BSides Tallinn 2024

BSides Tallinn 2024

The speaker’s profile picture
Alex Sinnott

Alex is a Security Engineer working within Wise' (ex. Transferwise) Security Operations Team. He's had over 7 years of experience working in Security Operation Centres across 2 continents working mostly on Detection Engineering.

Alex also works alongside the core Sigma team writing proposals & documentation and working on the challenges of improving the overall user-experience of the Sigma ecosystem for all incoming and incumbent security professionals.

  • Sigma: Decoding the Future of Detection
The speaker’s profile picture
Christian Herrmann

Christian Herrmann, better known throughout the hacker community as “Iceman”, is a co-founder of RRG and helped produce many of the most common RFID research tools available today including the Proxmark3 RDV4, and Chameleon Mini. He is an RFID hacking and Proxmark3 evangelist, serving the RFID community as both forum administrator and major code-contributor alongside other community developers since 2013. He has spoken at hacker conferences around the world including DEF CON, NullCon, Pass-the-Salt, BlackAlps and SaintCon

He has provided bespoke software development services for over 14 years specializing in .NET platforms, and is a Certified MCPD Enterprise Architect.

Christian Hermann has nearly unmatched knowledge of Proxmark3 architecture and a variety of RFID technologies, and was an instructor for the Red Team Alliance (RTA) during which also included Black Hat trainings.

  • KEYNOTE: Iceman
The speaker’s profile picture
Denes Fodor

With over ten years of experience in IT security and systems engineering, I am a passionate and versatile CSIRT Manager / IT Security Researcher at White Hat IT Security, a leading company in defensive and offensive security. I enjoy collaborating with my team and other IT professionals, and I always strive to learn new skills and technologies. I spend most of my free time tackling RE and PWN challenges, conducting malware research, and, as a big fan of information sharing, writing blog posts on a monthly basis.

  • Managing Cybersecurity Incidents: A Journey through cause, effect, and response
The speaker’s profile picture
Elliot Ward

Elliot is a senior security researcher at software security company Snyk. He has a background in software engineering and application security.

  • Action Anomalies: A hackers guide to Github Actions
The speaker’s profile picture
Jaanus Kääp

Jaanus Kääp is a seasoned security researcher at Clarified Security, bringing over a decade of expertise in security testing and research. He has uncovered vulnerabilities in a wide range of technologies, including web applications, document parsers, the Windows kernel and drivers, antivirus software, and hypervisors. Jaanus was recognized for his contributions to the field, appearing on the Microsoft Security Response Center's (MSRC) Most Valuable Security Researchers list for five consecutive years.

Currently, Jaanus is also focused on developing Tuoni, an advanced adversary emulation tool. One of his primary responsibilities is devising methods to circumvent Endpoint Detection and Response (EDR) systems.

  • No EDRs were harmed while making this talk
The speaker’s profile picture
Janno Jaal

Cyber Security Engineer at Cybernetica. Graduated in June 2024 from the Cybersecurity MSc programme at TalTech and the University of Tartu.

  • Threat Modelling for AI/ML-based Healthcare Systems
The speaker’s profile picture
Jarrad Pemberton

Jarrad is a SOC Engineer at Wise and has been working in IT for over 5 years, ranging from IT support, IAM, and Security Engineering. Outside of work he's a cat dad, powerlifter, and TTRPG expert.

  • Saturday Night Phishing Show
The speaker’s profile picture
Johannes Kadak

Have been taking apart things to see how they work since I was small, and now using those skills for good. Cyber security CTF trainer for the European Cyber Security Challenge Estonian team, cyber governance consultant for enterprise and avid start-upper. Loves cats.

  • Web security: templates all the way down
The speaker’s profile picture
Lyra Rebane

I like to play around with the web and browsers for fun. Sometimes I find bugs. 7 CVEs in Chrome.
https://lyra.horse/blog/

  • Web security is fun (or how I stole your Google Drive files)
The speaker’s profile picture
Mait Peekma

If you read this, you probably get paid to build or protect stuff on a daily basis. Mait does the opposite, but has so far avoided jail time.

  • Abuse the B-sides of Bluetooth peripherals
The speaker’s profile picture
Marcelo Toran

Marcelo is a seasoned Red Teamer, with experience in conducting advanced operations to challenge and improve organizational defenses. When not breaking stuff you might find him rolling down some sketchy trails with his bike.

  • Get high as a Threat Actor - Rootkits and Kernel security
The speaker’s profile picture
Peeter Marvet

Peeter wanted to become a scientist when everybody else wanted to be firefighters and policemen. That was at the end of kindergarten. His previous positions were strategy and web development in a digital advertising agency, resident hacker at large web hosting provider and security evangelist in company building e-commerce experiences for major brands.

Currently intel analyst in C3EE, spending free time sailing and participating in marine SAR - so basically police & firefighting, but also working with people having fancy titles like data scientist.

  • Web security: templates all the way down
  • Staying legal
The speaker’s profile picture
Santi Abastante

Ex-Police Officer from Argentina, Cloud Incident Responder and Security Engineer with 10+ years of IT experience.

  • Tales From a Cloud CSIRT- Let’s deep dive into a Kubernetes (k8s) Infection
The speaker’s profile picture
Sebastian Stanici

I work in the Offensive Security team at large US-based investment bank since 2023 and have worked in a blue teaming role for three years before that.

  • Deepfake Technology in Offensive Security Operations
The speaker’s profile picture
Shea Nangle

Shea has over 25 years of experience in security consulting, malware campaign investigations, compliance, and technology. He also co-founded a venture-backed knowledge management startup. Shea has presented both domestically and internationally on a wide range of topics including disinformation, OPSEC, application security, and compliance. Shea’s areas of research include elicitation, disinformation, open-source intelligence, and crisis management.

  • IVY HAUL: An Analysis of A Pro-Russian Disinformation Actor (online)
The speaker’s profile picture
Stefano Amorelli

Stefano Amorelli, Staff Software Engineer for a FinTech unicorn, security engineer, and leading Estonia's first OWASP chapter.

  • Practical Hacking LLMs - Hands-on Workshop
The speaker’s profile picture
Taavi Eomäe

Enthusiast trying to improve (email) security for everyone at night, Cybersecurity specialist at Zone Media OÜ during day. Recently worked on remediating large-scale issues with DKIM, (Associate) Member of CA/Browser Forum's S/MIME working group, proud discoverer of vulnerabilities such as CVE-2023-40440 in Apple Mail.

  • There's nothing new except forgotten old: Abusing email and defending against it
The speaker’s profile picture
Toomas Lepik

Information security analyst with a background in digital forensics,
experienced in incident handling.

  • DoH Down the Rabbit Hole
The speaker’s profile picture
Tormi Tuuling

Security enthusiast who leaves no stone unturned. Likes rock music and occasionally finds nasty bugs under stones.

  • Saturday Night Phishing Show