HelSec November 2022 meetup
❗ Registration will open for HelSec Ry registered members on Thursday 27th of October. Information will be emailed to registered members. If there are available slots on Tuesday 1st of November 18:00 (EEST), we will open the registration here for non-registered members. More details about membership on https://helsec.fi
Welcome to the HelSec November 2022 meetup! We will have three awesome presentations from the infosec / cybersecurity industry and beverages will be provided.
17:30 - Doors open
18:00 - Word by HelSec
18:15 - “Cornerstones of Windows Security” by Sami Laiho
19:00 - Q&A, networking, beverages
19:15 - “Hacking Aiven managed services for fun and profit” by Jari Jääskelä
20:00 - Q&A, networking, beverages
20:15 - “So you want to build a platform as a service? - When features are bugs.” by Etienne Stalmans
21:00 - Q&A, networking, beverages
22:00 - Meetup end. If you’re thirsty, we can continue elsewhere.
This meetup will be streamed on Twitch: https://twitch.tv/helsec
Speaker bio:
🔷 Sami Laiho - Sami is one of the world’s leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security since 1996. Sami has been auditing and implementing security solutions, specializing in Principle of Least Privilege and Application Control, since 2002. Sami has deployed solutions for companies with between[masked] endpoints. Since 2019 Sami has been chosen by TiVi-magazine as one of the top 100 influencers in IT in Finland.
🔷 Jari Jääskelä - Jari is a bug bounty hunter. He worked as a “full-time” bug bounty hunter for a while at the start of 2022. Nowadays, he also works as a penetration tester on the side. He is currently ranked 1st on the Aiven Bug Bounty program.
🔷 Etienne Stalmans - Etienne is a Security Architect for Aiven, a multi-cloud, database as a service company. These days he spends his time finding ways to secure multi-cloud environments and improve Open Source security. With a keen interest in protocol reversing and discovering ways to exploit logic flaws, he has found numerous bugs in products such as Outlook, Postgres, Git, Docker and the underlying languages such as Ruby and Golang. He has presented at numerous security conferences and was a frequent BlackHat trainer.