Author: karen

Speaker Feature: Leigh-Anne Galloway and Timur Yunusov

www.ptsecurity.com

@L_AGallowayImage result for leigh anne galloway positive technologies

@a66at

Leigh-Anne Galloway is the Cyber Security Resilience Lead at Positive Technologies where she advises organizations on how best to secure their applications and infrastructure against modern threats. She is an expert in the Application Security Unit, specializing in ATM and POS Security and is the author of security research in account recovery processes on social media websites. She has spoken at many conferences including DevSecCon, BSides, InfoSec Europe, Hacktivity, 8dot8, Blackhat EU and Troopers.

 

 

Timur Yunusov – Senior Expert of Banking systems security and author of multiple researches in field of application security including “Apple Pay replay attacks” showed at the BlackHat USA 2017, “Bruteforce of PHPSESSID”, rated in Top Ten Web Hacking Techniques by WhiteHat Security and “XML Out-Of-Band” showed at the BlackHat EU. Professional application security researcher.
Timur has previously spoken at CanSecWest, BlackHat USA, BlackHat EU, HackInTheBox, Nullcon, NoSuchCon, Hack In Paris, ZeroNights and Positive Hack Days.

Demystifying Payments: Payment Technologies and Security Risks

Have you ever wanted to learn how payment technologies work? What happens when you pay for something on a website or using a cell phone? Payment technologies are a transparent part of our lives. They enable us pay for everything from a coffee to a car. In this talk we take a look at payment technologies past, present and future, and look at the security risks associated with them. Learn how payments have evolved and what transactions look like today.

Come see Leigh-Anne and Timur at RVAsec! Register Now.


Speaker Feature: Elissa Shevinsky

@ElissaBeth

iyiDU4eK_400x400.jpg (276×276)

Elissa Shevinsky is a serial entrepreneur. She helped launch Geekcorps (acquired), Everyday Health (IPO) and Brave ($35M ICO.) Shevinsky is currently consulting for crypto startups, and doing research on container security

 

Container Security: Vulnerabilities, Exploits and Defense

Whether it’s an unsecured Kubernetes configuration or the Meltdown/Spectre exploits, there is always a way into your company’s seemingly secure container infrastructure. We’ll take a tour of the most surprising container exploits – and how to use tools like SSL and VPNs to create a strong defense for your own environment.

Come see Elissa at RVAsec! Register Now.


Silver Sponsor Feature: Checkpoint

www.checkpoint.com

@checkpointsw

 

Check Point Technologies

Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.

Come see us at RVAsec! Register now.


Silver Sponsor Feature: Advanced Network Systems Inc

www.getadvanced.net

@GetAdvancedVA

Advanced Network Systems

At Advanced Network Systems, we love helping organizations reach their business goals, and solve operational challenges, with the right information technology. We live and breathe IT, and are experts at combining the right people, products and processes to achieve successful business outcomes.

Come see us at RVAsec! Register now.


Silver Sponsor Feature: DHG

www.dhgllp.com

@DHG_Cyber

DHG is a top 20 consulting firm with 25+ offices and 2,000+ employees, serving clients in all 50 states and internationally.  We provide the following Information Security and Cybersecurity services to public and private entities: Staff Augmentation, Deliverables-based Projects, IT Risk Assessments, IT Audit and Compliance Assessments, Security Framework Consulting and Compliance (NIST, ISO, SANS, etc.), Third Party Risk Management – IT Assessments of Vendors, SOC 1, 2, and 3 Audits, Cloud Security Assessments, Application Security Assessments, BCP & DRP Services, PCI QSA Consulting, HIPAA / HITRUST Consulting, Penetration Testing & Network Security Assessments, Open Source Intelligence Research, Social Engineering Assessments, Data Privacy & Security Consulting, Data Classification & Governance.

Come see us at RVAsec! Register now.


After Party 2018 proudly sponsored by Guidepoint and Risk Based Security

We are very pleased to announce that Guidepoint and Risk Based Security have partnered up to host our After Party event this year. Planning is in the works so stay tuned for further information!

GuidepointLogoTagLineRisk Based Security


Silver Sponsor Feature: Cybereason

www.cybereason.com

@cybereason

We are rewriting the rules on how organizations protect themselves against rapidly evolving adversaries. Today’s threat environment requires understanding the adversary and attack landscape. Since our start in 2012, our technology has stopped the world’s most advanced cyber attacks. And we harbor even greater ambitions.

Come see us at RVAsec! Register Now.

 


Hospitality Sponsor: CyberArk

We are pleased to welcome CyberArk as a Hospitality Sponsor this year! All the food and drink served on Friday 8th will be sponsored by them, so be sure to stop by their table to say hi and thank them for feeding everyone!

www.cyberark.com 

@CyberArk

CyberArk

 


Silver Sponsor Feature: Duo Security

www.duo.com

@duosec

As a company, we present a streamlined, straightforward brand from what we say to how we show it, and we foster an environment where employees are empowered to innovate and lead.For our customers, we design products that are a snap to get up and running, easy to maintain and don’t get in you or your users’ way.

Come see us at RVAsec! Register now.

 


Hospitality Sponsor: ExtraHop

We are pleased to welcome ExtraHop as a Hospitality Sponsor this year! All the food and drink served on Thursday 7th will be sponsored by them, so be sure to stop by their table to say hi and thank them for feeding everyone!

www.ExtraHop.com

@ExtraHop

ExtraHop