Speakers

Protect and Defend

New and Emerging Threats/Vulnerabilities

Jasiel
Spelman

Code Execution on a Connected Car: A Practical Analysis of the Tesla Model 3

ZDI

Jasiel Spelman is a vulnerability analyst and exploit developer for the Zero Bio: Day Initiative (ZDI) program. His primary role involves performing root cause analysis on ZDI submissions to determine exploitability, followed by developing exploits for accepted cases. Prior to being part of ZDI, Jasiel was a member of the Digital Vaccine team where he wrote exploits for ZDI submissions, and helped develop the ReputationDV service from TippingPoint. Jasiel's focus started off in the networking world but then shifted to development until transitioning to security. He has a BA in Computer Science from the University of Texas at Austin.
Twitter: @WanderingGlitch

Hossein Lofti

An analyst day at the zero day initiative

ZDI

Hossein Lotfi is a senior vulnerability researcher at Trend Micro’s Zero Day : Bio Initiative (ZDI). In this role, Hossein analyzes and performs root-cause analysis on hundreds of vulnerabilities submitted to the ZDI program, which is the world's largest vendor-agnostic bug bounty program. His focus includes performing rootcause analysis, finding vulnerability in top products via fuzzing, source code auditing, and reverse engineering and exploit development. Prior to joining ZDI, Hossein worked as a senior information security specialist at Secunia Research where he was responsible for vulnerability analyzing and assessment. Hossein’s recent research on Microsoft Windows GDI and font processing resulted more than a dozen CVE assignments and vulnerability disclosures. He is in the list of Microsoft Security Response Center most valuable security researchers for 2018 and 2019.
Twitter: @hosselot

Alfredo
Oliveira


What I learned investigating DevOps honeypots for 6 months

DS

Alfredo Oliveira, Senior Security Researcher at Trend Micro, with 10+ years Bio working in cybersecurity, focusing on open source software, experience in reverse engineering, malware analysis, honeypot deployment and data analysis, containers being a recent addition on the researching topics.

Aliakbar
Zahravi


Threat detection with open source Intelligence/Malware Market Title: Analysis and accelerate the incident response

DS

Malware Analyst and Reverse engineer from Trend Micro Toronto. As part of the Trend Research Lab I'm hunting and reverse-engineer malware samples to identify malware communication mechanisms and analyze malware to develop signature and produce documentation describing malware behaviour and detection strategies.

Augusto
Remillano


The Mining Ninja

TTR

Augusto Remillano II graduated from the University of the Philippines Diliman with a Bachelor’s Degree in Computer Engineering. After graduating, he worked as a researcher for a DOST-funded project and was able to contribute to three published papers about multipath and mesh networks. He now works at Trend Micro as a malware researcher focusing on IoT botnets. Aside from research work, he has also presented at internal and external conferences regarding the current trends in the cyber threat landscape.

Hazel
Poligratis


The Mining Ninja

TTR

Hazel Ann Poligratis is a threat analyst and researcher at Trend Micro's Core Tech PH Global Escalation Team. She graduated with special awards from Mapua Institute of Technology (now Mapua University) where she holds a bachelor degree in Computer Engineering. She does analysis and provide solution for malware arrivals, exploit kits, vulnerabilities and other related malicious activities in the system. She is capable of analyzing product and event logs, creating malware reports and performing in-depth analysis of malware families. Prior to this, she also did Quality Analysis involving test designs, automation, and evaluation of quality processes. In her free time, Hazel loves to travel, watch anime and play computer games.