Call For Speaker Application

Submit your application for 'Call For Speakers' today

Apply To Become A Speaker

All Rights Reserved. CISO Platform

Reach Out To 40K+ Security Professionals

Antti Karjalainen

Co-founder Of Heartbleed

Dr. Phil Polstra

Author of "Linux Forensic" and "Windows Forensic"

Menny Barzilay

Renowned Security Expert, EX-CISO Of Israeli Defense

Nir Valtman

Renowned Cloud Security Expert

To watch other talks from speaker click here

Past Speakers
"World's Best Security Minds !"

 

Moshe Ferber

Renowned Cloud Security Expert

Andrea Marcelli

Renowned Reverse Malware Expert

Gregory Pickett

Renowned SDN Security Expert

Murray Goldschmidt

Renowned DevSecOps Expert

1000+ Past Organizations Who Got Trained
If I hadn't come, it would take another 2 to 3 years to learn & understand these tools”
Submission Requirements
  • Supplementary course material with talk flow, overall agenda, content can be emailed to contact@cisoplatform.com 

  • Sessions must be shared as Educational. 'Non-Commercial' and 'Non-self promotional'. Product or vendor pitch will not be accepted 

  • Basic details for the website include Talk Session Topic, Short Brief, Agenda Overview, Duration, Speaker Biography will be needed 

  • Talks can be of following kinds : TED style 15min; Brief 30min 

  • Nature of session - short, engaging, value add, tangible asset shared. You are free to use any previous talk material that belongs to you 

  • Speaker needs to send the talk slides 10 days before the conference (backup copy). Your slides can have changes hereon. No promotions 
Talk Topic Sample
  • Future CISO : The Key Drivers & Tools Of CISO Effectiveness In 2024 

  • CISO's Security Team Training : Strategies For The Next Gen

  • Developing A Comprehensive Threat Detection And Incident Response Plan

  • Top Cybersecurity Trends In Large, Mid, Small Enterprises
Agenda Sample

WINDOWS MALWARE 101: REVERSE ENGINEERING AND SIGNATURE GENERATION

Talk Brief: This session will cover some key topics of Windows malware reverse engineering, starting from the basics of the Windows executable file format up to the modern techniques and FOSS services to analyze malware samples at scale. Finally, it will cover the basics of malware signatures, and it will present a tool, YaYaGenPE, to automatically generate them. In the talk brief, we will go through the overview and delve in depth during the workshop.

Agenda : 

  • Basics of Windows malware reverse engineering
  • The Portable Executable (PE) file format
  • Dissecting Windows malware PE files with Python.
  • Malware analysis at scale:
  • The role of automation
  • Function recognition with FIRST
  • Binary decompilation with Ghidraaas and GhIDA 
  • Signature generation:
  • The basics of a malware signature
  • Automatic signature generation with YaYaGen.

     

About Speaker : Andrea Marcelli is a Malware Research Engineer at Cisco Talos Intelligence Group and a PhD candidate in Computer and Control Engineering at Politecnico di Torino in Italy. In his PhD, he studied the large-scale processing of Android malware, proposing a semi-automated system to provide fast coverage and detect new malware variants. He presented part of his research at BSidesLV and DEFCON26. Currently his research interests include automated malware analysis, semi-supervised modeling, and graph isomorphism.


Why SACON ? 

P.S. This is a no-sponsor event. Any high-quality talk will be accepted. No promotions allowed

CISO Platform is the world's first online community solely dedicated for information senior security executives (CISO/CIO/CSO/CTO/Directors etc). The vision of the platform is to enable the senior security executives to share, learn and network with other peers. CISOPlatform is the largest social collaboration platform exclusively for CISOs and senior information security executives with 40,000+ subscribers.

SACON – 1st Security Architecture Conference. We have a lot of competence in hacking but we have a very limited community for the defenders, security architects …etc. To solve this, SACON started its journey. SACON has previously finished its 8 editions, a long way. We believe in making security knowledge accessible to the world. We hope you will join forces soon

10,000+

65+

100+

15+

Attendees

Speakers

CISO/CIO

Trainings

  • Impact Of Artificial Intelligence In Security & CISO Must Dos

  • GenAI ? CISO Risk Vs Opportunity

  • CISO Tools For Security Posture Management

  • CISO : What To Present To The Board ?

Submit your application for 'Call For Speakers' today

Apply To Become A Speaker

Submit your application for 'Call For Speakers' today

Apply To Become A Speaker
Benefits Of Speaking

Inspire, Share, Network

40K+ Security Professionals

Noble Cause & Recognition

Contribute To The Community

Become A Trusted Expert

By Sharing Your Knowledge

Extend your reach and connect with world's foremost security experts and professionals

Giving back to the security community is a cause only very noble souls are part of. We're inviting you to be a part of this vision. 'SACON' also empowers local skill development

Become a trusted expert on topics relevant to your industry. You become a name amongst the foremost security industry experts

Apply To Become A Speaker

Inon Shkedy

API Security Project Leader Traceable

Jonathan Pollet

Founder & Director 
Red Tiger Security 

Wayne Tufek

President 
ISACA

Abhay Bhargav

AppSec Expert, Founder
 we45 Inc

CISOPlatform Summit, SACON  + AICON 2024

Bangalore | 30th May, 2024

Application deadline - 29th February

*We recommend early fills. Submissions might stop once we get enough quality applications

Call For Speaker

This series celebrates the foremost security heads, chief security officers, chief risk officers, chief technical officers and other security leaders, innovators who are changing the world. Your talk reaches 40,000+ cyber security professionals, top peers, chief security officers

Apply To Become A Speaker >>