IMAGEN PONENTE
NOMBRE Y APELLIDOS
Chema García
IDIOMA
Castellano
Biography

Author of open source projects on forensics, pentesting and incident response.

ENLACE REDES SOCIALES
Extended biography

Taller: Traceando movimientos laterales el día d.

Member and co-founder of cybersecurity think tank THIBER, with more than ten years of experience as an independent security researcher, is a contributor and author of open source projects on forensics, pentesting and incident response.

IMAGEN PONENTE
Pedro Sánchez
NOMBRE Y APELLIDOS
Pedro Sánchez
IDIOMA
Castellano
Biography

Specialized in Digital Forensics Incident Response. Currently he is working as CSO & DFIR in ITS-SECURITY.

conexioninversa.blogspot.com

@conexioninversa

ENLACE REDES SOCIALES
Extended biography

Lecture: Children of the Black Dragon or how Bureau enters your system

He has worked in important companies as consultant specialized in Incident Response and pen-testing. It has implemented ISO 27001, CMMI (level 5), PCI-DSS and various security methodologies especially in the banking sector for more than ten years. He is currently in ITS-SECURITY.

He also collaborates on incident response, security, expertise and computer forensics with various business organizations and with state security forces and companies and government agencies.

He has participated in the LookShields conference organized by the Ministry of Defense and obtained the Nato Secret certification. He has also lectured at NATO Cooperative Cyber ​​Defense Center of Excellence Tallinn in Estonia. Professor of the Summer BootCamp of INCIBE.

He has worked in the BlueTeam area of ​​Bitdefender for Google for four years. Author of the blog of Connection Reverse and is Computer Judicial Expert in the National Association of Cyber-security and Technological Expertise (ANCITE). He is currently in charge of the Deloitte Incident Response Team (IR).

IMAGEN PONENTE
NOMBRE Y APELLIDOS
Aarón Flecha
IDIOMA
Castellano
Biography

Professional cybersecurity consultant.

@AaronFlecha

ENLACE REDES SOCIALES
Extended biography

Lecture: The dark side of embedded systems

He holds a degree in computer science from the University of Oviedo (Spain). He has taken several courses related to industrial cyber security, including the Global Industrial Cyber Security Professional (GICSP) certification. He has more than 5 years of experience working in several companies related to industrial cybersecurity and has been a speaker at other national reference events. He currently works at S21sec as an industrial cybersecurity consultant, researching and obtaining new knowledge to improve his professional skills.

IMAGEN PONENTE
NOMBRE Y APELLIDOS
Pablo González
IDIOMA
Castellano
Biography

 Cybersecurity Researcher & Technical Manager.

ENLACE REDES SOCIALES
Extended biography

Lecture: UAC Bypass % Research with UAC-A-Mola

He works at 11Paths - Telefónica Digital España as Security Researcher & Technical Manager. Microsoft MVP Security 2017-2018. Master's Degree in Computer Security. Informatics Engineer. Award to the best record of his promotion at the Rey Juan Carlos University and Extraordinary Prize of the Degree in Technical Engineering in Computer Systems. Co-Founder of Flu Project and Founder of hackersClub Academy.

He has several publications in the field of Information Security: Author of the book Metasploit for Pentesters. Editorial 0xWord. Ethical Hacking: Theory and practice for the realization of a pentesting. Pentesting with Kali. Pentesting with Powershell. Got Root. has taught Rooted with 2013, 2014 and 2015 with Metasploit Labs and Hacking iOS devices. He has also been a teacher in the No cON Name Labs 2013 and 2014 with Metasploit for Pentesters.

He has been speaker at Rooted with 2013, 2014 and 2016, No cON Name 2011, Black Knife 2014 and 2016 and other congresses such as Hackron, Sh3llCon, Qurtuba Security Congress, Cybercamp or Rooted Valencia, among others. Speaker at international conferences such as 8dot8 in Chile in 2014, 2015, Bsides Colombia 2016

IMAGEN PONENTE
NOMBRE Y APELLIDOS
Pedro Candel
IDIOMA
Castellano
Biography

Specialized in Security Offensive, Reversing, Malware, Safe and Forensic Development. 

ENLACE REDES SOCIALES
Extended biography

Lecture: Tempest Rev. 2.0 

Currently in CS3 Group as a trainer and security analyst specializing in Malware and Reversing. He has been a lecturer at Deloitte CyberSOC Academy, collaborating professor in the Master in Cybersecurity (MCS) of the University of La Salle, Universidad Camilo José Cela, Universidad Católica de Ávila (Spain), etc. and through the Ilumno network in the main Universities of the countries of Latin America. Specialized in Security Offensive, Reversing, Malware, Safe and Forensic Development.

Regular speaker at conferences, conferences, events and other national and international institutions on cybersecurity. Previously, teacher in the Security, Networks and Systems, Development of the Training and Employment Service of the Community Board of Castilla-La Mancha.

IMAGEN PONENTE
NOMBRE Y APELLIDOS
Eduardo Sánchez Toríl
IDIOMA
Castellano
Biography

Professional Expert in Technological Law and Computer Forensics.

http://hacking-etico.com ; http://whitewalkershack.blogspot.com ; http://satoe.es

@eduSatoe

ENLACE REDES SOCIALES
Extended biography

Lecture: Geolocation user bots in Telegram

Computer Engineer. Professor of Professional Training in the specialty of Computer Systems and Applications. Technical Researcher at onBRANDING. Professor of UCLM in the Higher Degree of Specialist in Computer Security and Information and UNEX in the Course of Professional Expert in Technological Law and Computer Forensics. Judicial expert specialized in forensic analysis of mobile devices. Master in Security of the ICTs of "Networks and Systems" and "Services and Applications". Contributor to hacking-etico.com blog. Responsible for the Hack & Beers community of the security conference Qurtuba Security

IMAGEN PONENTE
NOMBRE Y APELLIDOS
Miguel Hernández Boza
IDIOMA
Castellano
Biography

 Computer security analyst. 

ENLACE REDES SOCIALES
Extended biography

Lecture:  Security in free social networks. Attacks and threats.

Engineer in Telecommunications by the University of Zaragoza (UNIZAR) and Master in Cybersecurity by the University Carlos III of Madrid (UC3M). Computer security analyst. Lover of CTFs, programming and AI.

He has invested the last years of his professional career in Spanish multinationals, such as Telefónica or BBVA (i4s), in research and innovation of new procedures for detection of fraud, intelligence wire and defensive security.