PHDays video




The Revenant

Author: Andrey Masalovich

The whole range of means of information influence is used in both corporate communications marketing and astroturfing. The speaker will talk on how information attacks are developed, how to detect them at an early stage, and how to resist them. He will analyze the perception of information and the diffusion of information in social networks by using bots and trolls. The report also includes a quick social test of common participants of mass discussions.

  • Language
  • Russian

Andrey Masalovich is a member of the board of directors and the head of competitive intelligence group at DialogueScience. Runs several successful projects aimed at providing analytics for banks, business groups, large retail groups, and governmental organizations. The creator of the search engine Avalanche. He served as a lieutenant colonel of the Russian Federal Agency of Government Communications and Information. He has a PhD in physics and mathematics. A distinguished scientist, he was awarded a scholarship by the Russian Academy of Sciences in 1993. He has published works on data search and analysis. He conducted workshops in a number of universities in Russia and the US (Harvard, Stanford, Georgia Tech, Texas A&M). An expert for such organizations as RFBR, INTAS, ITC, APEC.

Andrey Masalovich Andrey Masalovich

Targeted Attacks: Be the First to Aim

Author: Vladimir Ivanov and Sergey Gordeychik

An IT expert and a cybersecurity researcher will share their views on the problem of today's targeted attacks sponsored by governments and criminal groups. The speakers will discuss the effectiveness of existing approaches for the protection, methods of bypassing a sandbox, and whether IDS and AV are obsolete.

  • Language
  • Russian

Vladimir Ivanov
Graduated from the Faculty of Computational Mathematics and Cybernetics, Lomonosov Moscow State University. He has more than 10 years of experience in networks design and development of network protection systems in the world’s largest companies inside and outside Russia. 5 years of project and team lead experience. Vladimir is in charge of the efficiency, security, and performance of the network and services at Lamoda.

Sergey Gordeychik
Sergey is responsible for leading technological development at Kaspersky Lab. His professional interests include security assessment, incident response services, and research on vulnerabilities of banking, telecommunications, and industrial systems. Former CTO at Positive Technologies, Systems Architect and Trainer at the Informzaschita group of companies. Sergey has developed a number of training courses on wireless networks security and security assessment of web applications, etc.

Vladimir Ivanov and Sergey Gordeychik Vladimir Ivanov and Sergey Gordeychik

Aspects of Insiders' Activity Within a Company

Author: Sergii Kavun

This work describes the author's own insider detection methodology. The new technique represents mathematical tools applied to various security systems.

  • Language
  • Russian

Dr. Sergii Kavun got his PhD in computer science from the Kharkiv Military University (Ukraine) in 2000. He was awarded with a habilitation degree (Dr.Sc.) in Economics in 2014. He is an accredited specialist of Management of Information Security by standard ISO 17799:2005 (ISO 27002:2005). He has published manuscripts on the topic of information and economic security in strictly peered scientific journals. He is the editor-in-chief of several international journals: Information Security and Computer Fraud, American Journal of Information Systems, Journal of Computer Networks. He was also elected a program board member of organizing committees of the international conferences: Securіtatea іnformationala, European Intelligence and Security Informatics Conference, Information Security — Today and Tomorrow, IEEE International Conference on Intelligence and Security Informatics.

Sergii Kavun Sergii Kavun

Real and Formal Security: Born to Be Together

Author: Mikhail Emelyannikov

Technical security, i.e. vulnerability analysis, penetration tests, implementation of safety tools, is often considered as real, practical security as opposed to formal security. The speaker will show that these two types of security complement each other and it is impossible to solve actual security problems by using only one of them. Even when solving technical problems, it is easier to use the language of formal safety in communication with top managers. The speaker will present various case studies on the issue.

  • Language
  • Russian

Mikhail Emelyannikov, a cofounder of the consulting agency Emelyannikov, Popova and Partners, possesses over 30 years’ experience in the security field. He specializes in solving complex problems of risk management in the IT environment, concerning legal, organizational, and technical issues. He regularly consults the largest international companies on compliance with the Russian laws. For years, he has been the member of expert groups, councils, commissions at the Federation Council, the Ministry of Telecom and Mass Communications, Roskomnadzor, the National Council for Financial Markets. He is the author of numerous publications in the mass media and has elaborated the first Russian training course on the protection of trade secrets and personal data.

Mikhail Emelyannikov Mikhail Emelyannikov

Andy, the Polluters, Rick Deckard, and Other Bounty Hunters

Author: Alfonso de Gregorio

This talk is about the vulnerability supply chain, its participants, and ethical questions that arise in the business. The speaker will explain his approach to such issues from the point of view of a zero-day exploits broker and will cover ethical principles and standards set forth in the Code of Business Ethics that he adopted.

  • Language
  • English

Alfonso De Gregorio is a security technologist, the founder of BeeWise, a principal security researcher at secYOUre, and the director of (a premium zero-day exploit acquisition platform). He also served as the chief security architect at an HSM vendor, as an expert at European Commission, and a visiting scholar at the Computer Security and Industrial Cryptography (COSIC) research group. He has been a speaker at PHDays, CODE BLUE, HITB GSEC, HITBSecConf, ZeroNights, DeepSEC, AusCERT, and many other international security conferences.

Alfonso de Gregorio Alfonso de Gregorio

From Cyber Offense to Cyber Arms Control: Developing Cybersecurity Norms

Author: Jan Neutze

Increasingly, nation states use the internet to advance intelligence or even military operations: espionage, reconnaissance, and even sabotage. The targets of these operations, whether intentional or not, are often civilians. As the pace of activity in cyberspace increases, so does the likelihood of one state misinterpreting the actions of another. Moreover, the risk of a cyber-arms race cannot be discounted. It would be naïve to hope that states should fully pull back their military operations from the internet. Nevertheless, just as there are universally accepted norms of behavior in other realms of conflict, it is no less important to establish norms for cybersecurity. These norms should not only strengthen cybersecurity but also preserve the freedoms of a globally connected society. In an effort to encourage the international community to reverse the trend of militarizing cyberspace, a robust international debate has emerged discussing ways to reduce cybersecurity conflict by proposing a framework for cybersecurity norms. This discussion will focus on Microsoft’s approach to cybersecurity norms.

  • Language
  • English

Jan Neutze is Director of Cybersecurity Policy at Microsoft responsible for cybersecurity policy matters in Europe, Middle East, and Africa.

Jan Neutze Jan Neutze