Adam Haertle – until recently CSO of a large polish telecommunications company, currently editor in chief of an infosec portal, journalist, researcher, lecturer and trainer. Former ISACA Poland and CSA Poland Board member. A regular speaker at security-oriented conferences, big fan of security and privacy who does not always follow his own advice.
Adam Lange – information security professional with strong experience in malware detection, analysis and prevention. Keeping an eye on clients assets in one of the largest Polish financial institutions, architecting, developing and maintaining security systems and software.
Piotr Konieczny has been helping the biggest Polish and foreign companies to secure networks and web services for 13 years. A graduate of Glasgow Caledonian University. He started working in the IT industry at the British department of Philips Electronics. Founder of Niebezpiecznik.pl, a consultancy company analyzing IT projects in terms of security.
As part of Niebezpiecznik.pl, Piotr manages a team performing audits and penetration tests of ICT systems and conducts training for administrators and programmers in the field of computer network protection, as well as the creation of secure web applications.
Michal Purzynski leads the Threat Management and Incident Response at Mozilla. His team hunts threat actors and helps to protect hundreds of millions of Firefox users. He designed and created managed security services on a datacenter scale, and moved to Mozilla to continue making bad guys life’s miserable. He built the Network Security program, including the Network Security Monitoring system spanning three continents, eight countries, and a cloud. Michal publishes the code for the Bro IDS, spins Suricata above and beyond 40Gbit/sec and makes sure Mozilla has means to detect attacks and respond to them with a „they didn’t even know what hit them” efficiency. He continued sharing his knowledge at various conferences, such as SuriCon and BroCon. Michal is also a member of the Bro IDS Board of Directors.
Ronnie Tokazowski, aka iHeartMalware, is a Senior Threat Researcher with Agari who specializes in BEC intelligence. Ronnie also has experience reverse engineering APT malware and finds enjoyment by messing with threat actors.
Lukas Stefanko is an experienced malware researcher with a demonstrated history of working in the computer security industry. He is a strong engineering professional skilled in security research, Android and mobile security. Lukas joined ESET in 2011, and in the past couple of years, he has primarily focused on researching Android threats.
Vitali Kremez is a Director of Research at Flashpoint. He oversees analyst collection efforts and leads a technical team that specializes in researching and investigating complex cyber attacks, network intrusions, data breaches, and hacking incidents. Vitali is a strong believer in responsible disclosure and has helped enterprises and government agencies deliver indictments of many high-profile investigations involving data breaches, network intrusions, ransomware, computer hacking, intellectual property theft, credit card fraud, money laundering, and identity theft. Previously, Vitali enjoyed a rewarding career as a Cybercrime Investigative Analyst for the New York County District Attorney’s Office.
He has earned the majority of certifications available in the information technology, information security, digital forensics, and fraud intelligence fields. A renowned expert, speaker, blogger, and columnist, Vitali has contributed articles to Dark Reading, BusinessReview, and Infosecurity Magazine and is a frequent commentator on cybercrime, hacking incidents, policy, and security.
Paweł Opitek – doktor nauk prawnych, prokurator delegowany do Prokuratury Krajowej, ekspert Instytutu Kościuszki ds. Cyberbezpieczeństwa, członek Strumienia Blockchain/DLT i Waluty Cyfrowe przy Ministerstwie Cyfryzacji, Polskiego Towarzystwa Kryminalistycznego oraz Centrum Technologii Blockchain przy Uczelni Łazarskiego. Zajmuje się cyberprzestępczością, m.in. kryptowalutami, dowodami cyfrowymi, hakingiem, tokenizacją praw majątkowych. Prelegent na krajowych i międzynarodowych konferencjach naukowych, autor książek, publikacji i specjalistycznych opracowań z zakresu prawa i kryminalistyki. Wykładowca akademicki (SGH, AGH, KSSiP); realizator szkoleń dla służb ochrony prawa, prokuratorów, sędziów i adwokatów. Ukończył studia dziennikarskie, studium pedagogiki i psychologii, studia podyplomowe Cyberprzestępczość w bankowości elektronicznej; obecnie realizuje studia z zakresu prawa nowych technologii.
Dani Goland is a 24-year-old coding machine. At the age of 20, he founded his own boutique company for innovative software and hardware solutions. While gaining experience in the business field, Dani did not neglect his hands-on capabilities. In just a short while he won two coding competitions, one of which was held by eBay. Dani recently relocated from Israel to the United States to study Data Science at the prestigious UC Berkeley. After serving in the Israeli Defense Forces as a commander of a Field Intelligence unit, Dani went on an 8-month journey across South America. He loves snowboarding, music concerts, and having crazy, breathtaking experiences such as spending 5 days in the Bolivian Jungle with no food or water.
Ido Naor is a Senior Security Researcher at GReAT, a team of researchers who’ve been tasked by Kaspersky Lab to investigate the most prolific APT incidents, ransomware distribution, banking heists and other types of internet hacking monsters. Ido’s focusing on threats in the middle east and is actively following groups of hackers who aim to demolish the ordinary lives of citizens and public/gov institutes. In the following years, Ido has been reporting incidents such as the Instagram hack, for responsible disclosure, but also worked with the Israeli military on the case where hackers aimed to spy on soldiers. Both have been widely presented in the media. Ido is 31 years old, a martial arts experts and a father of 3, lives in Tel Aviv, Israel. He served at one of the most notorious intelligence special ops military units, as a combatant, commander and later on as a Krav Maga instructor.
Björn Ruytenberg is an MSc student in Computer Science and Engineering,
specializing in Information Security, at Eindhoven University of
Technology. Being a technology enthusiast, he holds a BSc in Electrical
Engineering as well as Computer Science (cum laude). Aside from his work
as a software developer, he actively participates in bug bounty
programs. His vulnerability research mainly focuses on sandboxing
technology in widely deployed enterprise products, including Adobe
Flash, Microsoft Office and Foxit Reader.
Peter Kálnai is a malware researcher at ESET. As a speaker, he has represented ESET at various international conferences including Virus Bulletin, AVAR, OFFZONE and cyberCentral. He hates mostly malware like crypto-ransomware because it displays hardly any inventiveness and has a very destructive impact on the victim. His golden rule for cyberspace is always to prioritise security measures over user comfort. In his free time, he enjoys table football and travelling.
Michal Poslušný is a malware researcher working at ESET, where he is mainly responsible for reverse engineering of complex malware threats. He also works on developing various internal projects and tools and has actively participated in research presented at AVAR, OFFZONE and Virus Bulletin international conferences in the past. In his free time, he likes to play online games, develop fun projects and spend time with his family.