Friday 6 October 11:30 - 12:00, Green roomBart Parys (PwC)
With a 225,000+ workforce which spans more than 150 countries, and with most major organizations in the world as clients, PwC is on the receiving end of a wide variety of both commodity and targeted threat activity.
This technical talk will outline some of the more interesting techniques and targeting we have observed against our own corporate network over the last six months, with a focus on both the details of the techniques as well as some of the adversaries behind the activity.
Bart Parys has worked for over seven years in the IT industry and is currently a threat intelligence analyst at PwC. Before joining PwC, he worked for several years in the anti-virus industry at Panda Security as a malware researcher. Currently, his focus lies in tracking and hunting Advanced Persistent Threat groups.
His main interests range from anything malware-related to psychology and languages (and one does not exclude the other!).
Bart is fluent in Dutch, English, French and German.
John Graham-Cumming (Cloudflare)
In February 2017, Cloudflare was revealed to have been leaking private information including HTTP headers, cookies and POST data…
Tyrus Kamau (Euclid Consultancy)
The cyber threats Kenya faces range from basic hacking such as website defacements, financial fraud, social media account…
Juan Andres Guerrero-Saade (Kaspersky Lab)
Costin Raiu (Kaspersky Lab)
Attribution is complicated under the best of circumstances. Sparse attributory indicators and the possibility of overt…