Speakers in 2020
Ljubica PendaroskaSpecial Adviser to the Minister of Foreign Affairs of the Republic of North Macedonia
Until now, Ljubica has relentlessly pursued a clear mission in her career: to promote human rights and freedoms.
From EU-wide and NATO projects to UNICEF and her home country, Ljubica has been applying her legal expertise to solving complex challenges around privacy and personal data protection and cybersecurity.
She was also featured in SC Magazine as one of the 50 most influential women in cybersecurity in Europe and we can’t wait for you to meet her!
Presentation: Double it or trouble it? Responsible & healthy ecosystem of personal data
We are living in a time when the virtual world is slowly becoming “the new realistic”, while the digital identity is "replacing" the person's real one! Day by day, the perception of what privacy means has changed, so, it is right to believe that the new generations will not even understand privacy as a concept.
A healthy community rests on a responsible personal data handling and sharing ecosystem. Understanding the impact that each of us has in the data cycle, no matter the role in which we operate would, simultaneously, ensure integrity of the data ecosystem; successful transactions among players based on the idea of shared trust and considerable business potential.
Let your “loud thoughts” surprise and inspire, even yourself!
Gratiela MagdalinoiuPresident at ISACA Romania
Gratiela is president of ISACA Romania, leading the local chapter for the past 4 years. In the day by day professional life she is a leadership team member of a key player in the pharmaceutical industry, having a business ethics and compliance role. In addition she is actively supporting the IT & Security Master Msc Program from the Bucharest University of Economic Studies, Faculty of Economic Cybernetics, Statistics and Economic Studies, as an adjunct professor.
Her areas of expertise have been broadened during the years, moving from IT & IS audit standards, internal control and best practices to service & business management, internal audit, AML & ABAC frameworks, data privacy and business ethics and compliance.
Dumitra DragosThreat Hunter at CrowdStrike
Dumitra is an InfoSec enthusiast first and professional, just to confirm. With over 4 years of experience in the cyber security field, mostly spent in operations and incident response, one could say she knows the trenches. Her experience gave her the opportunity to hunt both in a Corporate Environment and a Cloud one as well. That not being enough, she also helped build Security services from scratch. Strong believer that anyone passionate about this field can do an awesome job, she decided to go one step further to develop the community and create a new challenge for herself, thus decided to co-found the BSides Bucharest.
Presentation: Containers used and abused in attack chains
Companies are leveraging the true power of cloud offering through container-based microservices deployments. Infrastructures are becoming more elastic and containers were the foundation that took us to the next level. We are not the only ones enjoying the fruits of these innovations, adversaries do it as well. They are brought into play in scenarios ranging from the abuse of poorly configured containers all the way to having entire C2 infrastructures running on Kubernetes. I am inviting you to take a closer look into the how, so we can gain a better understanding of what can help detect and stop them.
Raluca StanciuSenior Software Engineer at Bullguard
Raluca is a Senior Software Engineer in the BullGuard Antivirus Team. With an experience of over 10 years in CyberSecurity, she was part of a team which won third national prize at the Imagine Cup 2006 contest in Romania with an ML-based software and has a pending patent on a project created during a 2017 BullGuard Hackathon. Also passionate about full-stack architecture and development, she automated platforms used in the AV-product benchmarking and detection testing. Nowadays she is interested in Public Cloud Security, with a focus on AWS.
Presentation: How Does Identity Impact Your Business?
In a world where “Who am I?” has become the first question to answer when using any software out there, Identity Access Management has become the single source of truth for any company. We will dive into the security strategies which any business should be aware of.
Our partners’ support brings this conference to life!