This presentation is a vendor-neutral and no sales pitch but to highlight the timely \
wake-up call for all security researchers and practitioners in every nation against \
Cyber Warfare that everyone thought’s a myth.


KEY TAKE AWAY
1.	Be enlighten on the huge differences between IT and OT and how Incident Responders \
will fit to cover both environment. 2.	Practical implementation of Defense-in-Depth \
for both IT and OT against APT’s. 3.	Learn and apply the best practices in ICS/SCADA \
and IT security. 4.	Understand Cyber-Kinetic attack and how to mitigate the risks.
5.	Equip attendees with the most dangerous threat in the Cyber-world.


TARGET AUDIENCE
1.	Government Officials and Authorities
2.	Private sectors from Aerospace, Maritime, Water & Waste, Industrial, Energy & \
Electrical Grid, Oil & Gas 3.	Financial and Banking Organizations
4.	Telecommunication and Data Center Companies
4.	Security Researchers and Consultants
5.	Defenders and Red Teamers



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic