CET Time Zone
CET Time Zone
🎯Maor Tal is a security researcher with over ten years of experience in pentesting, red teaming, and cloud security. His research and talks were presented in BlackHat UK, DC973, ISC(2) SECON, and more. In 2019, He published his book "Web Advanced Hacking" and became Israel OWASP CTF's co-author. 2022- Maor presented his Azure Offensive toolkit "BlueMap" 2022 in BlackHat UK. Maor is also OSCP, CCSK, and CISSP certified.
Maor Tal BlueMap - An Interactive Tool for Azure Exploitation BlackHat 2023
🥷Research: 'Confidential Cloud Computing' - based on how to use cloud computing with quantum encryption.
Professor Ramrami - expert on cyber security development with over 20 years of experience in the security, secure coding, network and telecommunication . worked closely with law enforcement agencies, and security defense establishmen CISSP, C)SWAE, C)SCE and CEH certification Chair position at OWASP in Morrocco leads OWASP certification expansion efforts in Canada, France and North Africa.
🥷Or is a Certified Ethical Hacker, Experienced as Cyber Security Engineer, specializing in Cloud Security, Endpoint Security and Data Protection.
Or has vast experience in Security Architecture, and has supported hundreds of customers in designing & managing the optimal security capabilities for their specific needs and unique attack vectors: On-Prem, or on the Cloud.
Prior to Google Cloud, Or has worked in “Intel” Information Security for almost a decade, in various security related roles.
🔏'First-hand experience of a physical penetration-testing expert'
Justin Wynn is a Principal at Coalfire who specializes in physical security and regularly performs network, application, wireless, and social engineering penetration tests. He's keynoted conferences and conducted over 350 penetration tests and physical engagements. His past times include bank robbing, critical infrastructure parkour, and inventing new tools+techniques for physical security.
🥷 Hani has over two decades of experience in developing machine learning algorithms. In the past 9 years, she applied her expertise to enhance cloud security and address challenges within the Security Operations Center (SOC). At present, her primary focus centers around leveraging the capabilities of large language models to elevate SOC operations. She holds a M.Sc. in computer science from the Weizmann Institute.
🏆🥇Cybersecurity Woman Entrepreneur of the Year 2023
Tal Kollender - GYTPOL Founder C.E.O
🥷Security Researcher and Hacker
"In my teenage years, I was a professional hacker, always on the hunt to crack open what seemed impossible, always on the lookout for IT challenges"
Advisory Board
🙏Olivier has worked for 20y+ to secure/audit companies, creating cybersecurity labs, communicating on and implementing cybersecurity.
Finally he started his own consulting company named BluEnable to help CxO manage CyberSecurity efficiently. Their missions include maturity assessment, CyberSecurity governance (including Interim CISO), awareness and training, incident and crisis management and Implementation.
🙏It is my pleasure to extend a cheerful welcome to you all! Your presence makes us very happy.
"Making Things Happen"
Latest article:
"There is a need to provide a comprehensive defence solution"
We love our customers, so feel free to visit and contact us 24X7
Sign up to hear from us about cyber events and Black Hat
Copyright © 2008-2023 Presale1 - All Your Computer Security Needs In 1 - All Rights Reserved