POSITIVE HACK DAYS



ORGANIZER

Business


Download the full program in PDF.

Critical Infrastructure Security

Moderator: Dan Medovnikov

Government authorities disregarded the security of critical infrastructures for a long time. However, everything is different now. States, corporations and criminal gangs are waging an undeclared war. Computer viruses easily pass the borders of the cyberworld and cause real physical damage.

Billions of people cannot imagine their lives without the Internet. How heavily does humanity depend on the stability of the global information infrastructure? How do we protect it? When is the cyber armageddon to come? These issues will be discussed by the section participants:

  • Anuj Singh, COO at IMPACT
  • Garald Bandurin, CIO at RusHydro
  • Marc Furrer, president of the Swiss company ComCom
  • Andrey Kurilo, Deputy Head of the Security and Information Protection Department, the Bank of Russia
  • Bulat Guzairov, Head of Server Technologies Department, ICL (Presentation)
  • Ahmad Hassan, Director of Risk Management and Compliance at du Telecom
  • Boris Makarov, Head of the Cybersecurity Center at RZD (Russian Railways) (Presentation)
  • Boris Simis, Deputy CEO at Positive Technologies (Presentation)

The participation of representatives from Rosseti and the FSB Information Security Center are also expected.

  • Language
  • Russian

Dan Medovnikov is the deputy editor-in-chief of the magazine Expert.

State and Cybersecurity

Moderator: Alexey Andreev (L e x a)

A great number of new laws and bills related to "information security" have been adopted over the last two years. This refers to website blocking without a court ruling, ban on foreign hosting for government web resources, control over anonymous payments, and forcing bloggers with more than 3,000 readers to register with the national media office. But do these regulations prevent terrorism and criminal activity in the Internet? Is it possible to preserve civil liberties in the modern digital world? What are the views of various countries regarding information security of citizens?

The participants of the section will address these questions. Representatives of the Ministry of Foreign Affairs, Roskomnadzor, the State Duma, who lobby for new laws regarding the Internet, will take part in the discussion. On the other hand, these laws will hit at the interests of the mass media and Internet business. Representatives of these industries will attend the round table and express their point of view as well. Hackers will also have their word: only they know where the borders of information security really are. And of course all the participants will answer tricky questions from the audience.

Among the participants are:

  • Lyudmila Bokova, a member of the Federation Council, Chairman of the Provisional Commission for the Development of Information Society
  • Ruslan Gattarov, Deputy Governor of Chelyabinsk Oblast
  • Vadim Dengin, First Deputy Chairman of the State Duma Committee on Information Policy
  • a representative of the Ministry of Foreign Affairs
  • a representative of Roskomnadzor
  • Andrey Kolesnikov, Head of the Coordination Center for TLD RU
  • Sergey Kopylov, Head of the Legal Department of the Coordination Center for TLD RU
  • Denis Davidov, Executive Director of Safe Internet League
  • Leonid Filatov, Head of the Openstat company
  • Polina Kolozaridi, a postgraduate at Higher School of Economics
  • Information security experts

  • Language
  • Russian

Alexey Andreev, also known as Lexa and Mersey Shelley, is a Russian IT journalist, former editor-in-chief of the Webplanet web portal and other network projects. Alexey is the author of the cyberpunk novels "The Web" and "2048", full of that contain detailed predictions about our technological future. He received Russian and Ukrainian awards in literature, won three international haiku competitions (Japan). He currently works at Positive Technologies.

Comparing Iranian, Chinese & North Korean Hacking Worlds

Author: William Hagestad II

Nation State Motivations for Using the Cyber Realm – Comparative Study of the Islamic Republic of Iran, the People’s Republic of China & North Korea
International governments including the Islamic Republic of Iran, the People’s Republic of China & North Korea all have very well developed cyber capabilities both offensively and defensively; this is the Western world view. During this presentation a foreigner’s international experience reviewing, studying and researching these three nation states will be presented. Included in this 360 degree review will be both the Western/foreigner’s perspective and the distinct motivations by each country to feel compelled to develop such technologically advanced national security weapons in the information realm.
The international lens used to review the nation state cyber weapons platform development will incorporate cultural, historical, linguistic, military, political and technological foci.

  • Language
  • English

William Hagestad is an internationally recognized expert on Cyber Warfare attacks and Information Warfare initiatives, having advanced cyber network security formal education and experience. Conducted numerous classified cyber, physical and social engineering threat and vulnerability assessments worldwide for a variety of commercial and governmental agencies. He demonstrated expertise through activities related to Chinese Cyber Warfare attacks and Information Warfare initiatives at the Communist Party Level (and subsequently executed by the People’s Liberation Army), and as such, has written three books and numerous articles on the subject. Served 27-years as a career US Marine Officer having served in combat three times during international conflicts. His vast civilian experience includes consulting commercial oil & gas entities, international governments, law enforcement, intelligence and military organizations on cyber security. Strategic security leadership planning cyber security threats, both offensive and defensive; nation state information warfare origins, methodologies and case studies are among his professional proficiencies.

William Hagestad II William Hagestad II

Security Management Means Risk Management

Moderator: Mikhail Yemelyannikov

Which is right: security for business, business for security or security as business? How much leading companies depend on IT and how information security risks correlate with operational risks?

Participants:

  • Vladimir Kurbatov, Head of Information Security, Lukoil-Inform
  • Svetlana Belyalova, Vice-Chairperson of the Board, VTB Bank
  • Vitaly Zadorozhny, Head of Operational Risks Management, VimpelCom
  • Andrey Kostin, Head of Internal Control and Risk Management, Yota

  • Language
  • Russian

Mikhail Yemelyannikov is a managing partner and co-owner of a consulting agency named Yemelyannikov, Popova and Partners. He graduated from the Technical Department of the Higher School of the KGB. Mikhail is a cryptographer, an information security expert, author of more than 300 publications, speaker of the largest security conferences. As an analyst, he is often involved in the development of bills and regulatory legal acts development by law-making and executive bodies. He was the first in Russia who created training courses devoted to protection of commercial secrets and personal data.
Personal blog: emeliyannikov.blogspot.com

Industrial Cybersecurity and Critical Infrastructure Protection in Europe

Author: Ignacio Paredes

The events that have taken place during the last years, from 9/11 attacks to recent espionage acts performed by some nation states or corporate spies looking for economic benefit or strategic improvement, using more and more advanced techniques; or the effects of WikiLeaks or the Stuxnet malware, have made the governments to include in their agendas the development of national cybersecurity strategies to protect their critical infrastructures. But there is more. Hundreds of thousands of industrial infrastructures across Europe are at stake. This keynote will link critical infrastructures protection and industrial cybersecurity, giving a comprehensive insight of current risks, the relation between industrial and corporate environments and its impact in key organizations for the survival of a country as well as current trends in the convergence between industrial and corporate systems, threats and countermeasures.

  • Language
  • English

Ignacio Paredes has a M.S. in Computer Science and works as Studies and Research Manager at the Industrial Cybersecurity Center. Since 1999 he has been involved in different projects related to cyber security for important industrial and telco companies. He is an expert in the design and deployment of technical and administrative security solutions, including topics such as applications security, secure network design, critical infrastructure protection, ethical hacking or business continuity planning. For the last five years, he has been dedicated to Industrial cyber security covering technical aspects such as cyber security assessments in industrial facilities and organisational topics such as cyber security management systems.
He is also a security expert assisting the implementation of the ENISA work programme in the areas of information security considerations, information security risk management, international standards and best practices and CIIP.
Among his professional certifications are: GICSP; CISSP; CRISC, CISM, CISA, CEH; BS 7799 Lead Auditor by BSI (British Standards Institution); PMI Project Management Professional (PMP).

Ignacio Paredes Ignacio Paredes

AppSec: From Mail to E-Government Portals

Moderator: Yury Gordeyev

The SDLC issue stormed into the information security industry of Russia — quickly, unexpectedly, and irrevocably. Today many of us speak about secured development, static and dynamic analysis, and developers training. Some touch upon this issue because it has become very topical. Some deal with it because it has been included into the regulative documents of FSTEK or because of serious concern about their software security and resistance to targeted or random attacks. What is a correct systems development life cycle (SDLC)? What components is it composed of? How to automate this task? What rocks are hidden? What are the best practices of the world's famous companies? All these questions will be covered by the specialists of the companies known in Russia and other countries.

Participants:
Mushtaq Ahmed, security manager, Emirates (UAE)
Vineet Bhatia, security manager, Emirates (UAE)
Rohit Ambosta, CISO at Financial Technologies (India)
Ilya Sachkov, Head of Group-IB (Russia)
Vladimir Dubrovin, Head of the Testing Team, Mail.Ru (Russia)
Anna Armarchuk, Yandex.Money (Russia)
Andrey Bershadsky, lead expert at Positive Technologies (Russia)

  • Language
  • Russian

Yury Gordeyev is the editer-in-chief of the magazine Bankovskiye Tekhnologiyi.

A New Approach to Intrusion Detection and Prevention

Author: Robert Griffin

Reactive security controls, such as traditional intrusion protection and prevention technologies, are no longer able to defend your organization against the polymorphic and complex attacks we face today. Instead, organizations must take a new approach to intrusion threats: rapid identification, analysis and response. This session shows how monitoring technologies, leading-edge analysis capabilities, intelligence sharing and incident management capabilities can be brought together to realize this new approach. We’ll describes the kind of information that enterprises should collect across their physical and virtual infrastructures, the kind of analysis to perform and the understanding of risk that is needed to deliver the visibility, analysis, and action that is needed for effective security in today’s world.

  • Language
  • English

Dr. Robert W. Griffin is Chief Security Architect at RSA, the Security Division of EMC, where he is responsible for technical architecture and standards. He is particularly active in RSA’s initiatives to address the challenges of new threats and new models for IT. This includes such areas as security architectures for cloud computing, embedded security capabilities for virtualized infrastructure, security strategies for big data and the application of game theory to cybersecurity. He represents EMC in several standards organizations, including as co-chair of the PKCS 11 Technical Committees and is the Technical Director for a major European Smart Grid research project. Mr. Griffin has 30 years of experience in identity management, security strategy, corporate governance, business process transformation and software development. He is a frequent speaker at many professional and industry conferences and has instructed courses within both professional and university settings. He is also an active blogger for RSA (http://blogs.rsa.com/author/griffin/ and on Twitter @RobtWesGriffin.

Robert Griffin Robert Griffin

International Aspects of Information Security

The section is organized by the Ministry of Foreign Affairs of the Russian Federation.

  • Language
  • Russian

Prospects for Investment in Information Security in Russia

What role do young specialists play in information security (IS)? What opportunities for self-fulfillment do they have? What prospects do IS startups have? What industries do funds invest in? What information security trends are the most dominant? What do government and business corporations, banks require from information security systems? These and other issues will be discussed by the round table’s participants:

  • Sergey Khodakov, Head of the Secure Information Technologies Sector at Skolkovo
  • Dmitry Galperin, Investment Director at Runa Capital
  • Yury Lysenko, Head of Information Security, Business Protection Department, Home Credit & Finance Bank
  • Daniel Tarasov, EVP, Positive Technologies
  • developers of startup projects that were selected by the forum's committee

  • Language
  • Russian

Telecoms: From SS7 to Billing

Mobile telecommunications operators are facing new challenges in the cyber security domain. Now in the full IP age, mobile core network engineers should assess new security risks in several domains to ensure protection due to the usage of TDM/ATM technologies. The rapid growth of the infrastructure increases the need for loss prevention and anti-fraud systems and VAS/MSS implementation. This section considers the latest tendencies in the security of the telecommunications sector. Participants:

  • Yekaterina Starostina, independent expert
  • Dmitry Ustyuzhanin, Head of Information Security Development at VimpelCom
  • Ahmad Hassan, CISO at DU Telecom
  • Burgess Cooper, Vodafone India
  • Sébastien Roché, Mobile Core Network Security Manager for Orange Group

  • Language
  • Russian

Life After Snowden. Modern Tools of Internet Intelligence

Author: Andrey Masalovich

  • Language
  • Russian

Andrey Masalovich has a Ph.D. in Physics and Mathematics, he is a member of the Board of directors of "DialogueScience", and head of the Competitive Intelligence sector of the Academy of Information Systems. He has supervised a number of successful projects in the analytical equipment of banks, financial-industrial groups, major network of trade retailers and government organizations. In the past he was a FAPSI Colonel, Commander of the Order "Star of the Glory of the Fatherland", winner of the scholarship of Sciences "Outstanding Scientist of Russia" (1993). Author of numerous publications on the problems of search and analysis of data. Conducted seminars in several universities in Russia (Academy of National Economy, Moscow State University, MAI) and in the USA (Harvard, Stanford University, Georgia Institute of Technology, Texas A&M University).
An expert for RFBR, INTAS, ITC UN, APEC.

Andrey Masalovich Andrey Masalovich

Information Security Market: Trends, Questions, and Answers

As part of the section, the leading vendors of the information security market will represent their products and solutions:

  • “KasperskyOS. Особенности подсистемы безопасности” by Yekaterina Rudina, Senior System Analyst of the Secure Platform Development Department, Kaspersky Lab
  • “Application Security Ecosystem” by Yevgeniya Potseluyevskaya, Positive Technologies
  • “Dynamic Threats Protection. Analytics and Means of Control ”, Dmitry Ushakov, Head of Technical Solutions Preparation and Deployment, McAfee, part of Intel Security

  • Language
  • Russian

Big Data on Social Networks: No Need for NSA’s Special Surveillance to Keep Track of You

Author: Igor Ashmanov

The talk will cover the following issues:

  • Big data as retrospective information about people
  • Open data on social networks as a means to learn more about a person
  • Public behavior to base political and social inferences on
  • Reasoning people’s political leanings and connections by open social network accounts

  • Language
  • Russian

Igor Ashmanov specializes in artificial intelligence, software development and project management. He is the managing partner of Ashmanov & Partners.

Igor Ashmanov Igor Ashmanov

Threats 3.0

Moderator: Alexey Kachalin

The borders of information systems become more and more opaque.... How will it affect our everyday life? What new perils lurk in domotics and intelligent home technologies? This section will address the threats triggered by gradual integration of digital technologies into our life. How to forecast these threats? What to do in order they don’t take us by surprise? What tools to use for mitigation? These and other issues will be tackled by the section speakers: Andrey Moskvitin (Cisco) (Presentation), Andrey Petukhov (Moscow State University) (Presentation) and Dmitry Sklyarov (Positive Technologies) (Presentation).

  • Language
  • Russian

The section moderator is Alexey Kachalin, Head of a Russian research company Perspektivny Monitoring, which specializes in software solutions information security. Alexey is interested in developing applications of data gathering and analysis, modeling information systems and using them for systems and processes analysis. Being a head of a researchers’ team, Alexey contributes to the development of applications and systems security assessment techniques. He is also a frequent participant of practical information security conferences.

Teach, Teach and, Once Again, Teach

Author: Natalya Kukanova

The speaker will detail into how they developed and implemented information security awareness processes at Yandex (approx. 6,000 employees). This issue is relevant to any company's security service — software and hardware tools are on their guard already, but the security level remains low. The report describes difficulties to overcome while building employees' awareness and methods to assess this process efficiency.

  • Language
  • Russian

Natalya Kukanova is an analyst at Yandex. She graduated from the University of Information Technologies, Mechanics and Optics (ITMO) in St. Petersburg in 2006. Natalya worked at Digital Security from 2004 until 2009, then at Positive Technologies from 2010 until 2012. Her main professional achievements are development and deployment of information security control systems, information risk management, and implementation of information security processes.

Natalya Kukanova Natalya Kukanova