PLANNED TALKS

Learn how to automate your systems, how to build chat bots and the future of deep learning. Explore the applications of machine learning, NLP, and computer vision transferring Neural Network know-how from academia to architects

WORLD'S BIGGEST CYBERSECURITY ONLINE
CONFERENCE FOR DEVELOPERS

CYBERSECURITY WITH THE BEST

100 SPEAKERS - 2 DAYS - 4 TRACKS
14-15 October 2017
Location: Online
Access platform

4 TRACKS

Machine Learning AI Online With The Best Conference

1

MACHINE LEARNING RESEARCH
Machine and Deep Learning Fundamentals, implementation and new modelling strategies for your frameworks straight from the labs.
Chatbot online developer AI conference

2

DEEP LEARNING,
NLP & CHATBOTS
Detection, tracking & integration tips for robots, drones & autonomous vehicles. Leverage conversational architecture with bot-builders and a slick UX.
Computer Vision online developer AI conference

3

APPLIED AI: STARTUPS, INDUSTRY & SOCIETY
Discover the applications of AI from startups and industry, what it takes to manage an AI company and the impacts on society with this technology.
Platform and Programme Demos online developer AI conference

4

DEMOS & TUTORIALS
Be the first to discover the algorithms, APIs, platforms and tools enabling AI tech with these hands-on sessions, demos and workshops.

FEATURED SPEAKERS

SPEAKERS

Tim Kaldec
Tim Kaldec
Dev Advocate, Snyk
Tim Kadlec is the head of developer relations at Snyk, a company focused on making open source code more secure. He is the author of Implementing Responsive Design: Building Sites for an Anywhere, Everywhere Web (New Riders) and was a contributing author for High Performance Images (O’Reilly), Smashing Book #4: New Perspectives on Web Design, and Web Performance Daybook Volume 2 (O’Reilly). He writes sporadically at timkadlec.com.
Ziyahan Albeniz
Ziyahan Albeniz
Sec Researcher, Netsparker
He graduated Computer Programming at Sakarya University. Works in Netsparker as a security researcher. He continues his work with mentorship of Ferruh Mavituna. He reported issues to alot of big company and he has been located these companies` hall of fame. His articles and researches is published on Netsparker Turkey Security Blog and he prepares and presents to his security podcast called Klavye Delikanlıları with Mustafa Yalcin
Yanick Fratantonio
Yanick Fratantonio
PhD Candidate, UCSB
Yanick Fratantonio is a Ph.D. candidate in Computer Science at the University of California, Santa Barbara, and he is soon going to join EURECOM as an Assistant Professor. His research focuses on the security and privacy of mobile systems, such as Android. His work spans different areas, such as malware detection, vulnerability analysis, characterization of emerging threats, and the development of novel practical protection mechanisms. Recent projects I was involved with include Cloak & Dagger (Android UI attacks), ultrasound cross-device tracking, and Drammer. In his free time, he enjoys playing and organizing Capture The Flag competitions with the Shellphish hacking team. On twitter, he is @reyammer.
Yan Shoshitaishvili
Yan Shoshitaishvili
PhD Candidate, UCSB
Yan Shoshitaishvili is a Assistant Professor of Computer Science at Arizona State University. Over much of the last decade, he has pursued techniques in the automation of Computer Security, building frameworks (angr.io) and whole systems (shellphish.net/cgc) to enable the assistance of security researchers by autonomous systems. He route to Computer Security involved accidental buffer overflows in C code written in elementary school, hacking his friends for fun in high school, protecting networks in college, and competing in cybersecurity competitions with his team, Shellphish.
Patrick McDaniel
Patrick McDaniel
Distinguished Professor, Penn State
Patrick McDaniel is a Distinguished Professor in the School of Electrical Engineering and Computer Science and Director of the Institute for Networking and Security Research at the Pennsylvania State University. Professor McDaniel is a Fellow of the IEEE and ACM and program manager and lead scientist for the Army Research Laboratory's Cyber-Security Collaborative Research Alliance. Patrick’s research centrally focuses on a wide range of topics in security and technical public policy. Prior to joining Penn State in 2004, he was a senior research staff member at AT&T Labs-Research.
David Freeman
David Freeman
Head Anti-Abuse, LinkedIn
David Freeman leads Anti-Abuse and Anomaly Detection Relevance at LinkedIn. He and his team of machine learning engineers research, develop, and deploy machine learning systems that detect fraud, abuse, and unusual activity across the LinkedIn site and ecosystem. He holds a Ph.D. in mathematics from the University of California, Berkeley, and did postdoctoral research in cryptography and security at CWI and Stanford University. He is a two-time co-chair of the CCS Workshop on Artificial Intelligence and Security, and is currently writing (with Clarence Chio) a book on Machine Learning and Security.
Joseph Bonneau
Joseph Bonneau
Technology Fellow, Stanford
Joseph is a researcher at the Applied Crypto Group at Stanford University and a Technology Fellow at the Electronic Frontier Foundation. His research has spanned a variety of topics in cryptography and security including HTTPS and web security, passwords and authentication, cryptocurrencies, end-to-end encrypted communication tools, and side-channel cryptanalysis. He holds a PhD from the University of Cambridge and BS and MS degrees in computer science and cryptography from Stanford University. He has previously worked as a researcher at Princeton University and as engineer at Google, Yahoo! and Cryptography Research, Inc.
Jinan Jaber
Jinan Jaber
EVP Cybersec & Strategy, Telo Consulting
Jinan Jaber is the EVP of Cybersecurity and Strategy of Telo Consulting. Mrs. Jaber has over 16 years of progressive cybersecurity and leadership experience. She is a frequent participant at national conferences, as a cyber thought leader and subject-matter expert. Jinan has extensive knowledge of advanced cyber attacks and threat actors’ techniques, tactics and procedures (TTPs). She has broad experience across security disciplines, including cybersecurity and emerging threats, mobile application security, fraud protection and behavioral analysis, deep and dark web intelligence, phishing, reputation management and brand protection, and insider threat protection. The spectrum of her experience and her applied focus give her a unique insight into the issues that can plague the operationalization of cybersecurity and threat intelligence initiatives. Jinan holds a Masters of Business Administration degree from George Mason University.
Nicolas Papernot
Nicolas Papernot
Google PhD Fellow in Security, Penn State
Nicolas Papernot is a PhD student in Computer Science and Engineering advised by Dr. Patrick McDaniel at the Pennsylvania State University. His research interests lie at the intersection of computer security and deep learning. He is supported by a Google PhD Fellowship in Security. In 2016, he received his MS in Computer Science and Engineering from the Pennsylvania State University and his MS in Engineering Sciences from the École Centrale de Lyon.
Robert M. Lee
Robert M. Lee
Founder & CEO, Dragos Inc.
Robert M. Lee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode’s Influencers, awarded EnergySec’s Cyber Security Professional of the Year (2015), and inducted into Forbes’ 30 under 30 for Enterprise Technology (2016). A passionate educator, Robert is the course author of SANS ICS515 – “ICS Active Defense and Incident Response” with its accompanying GIAC certification GRID and the lead-author of SANS FOR578 – “Cyber Threat Intelligence” with its accompanying GIAC GCTI certification. Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission. He may be found on Twitter @RobertMLee
Michael Davis
Michael Davis
CTO, CounterTack Inc
Michael A. Davis has been privileged to help shape and educate the global community on the evolution of IT security. His portfolio of clients includes international corporations such as AT&T, Sears, and Exelon as well as the U.S. Department of Defense. Davis’ early embrace of entrepreneurship earned him a spot on BusinessWeek’s “Top 25 under 25” list, recognizing his launch of IT security consulting firm Savid Technologies, which was recognized as one of the fastest growing companies of its decade. He has a passion for educating others and as a contributing author for the “Hacking Exposed” books, has become a keynote speaker at dozens of conferences and symposiums worldwide. Most recently, Davis has served as CTO of CounterTack, provider of an endpoint security platform delivering real-time cyber threat detection and forensics. He chose to join the company because he recognized that the battle is moving to the endpoint, and that conventional IT security technologies can’t protect enterprises. Rather, he saw a need to deliver to the community continuous attack monitoring backed by automated threat analysis. Davis brings a solid background in IT threat assessment and protection to his latest posting, having been Senior Manager Global Threats for McAfee prior to launching Savid, which was acquired by External IT. Aside from his work advancing cyber security, Davis authors through industry publications including InformationWeek and Dark Reading. Additionally, he has been a partner in a number of diverse entrepreneurial startups; held a leadership position at 3com; managed two Internet service providers; and recently served as President/CEO of the InClaro Group, a firm providing information security advisory and consulting services based on a unique risk assessment methodology. Davis' ability to analyze, translate, and make connections among emerging IT and security trends combined with a business and entrepreneurial mindset make him a popular speaker — he strives to present complex concepts in a way that delivers value to a range of listeners. He regularly presents at industry conferences including Black Hat, Interop, SuperStrategies, and InfoSecWorld. His long-term vision, to create systems that will “push defenders ahead of attackers,” is relevant to a wide array of enterprise, government and vertical-industry stakeholders.
Regine Bonneau
Regine Bonneau
Founder & CEO, RB Advisory LLC
Regine Bonneau is a leading expert on cyber security, risk management and compliance. Her career spans 20 years with a focus on technology and processes in the healthcare, financial and energy sectors. Ms. Bonneau is the Founder of RB Advisory LLC, which provides cyber risk management, security assessments, compliance services, forensic audits and privacy consultations for private sector and government clients. She is a sought after speaker and holds leadership roles in several technology industry associations. Ms. Bonneau has been featured in the Orlando Sentinel, the Orlando Business Journal and other prominent publications. Areas of expertise: Risk management, Cyber Risk Management, compliance, cyber security, systems and technology, product development, anti-money laundering (AML) risk and control, business continuity, training and education.
Vinod Vasudevan
Vinod Vasudevan
CTO, Paladion
Tudor Dumitras
Tudor Dumitras
Assistant Prof, U of Maryland
Tudor Dumitraș is a professor in the Electrical & Computer Engineering Department at the University of Maryland, College Park. His research is in the area of data-driven security: he conducts empirical studies of adversary behavior, he builds machine learning systems for detecting malware and attacks, and he investigates the security of machine learning in adversarial environments. He also has a good knowledge of the security industry, having worked for 2.5 years at Symantec Research Labs. In his most cited paper he measured how long zero-day attacks go on undiscovered in the wild. His research has been widely cited in the media, for example in The Economist, the MIT Technology Review, Forbes, and The Register.
David Ting
David Ting
VP, Engineering, DataVisor Inc
David Ting is the vice president of engineering at DataVisor, an innovator in Big Data analytics for financial fraud and anti-money laundering, which utilizes unsupervised machine learning to identify attack campaigns. Prior to DataVisor, he was the VP of Engineering at CARDFREE, where he worked on mobile payment solutions that power three out of the top 10 Food and Beverage apps. He was also previously General Manager of North America for NetEase, and General Manager and SVP of eSports for IGN, which was acquired by Blizzard Entertainment in 2013. He is a big believer in innovation design culture that drives solution that pushes the imagination on scale, simplicity, maintainability and time-to-market. David has rich domain expertise in mobile, gaming, eCommerce, streaming media and payment. He received his Bachelor of Science in Electrical Engineering from UCLA and worked on his advanced degree in Computer Science at Stanford University.
Candan Bolkubas
Candan Bolkubas
CTO, Normshield
Candan Bolukbas is digital polymath and Certified Ethical Hacker. Candan fully appreciates the growing threat to digital communications and data accumulation which affects all of us. He is co-founder and chief technology officer for NormShield, Inc., a McLean-based “security-as-a-service solutions” company. Candan and NormShield’s primary focus is on cyber threat intelligence, vulnerability management and perimeter monitoring. Candan is responsible for the technical direction and innovation of NormShield products. Besides being a certified Ethical Hacker, he is a certified secure programmer, certified incident handler and a certified computer hacking forensic investigator. He has more than ten years of experience working with data protection and information security standards and technologies including business continuity, data-loss protection, data privacy, disaster recovery, encryption, enterprise architecture, firewalls, intrusion detection and prevention systems, penetration testing, physical security, security event management and vulnerability scanning. Candan has a BS degree in Computer Engineering and he has been developing security products, performing penetration testing & forensic analysis, and providing cyber security training. Certifications: CCNA, CCNP, CHFI, ECSP, MCSA, ECIH, CEH, LPT. Candan worked for both public and private sectors for many years and strong supporter of human rights, freedom and privacy.
Eric Lawrence
Eric Lawrence
Software Engineer, Google Chrome
Eric Lawrence (@ericlaw) is a Software Engineer on the Google Chrome Security team, helping bring HTTPS to every site on the web. Prior to Google, Eric spent a decade building browsers and websites for Microsoft, and was best known as the original developer of the Fiddler web debugging platform. Eric blogs about security and software development at https://textslashplain.com/.
Amir Husain
Amir Husain
Founder & CEO, SparkCognition
Mathias Payer
Mathias Payer
Assistant Professor, Purdue
Mathias Payer is a security researcher and an assistant professor in computer science at Purdue university leading the HexHive group. His interests are related to system security, binary exploitation, user-space software-based fault isolation, binary translation/recompilation, and (application) virtualization. His research focuses on protecting applications even in the presence of vulnerabilities, with a focus on memory corruption. Before joining Purdue in 2014 he spent two years as PostDoc in Dawn Song's BitBlaze group at UC Berkeley. He graduated from ETH Zurich with a Dr. sc. ETH in 2012. The topic of his thesis is related to low-level binary translation and security. He analyzed different exploit techniques and wondered how we can enforce integrity for a subset of data (e.g., code pointers). All prototype implementations are open-source. In 2014, he started the b01lers Purdue CTF team. Some of his random ramblings on security-related topics are published on a security blog . You can find his publications under Publications or on Google scholar .
Juan Cabarello
Juan Cabarello
Assistant Research Professor, IMDEA
Juan Caballero is an Associate Research Professor at the IMDEA Software Institute in Madrid, Spain. His research focuses on security issues in systems, software, and networks. One of his focus is the analysis of malware and cyberattacks. He received his Ph.D. in Electrical and Computer Engineering from Carnegie Mellon University, USA and was a visiting student researcher at University of California, Berkeley for two years. His research regularly appears at top security venues and has won two best paper awards at the USENIX Security Symposium and the DIMVA Most Influential Paper 2009-2013 award. He is an Associate Editor for ACM Transactions on Privacy and Security (TOPS). He has been in the technical committee of venues such as IEEE S&P, ACM CCS, USENIX Security, NDSS, WWW, RAID, and DIMVA. He has been program chair or co-chair for the Annual Computer Security Applications Conference (ACSAC, 2017), the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA, 2016), the Digital Forensics Research Symposium (DFRWS, 2014 & 2013), the European Workshop on Systems Security (EuroSec, 2015 & 2014) and the International Symposium on Engineering Secure Software and Systems (ESSoS, 2015 & 2016).
David Puron
David Puron
SVP Engineering, Silent Circle
David Puron is a telecommunications engineer, serial entrepreneur and maker, with more than 20 years of experience working with technology. He started his career as software developer and international standards delegate in the telco carrier Telefonica, where he had a rapid promotion getting to be the Open Mobile Alliance Requirements Group Chairman for two years. He jumped in 2009 to the device manufacturer side, working in big companies - such as Huawei - and startups - such as Geeksphone. In 2014, David co-founded the joint venture "Blackphone", the first privacy oriented mobile device manufacturer that won the TIME Magazine's Best 25 Inventions of 2014, Best of MWC 2014 Award by PC Magazine and Top 10 Breakthrough Technologies 2014 by MIT Technology Review among other awards. In the recent years, David has become more and more active in the Internet of Things ecosystem, and currently he is running TipTap Labs as Managing Director and CTO. TipTap Labs is a software development company specialized in secure connected devices, including IoT, wearables and smartphones.
Itzik Kotler
Itzik Kotler
Co-Founder & CTO, SafeBreach
Itzik Kotler is CTO and Co-Founder of SafeBreach. Itzik has more than a decade of experience researching and working in the computer security space. He is a recognized industry speaker, having spoken at DEFCON, Black Hat USA, Hack In The Box, RSA, CCC and H2HC. Prior to founding SafeBreach, Itzik served as CTO at Security-Art, an information security consulting firm, and before that he was SOC Team Leader at Radware. (NASDQ: RDWR).
Scott Schober
Scott Schober
ScottSchober.com
Mr. Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a 45 year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. Since the beginning of Mr. Schober’s BVS tenure in 1989, the company’s product line of wireless test and security instruments has increased to over 100 products with a core focus on Wi-Fi, Cellular, WiMAX, LTE, IoT and advanced radio devices. As an experienced software engineer, Schober has developed cellular test instruments used for measuring, optimizing and plotting signal coverage, primarily for the initial cellular build-out throughout the United States. Scott’s recent focus has been development (patent pending) of BVS’ cell phone detection tools, used to enforce a ‘no cell phone policy’ in various markets including government, corporate, military, educational, correctional and law enforcement. Thousands of these security tools have been deployed throughout every state in the U.S. and around the world. Mr. Schober is a highly sought after subject expert on the topic of Cybersecurity and wireless technology for media appearances and commentary. He is often seen on ABC News, Bloomberg TV, Al Jazeera America, CBS This Morning News, CGTN America, CNBC, CNN, Fox Business, Fox News, Good Morning America, Inside Edition, MSNBC and many more. His security advice is heard on dozens of radio stations such as National Public Radio, Sirius XM Radio, Bloomberg Radio, and The Peggy Smedley Show. He regularly presents at conferences around the globe discussing wireless technology and its role in the current Cybersecurity breaches along with his vision for best practices to stay safe in the future. Scott has been interviewed in WSJ, Forbes, Fortune, Success, NY Daily News, Newsweek, USA Today, and The New York Times. Scott educates all business around the world about how to prepare for a future of Cybersecurity and corporate espionage, opening their eyes to this ever deepening black hole of liability. He has spoken at SecureWorld, ShowMeCon, GovSec, Counter Terror expo, ISS Americas, Espionage Research International, Connected World, ConstrucTech, IEEE and GSM World Congress as well as many business events. Mr. Schober was a VIP attendee at two Concordia Summits both held in New York and was selected to appear in an interview discussing national security. He is a regular contributor on Huffington Post, Fortune Magazine, and blogs for IBM, SecureWorld, HP’s Business Value Exchange, and TripWire’s State of Security. Scott Schober, Pres/CEO of BVS, Author, cyber security expert @ScottBVS www.ScottSchober.com
Brian Kelley
Brian Kelley
CIO, Portage County
Brian Kelley is in his 27th year at Portage County where he has served in the capacity of Chief Information Officer for the past 26 years. He is responsible for the County’s enterprise-wide information technology operations spanning 18 elected officials, over 30 departments, and 700+ users. Under his leadership, Portage County has received international, national, state, and regional recognition for highly successful enterprise-wide IT projects. Brian earned his Master of Public Administration Degree from Kent State University. He completed the Certified Government Chief Information Officer Program at the University of North Carolina at Chapel Hill. Brian is an adjunct professor in the Political Science Departments at Kent State University where he teaches a public sector IT management , e-governance, and strategic planning online graduate courses and undergraduate police role and interviewing course in Sociology. He is also a senior lecturer at the University of Akron where he teaches an undergraduate course in computer and information security. Brian spent fifteen years as a commissioned special deputy sheriff at Portage County, OH, and performed computer forensics and conducted cyber-related investigations. He is currently sector chief for higher education with the Northeast Ohio InfraGard Chapter sponsored by the FBI and he is a member of the Cleveland Electronic Crimes Taskforce sponsored by the Secret Service.
Philipp Jovanovic
Philipp Jovanovic
Postdoc Researcher, EPFL
Philipp Jovanovic is a cryptographer and post-doctoral researcher at the Swiss Federal Institute of Technology Lausanne (EPFL), in Switzerland. He obtained his PhD in cryptography from the University of Passau, Germany, in 2015. Philipp designed several cryptographic algorithms, such as NORX and OPP/MRO, and protocols, like CoSi, ByzCoin, and RandHound. He is actively involved in the development of open source projects like the kyber crypto library or the cothority framework for scalable, decentralized, cryptographic protocols, and he works as an adviser on the DFINITY project. His research is published regularly at top crypto/security conferences such as IEEE S&P, USENIX Security, or EUROCRYPT, and he is frequently active at non-academic events like the Chaos Communication Congress, Troopers, or dotSecurity. Philipp tweets as @daeinar.
Get to know the speakers
Presenting companies include
Portage County
Safebreach
Silent Circle
IMDEA
Spark Cognition
Google Chrome
EPS
Normshield
DataVisor Inc
STM
EPFL
Paladion
RB Advisory LLC
CounterTack Inc.
Dragos Inc
ScottSchober.com
Telo Consulting
Stanford
LinkedIn
Purdue
Penn State
UCSB
Netsparker
Snyk

Agenda

9am-6pm EST // 6am-3pm PST // 3pm-12am CEST // 9pm-6am GMT+8
MACHINE LEARNING RESEARCH
DEEP LEARNING, NLP & CHATBOTS
STARTUPS, INDUSTRY & SOCIETY
DEMOS, TUTORIALS & applied AI
No items found.
MACHINE LEARNING RESEARCH
COMPUTER VISION NLP / CHATBOTS
APPLIED AI: STARTUPS, INDUSTRY & SOCIETY
DEMOS & TUTORIALS
No items found.

TICKETS

WHAT PEOPLE SAY
REGISTER
SPONSOR

SPONSOR

Media Partners

Community Partners