Latest launch: DarkMatter Cyber Security Report. Click here to read more

27 Nov 18 - 28 Nov 18

DarkMatter Business Track at HITB


Date: 27th - 28th November 2018

Venue: Grand Hyatt, Dubai

DarkMatter Group, headquartered in the UAE, enables businesses and governments to become smart, safe and cyber resilient. As a full-service provider of smart and safe digital transformation, we’re uniquely positioned to provide organisations with the strategy, technology, and operating model to achieve business continuity amidst adverse and constantly evolving cyber threats.

In parallel to Hack in the Box Security Conference Dubai, DarkMatter Group is hosting an annual business conference and technical workshops targeting key industries in the United Arab Emirates. Beyond Cyber, is taking place on the 27th and 28th of November 2018 at Grand Hyatt Dubai and will focus on the theme of a Smart & Safe Digital World.

Please fill in the form below to register with us. We look forward to welcoming you at Beyond Cyber. 

For more information and queries, email us at 


Conference Agenda - 27 Nov 2018


Agenda for DarkMatter Beyond | Cyber Conference  


10.00 am - 10.45 am

Registration and morning coffee


10.45 am - 11.10 am


Opening Video / Welcome Address

Karim Sabbagh, CEO, DarkMatter Group


11.10 am - 11.40 am


Keynote: Running cyber resilient mega-events

Eman Al Awadhi, Director of Cyber Security & Resilience – Expo 2020


11.40 am - 11.55 am


Crowd polling: Assessing audience feedback around safe digital transformation in everyday life – readiness for the panel


11.55 am - 12.40 pm



Panel: Safe Digital Transformation in everyday life

Chadi Moujaes, EVP - DigtialX1, DarkMatter Group

Eman Al Awadhi, Director of Cyber Security & Resilience – Expo 2020

Marwan Bin DalmookSVP - Managed Services & Smart City/Smart Gov Initiative Lead, du

Yousuf Al ShaibaDirector of Smart Services Development – Ajman Municipality and Planning Department 

Rabih Dabboussi, SVP - Sales, Marketing & Business Development, DarkMatter Group

12.40 pm - 2.00 pm


2.00 om - 2.05 pm Video - DarkMatter Vision

2.05 pm - 2.45 pm


Keynote: Cyber Threats and Vulnerabilities in the UAE for 2018 – Key Findings

Eddie Schwartz, EVP – Cyber Services, DarkMatter 


2.05 pm - 2.45 pm


Crowd polling: Assessing audience feedback around breaches & threat intelligence / Video – Threat Intelligence & Voice of Cyber


2.45 pm - 2.10 pm


Keynote: What you need to know about social engineering OR How to hack a human

Alan White, VP – Cyber Network Defence at DarkMatter


3.10 pm - 3.20 pm 


Introduction To DigitalE1: Knowledge and capacity building

Saeed Basweidan, CEO, Ajyal Talent Management 


3.20 pm - 3.50 pm





Panel: Building future skills to manage cyber resilience of the future

Ronald HaleVice President - Cyber Training, Development and Policy, Education Services, DarkMatter Group

Jamal N. Al-Karaki, Department Head, Information Security Engineering – ADPoly

Fahem Al Nuaimi, CEO - Ankabut

Khalid Al WazaniStrategy & Knowledge Advisor, Mohammed Bin Rashid Al Maktoum Knowledge Foundation (MBRF) 

Joni Cholwich, COO – Ajyal Talent Management


3.50 pm - 4.00 pm


Closing remarks

Karim Sabbagh, CEO – DarkMatter Group 

4.00 pm - 4.30 pm Closing coffee break


Conference Speakers


Speakers - DarkMatter Beyond | Cyber Conference  

















Karim Sabbagh

CEO, DarkMatter Group

Karim Sabbagh is the Chief Executive Officer of DarkMatter Group, bringing more than 30 years of experience running technology-centric global organisations.

Karim manages corporate direction and strategy at DarkMatter Group, where he is responsible for leading Group business activity and directing the company’s four practices: DarkMatter, DigitalX1, DigitalE1 and Government Solutions. With his extensive knowledge of strategic development and international expansion, Karim leads DarkMatter Group’s growth towards becoming the essential provider of smart and safe digital transformation across businesses and governments.

Prior to joining DarkMatter Group in 2018, Karim was the President and CEO of Luxembourg-based communications satellite owner and operator, SES (Société Européenne des Satellites). He also served as the Chairman of the Executive Committee of SES and Chairman of SES ASTRA. He led the transformation of the company, overseeing the evolution of the company’s strategy and execution alongside its elevation as the leading provider of satellite-enabled communications solutions in the video, fixed data, mobility and government markets.

Karim has a strong track record as a technology thought leader and practitioner across the Middle East and globally. Prior to joining SES, Karim was a Senior Partner and Global Practice Leader for communications, media and technology with Booz & Co. He led multinational teams in long-term, large-scale privatisations, international expansion, mergers and acquisitions, growth acceleration and strategy-based transformation programmes.

Mr. Sabbagh has collaborated with and published influential reports such as the Global Information Technology Report co-published by the World Economic Forum and INSEAD along with Cornell University. Mr. Sabbagh was also the Chairman of the Ideation Center that served as Booz & Company’s think tank in the Middle East, as well as being a Member of the World Economic Forum’s Regional Agenda Council on the Arab World.

Karim holds an MS in Technology Management from Columbia University, a DBA (Doctorate) in International Business Management from the International School of Management (Paris), and an MBA and BBA from the American University of Beirut. He is also a visiting professor in Technology and Innovation Management and a member of the Academic Council at Écoles des Ponts Business School in France.










Eman Al awadhi

Director of Cyber Security and Resilience, Expo 2020

As Director of Cyber Security and Resilience at Expo 2020 Dubai, Eman Al Awadhi is responsible for defining and executing the strategic direction for safeguarding Expo 2020 from cyber threats. In today’s digital and interconnected world, Eman has significant responsibility for ensuring security and privacy of Expo 2020 infrastructure and data for achieving Expo’s vision to deliver the safest World Expo.

Eman has 10 years of enriched cyber security experience. She started her career as Network Security Engineer in the Telecommunication Regulatory Authority’s UAE Computer Emergency Response Team (aeCERT).

She was awarded prestigious Prime Minister’s Medal by the Sheikh Khalifa Government Excellence Program for the category of distinguished employee. She was part of Emirates Integrated telecommunications as Security Compliance Manager prior to joining Expo 2020 Dubai in 2016.

With her significant contributions in the field of cyber security, Eman is a member of the National Advisory Council for the College of Technological Innovation at Zayed University and is a graduate of the Sheikh Mohammed bin Rashid Program for Leadership Development. She holds a Bachelor of Science in Computer Engineering from the American University of Sharjah, and a Master of Science in Information Security from the Khalifa University of Science, Technology and Research.






Chadi N. Moujaes

Executive Vice President of DigitalX1 at DarkMatter Group

Chadi N. Moujaes is the Executive Vice President of DigitalX1 at DarkMatter Group. He leads the practice focused on digital transformation and applied technologies helping organisations harness advanced technologies in pursuit of operational excellence. The DigitalX1 team aspires to be the trusted partner to advise, coordinate, and execute a digital transformation strategy successfully for governments and businesses.

Chadi was formerly a Partner with McKinsey and has over 20 years of experience in consulting. Before joining McKinsey, he held several advisory roles with government entities and was Vice President and Partner at Booz & Company. His experience includes advising public and private sector clients through the formulation and implementation of large-scale transformations. 

He holds an MBA from INSEAD and a bachelor’s degree in Computer & Communications Engineering from the American University of Beirut. 









Marwan Bin Dalmook

Senior Vice President - Managed Services & Smart City/Smart Gov Initiative Lead at du

16+ years of experience in Telecom, Information & Communication Technology, and Information Security domain and was actively contributing in building one of the most advanced telecom infrastructures in the UAE in my early part of the career. The mid part of my career I explored new career space of Information Security where I was leading in building one of the most advanced Intelligence & Security Operation Centers in the Telecom Industry. In the recent past I have moved to a senior leadership level of the organization and leading innovative and challenging role to build and operate Managed Services for Enterprise business & Smart City solutions as part of the Dubai Smart Government initiatives. 

I have accumulated personal and professional qualities during my career including inspirational leadership, business innovation, operational effectiveness, interpersonal communications, establishing an empowered and inspired workforce. I offer a ‘hand-on’ leadership role, where management peers and staff can benefit from my decisive but flexible management approach.



Yousuf AlShaiba

Director of Smart Services Development – Ajman Municipality and Planning Department

Mr. Yousuf AlShaiba is the director of smart services development at the Ajman Municipality and Planning Department, where he leads etransformation strategies and smart government initiatives. Before joining Ajman Municipality, he worked for Dubai Municipality for 16 years as head of IT support services. With more than 25 years of best practice experience, he is known for his deep technical knowledge and unique vision when it comes to Smart City implementations in the government sector.











Eddie Schwartz

Executive Vice President - Cyber Services, DarkMatter Group

Eddie Schwartz is DarkMatter’s Executive Vice President of Cyber Services. He leads the company’s Governance, Risk and Compliance, Cyber Network Defence, xen1thLabs for Testing and Validation, Managed Security Services, Trust Services, Cyber Architecture & Engineering and Cyber Security Education Business Units.

Eddie’s cyber security career spans over 25 years where he most recently served as President and Chief Operating Officer of Whiteops Inc., a leading provider of advanced cyber security detection and prevention.

Prior to this, Eddie held a number of senior leadership positions including Global Leader for Cyber Security Solutions at Verizon; Chief Security Officer for RSA; Co-Founder and Chief Security Officer of NetWitness (acquired by EMC); Executive Vice President and Chief Technology Officer of Mantech; General Manager of Global Integrity (acquired by INS); Senior Vice President of Operations of Guardent (acquired by VeriSign). He was also Vice President and Chief Information Security Officer at Nationwide Insurance.

Eddie Schwartz served on the Board of Advisors for start-ups including Observable Networks and My Digital Shield and has served as a member of the International Board of Directors of ISACA and Chairman of ISACA’s Global Cyber Security Taskforce.

Eddie has a BIS in Information Security Management and an MSc in Information Technology Management from George Mason University School of Management in Washington D.C.














Alan White 

Vice President - Cyber Network Defence, DarkMatter Group

Alan J. White is the Vice President of Cyber Network Defence within Cyber Advisory Services at DarkMatter. In this role, he is responsible for various cyber defence services including technical testing and red teams, threat hunting, malware analysis, digital forensics and incident response.

Over the past 14 years, Alan has worked in a range of leading cyber security leadership roles — including Fortune 100 companies — in the field of cyber security solutions. He is a highly successful leader providing thought leadership and trusted advisory input to c-level and military leadership around the globe. Alan is a retired Lieutenant Colonel having spent 25 years in the US Army as a Signal and Cyber Officer. There he led the development of computer emergency response teams. He built and led Red, Blue, White and Gold Teams through Cyber Range training events, which included some of the military’s first strategy and tactical procedures in cyber response.

He is a well-known international speaker, and is published in many online articles and contributions. Before joining DarkMatter, Alan was the General Manager of Dell SecureWorks Asia HQ in Tokyo, Japan, responsible for expanding the cyber security market, and for all strategic and operational business delivery. In his last global role he built and led Tokyo and UK Security Operation Centres SOCs, providing continuous cyber threat monitoring services. Prior to joining Dell SecureWorks, Alan led a professional services organisation in North America that focused on a range of cyber security services including Technical Testing, Governance Risk and Compliance, Incident Response and Digital Forensics, Industrial Controls, and Residency Services.

Alan is a bestselling cyber defence author of the Blue Team Field Manual (BTFM). He maintains several security certifications including: CISSP, CISA, GCIH, CCE, CEH, ECSA, CNDA and previously GCIA and QSA. Alan earned a Master of Science degree in Applied Computer Systems from University of Maryland University College and a Bachelor’s degree in Computer Science from the University of Rhode Island.












Saeed Omar Salem Basweidan

Chief Executive Officer – Ajyal Talent Management

Saeed Basweidan is the Chief Executive Officer at Ajyal Talent Management. He leads DarkMatter Group’s Education practice which seeks to advance knowledge transformation by embedding digital talent in the Group’s services.

Saeed has more than 16 years of leadership and project management experience in the fields of telecommunications, IT, smart building automation and cybersecurity and brings a strong background in technology integration, new media and data analytics.

He was previously Senior Vice President of Technology Research at DarkMatter, responsible for Cyber Technology Research across a range industry sectors and technology disciplines.

Prior to joining DarkMatter, Saeed was the Executive Director of Technology and Applied Research at the Signals Intelligence Agency (SIA), leading technology strategy, planning, design, project implementation and delivery, as well as system efficiency and commercial negotiations.

Prior to this, Saeed was Senior Vice President of Business Development at Mubadala Development Company, an investment arm of the Government of Abu Dhabi; CEO of Khazna Data Centre and COO of Injazat Data Systems.

In earlier roles with Mubadala, Saeed was a Senior Manager in the Services Division of Al Yah Satellite Communications Company (Yahsat), he established numerous bilateral agreements with international telecom giants in his role as International Carrier Relations Manager at Emirates Integrated Telecom Company (du). He also held positions at SamaCom, a Dubai Holding company, where he led the FALCON cable landing station for du, enabling the telecom operator to launch an International Telecom Service.

Saeed earned a Bachelor’s Degree of Computer Science & Electronics Engineering from Weber State University, USA.











Dr Ronald Hale Ph.D., CISM

Vice President Cyber Training, Development and Policy, DarkMatter

Ron brings broad experience in information security and cybersecurity to Darkmatter gained over 30 years in the profession.  This experience touches almost every aspect of the security profession. Early in his career he served as the manager of security services for Northrop Corporation Defense Systems Division responsible for developing and managing the security program for classified and unclassified systems as well as implementing corporate investigations, crisis management, technical surveillance countermeasures, executive protection and the division-wide security awareness program. As a research manager for Bank Administration Institute Ron published the first study of ATM Security and Fraud and provided guidance to security executives from major US and international banks. As a practice director for Deloitte, Ron formed the security architecture team providing assessment and penetration testing services as well as support for organizations to define and implement a holistic security program from policy through detection, response and recovery.  As the Chief Knowledge Officer for ISACA, an international association of security, assurance, risk management and governance professionals, Ron was responsible for knowledge creation and product development including ISACA frameworks, guidance and practices, professional standards and for the development of study aids for certification exam candidates. Most recently Ron formed a cybersecurity research institute producing guidance on topics including blockchain and enterprise risk management.  At DarkMatter, Ron leads cyber training programs providing career focused training that prepares individuals for entry-level cyber positions in government and law enforcement.

Ron is a Certified Information Security Manager and has a master’s degree in Criminal Justice from the University of Illinois and a doctorate in Public Policy and Administration from Walden University.












Jamal N. Al-Karaki

Department Head, Information Security Engineering – ADPoly

Dr. Jamal Al-Karaki is an accomplished Information security and technology expert with 20+ years of versatile IT experience and expertise in corporate systems and network security architecture and management along with IT projects management, network and IT infrastructure design and implementation, curriculum design, training program design, and change management throughout the project life cycle in public and private sectors. In addition, Dr. Al-Karaki has a rich University career in education, training and research including serving heavily in academic leadership capacity. Dr. Al-Karaki is the Co-Founder and Division Head of information Security Engineering Technology- Abu Dhabi Polytechnic (ADPoly), Abu Dhabi, UAE since Feb 2012. Before Joining ADPoly, He served as the Dean of Information Technology College, at the Hashemite University, Zarka – Jordan. He also worked for faculty of computing, King Abdulaziz University, Jeddah, Saudi Arabia with knowledge comes a responsibility towards the society. Dr. Al-Karaki obtained his Ph.D. from Iowa State University where he was awarded the research excellence award on his pioneering work on wireless ad hoc networks. Dr. Al-Karaki has more than 60 published refereed technical articles in scholarly international journals and proceedings of international conferences. He also served on the Editorial Board of some international journals and as publicity chair and technical program committee member of several International conferences and workshops. He also attended/gained reputable professional certificates that includes CISSP, OSCP, ECSA, GMOB, CHFI, RHCSA, and CCNA security. Dr. Al-Karaki constantly works collaboratively with industry, government, faculty, senior executive leadership, and with community stakeholders to encourage scholarly pursuits, engagement, and innovation as critical goals with sound budget planning. As active researcher, he developed plans to advance the research agenda, activity and productivity; outreach and community engagement. He also develops strategic plan for continuous improvement of undergraduate and graduate programs. He also developed notable experience with leadership in the development of new programs that meet international standards and success in building teamwork. In particular, he has excellent experience with ABET, CAA, NQA, and standards. His research work focuses on network security, cyber security, Penetration testing, Security audits, Cloud security, threat modelling, Blockchain, IoT, Big data, and e-learning. Dr. Al-Karaki is a senior member of the Institute of Electrical and Electronics Engineers (IEEE) and member of Association of computing and machinery (ACM).







Fahem Al Nuaimi

CEO, Ankabut

Mr. Fahem Al Nuaimi has a professional experience that extends to more than 26 years during which he enjoyed various roles within the UAE telecommunications industry including network planning, program management and budgeting. He had led the introduction of fiber-to-the-home networking GPON in Etisalat and the latest version of IPTV as a launch director. He also established the first PMO office for engineering and IT within Etisalat. He also served as Vice President of the Program Management Office Etisalat.

Currently, he holds the position of the CEO to Ankabut, UAE's Advanced Network for Education and Research, since December 2011. He developed the national research and education network in UAE “Ankabut” with the latest coverage and cloud data center.

Mr. Fahem is a holder of an MBA which he obtained from the Southern New Hampshire University- USA in 2003. He holds a Bachelor Degree of Engineering from the UAE University (1990). Also he is holder of a Master Degree in Service, innovation and leadership from RIT-NY UNIVERSITY USA.2017.








Khalid Al Wazani

Strategy & Knowledge Advisor, Mohammed Bin Rashid Al Maktoum Knowledge Foundation (MBRF)

Khalid Al Wazani is currently the Strategy and Knowledge Advisor for Mohammed Bin Rashid Al Maktoum Knowledge Foundation (MBRF), previously he was the Chief Economist/ Strategist, & Founding Partner of Issnaad Consulting. Just before that, (2006-2011), he served at the private sector as General Manger & CEO of Saraya Aqaba Real Estate, Taameer Jordan Holdings (PLC) and Darat Jordan Holdings (PLC).

Earlier in his career, Dr. Wazani was associated professor of Economics at the Department of Economics at the Hashemeyeh University. Dr. Wazani was appointed as Deputy Dean for Faculty of Economics at the same university. Just before that, he established a research, consultancy and community service center at the university, where he took on the responsibility of General Manager during 1997-1999.

Dr. Wazani has also held the position of Director General for the Jordanian Customs Department during 1999-2001. Later on (Jul 2001- Nov. 2005) he was appointed as an Advisor and Director of the Economic and Development Division at the Royal Hashemite Court during which he served as the Head of the Economic Team for HM King Abdullah II. In early 2004 he served as the Deputy Chairman & Director General / Social Security Corporation in Jordan till early 2006.




Workshops Schedule - 28 Nov 2018


Workshops Schedule: Beyond | Cyber Conference 




10.00 am – 11.00 am






DarkMatter Quarterly Cyber Security Report Results for the UAE

Bernice McCallumThreat Intelligence Director

The Darkmatter Cyber Security Report is the first of its kind in the region, bringing together in-house data and analytics from the company’s specialised services and platforms techniques as well as open source information specifically relevant to the UAE.  DarkMatter Group’s aim is to raise awareness, give insights and offer recommendations to remediate the risks identified. 


10.00 am – 11.00 am









Microcontrollers, Edge computing and Cloud Service Security

Milosch Meriac, Principal Security Researcher, Hardware Lab, xen1thLabs, DarkMatter

What can possibly go wrong? Although security is quite well-understood on higher-end embedded systems like routers and mobile phones, microcontroller security is still stuck in the dark ages of computing. The security of most contemporary connected microcontroller-based devices is on par with security models of early networked MS-DOS systems from the80’s.

This talk presents an overview of microcontroller system security and the peculiarities of microcontroller targets to show how these can be exploited - we will further discuss security of higher end system as used in smartphones and edge/fog computing devices/gateways and will dive into security concepts behind these, threat modelling and exploitation of such devices. We will close by briefly talking about cloud level security concepts.


10.00 – 11.00 am











Practical Quantum-safe Implementations in Industry

Victor MateuCryptographer

We are fast approaching a quantum future - the rise of quantum computers means that specific complex calculations are solved much faster than by today’s computers - threatening even the best security encryption algorithms.

In this workshop, we focus in the field of cryptography which assumes that quantum computers are going to be a reality.

We will showcase examples of solutions which can be used already today to prevent quantum-computers from breaking privacy and integrity in our present communications.

We will focus on the impact of new cryptosystems in IoT devices where the computational and storage resources are lower. Eventually, we will showcase already implemented solutions to tackle these challenges and talk about proper practices in such environments.


10.00 – 11.00 am











Auditing source code for vulnerabilities

Eldar MarcussenLead Security Researcher

Code auditing is the process of reviewing source code with the intent of discovering security bugs. This workshop will teach the principles of code review and illustrate some of the techniques that can be used to quickly identify vulnerabilities. The theory is then followed with practical audits for some bug classes of popular open source applications written in C and PHP which may result in some zero-day vulnerabilities.

Bring a laptop with basic Linux commands and follow along as we audit a web server and some web applications for various flaws, including:

  • Memory corruption
  • Logic flaws
  • Authentication bypass
  • Injection flaws
  • and more


11.00 am – 12.00 pm










An overview of the UAE threat landscape

Rocky De WiestSenior Security Consultant

Maxim DeweerdtLead Consultant

The threat landscape is a forever-evolving environment, which makes it so complex, especially when facing Advanced Persistent Threats; it can become a very tedious cat-and-mouse game.

The United Arab Emirates specifically has significant wealth and excels at innovating, making it a particularly attractive target for threats. As such, it is important for organisations to understand and manage security threats and risk.

During this talk, Maxim and Rocky will expose some of the more interesting cases they have identified throughout 2018, and will give the audience an overview of the UAE threat landscape as they see it and provide ample methods to detect and respond to these threats.


11.00 am – 12.00 pm







Security of Messaging: the Past, the Present, and the Future

Alexander Sherkin, Software Architect

Secure communication has evolved in the past several years. While confidentiality, authenticity, and data integrity was everything secure messaging ever needed in the past, modern messaging systems are expected to come with future secrecy, post-compromise security, deniability, and side-channel attack resistance to comply with the current de facto secure messaging standard. Moving forward, post-quantum resistance, identity privacy, and stealth are being added to the list of the expected features. The talk explores various secure messaging properties, and discusses the expected level of security in the past, present, and the future.


11.00 am – 12.00 pm






SOC-CMM: How to measure the maturity of your security operation center

Eric EifertSenior Vice President

In this workshop we will explore the SOC-CMM framework and discuss how to measure the maturity of your SOC across 5 domains (Business, People, Process, Technology, and Service).  We will discuss how this framework can be utilized to prioritize enhancements, identify gaps, develop a strategy, justify investments, and provide a visual representation of your maturity.


11.00 am – 12.00 pm








Lateral Movement in Windows Domain in 2018

Juned AnsariSenior Cyber Security Consultant

Microsoft Windows is the predominant operating system today and Microsoft has been constantly working on improving the authentication mechanism used in Windows to thwart attackers.  In a typical attack scenario, the attacker gains an initial control over a system that may not contain any interesting data, and then he will try to laterally move across different machines in the network in search of that elusive target. LMHash, NTHash, NTLMv1, and NTLMv2 are the hashing and authentication protocols that are actively targeted by attackers. This talk is all about where we stand today when it comes to using Windows Authentication based attacks.


12.00 pm – 1.00 pm








SOC Use case development and mapping to the ATT&CK Model

Srivatsa VenkateshSOC Ops Manager 

  • Defining a use case.
  • Building and Deploying a use case.
  • How do you recognize the adequate # of use cases for your environment.
  • Few advanced threat scenarios and associated use cases
  • About MITRE ATT&CK Framework
  • Advantages of aligning with the framework
  • Few critical use cases from the framework and how to build them.


12.00 pm – 1.00 pm










Unconventional Vulnerabilities in Google Cloud Platform

Venkatesh SivakumarSecurity Consultant

The presentation "Unconventional vulnerabilities in Google Cloud Platform" will showcase my path to how I discovered two interesting vulnerabilities in Google cloud platform. Via my approach, I was able to discover Cloudshell Command Injection and Code Editor Clickjacking.

Cloudshell command injection started as an attack against my own GCP resources. In my presentation, I will walk the audience members through how I was able to escalate it and impact other GCP users by crashing vm, deleting app engine files, compute engine instances, cloud storage buckets, exfiltrating GCP data and getting a reverse shell on other users GCP instance.

Similarly, clickjacking started as a un-exploitable one. But the focus of the presentation will be to share how I was able to escalate it and impact other users. In addition, I will share some thoughts on the Google VRP and cover some high level thoughts on "Google Cloud Hardening".


12.00 pm – 1.00 pm



Efficient Solution for Identifying, Monitoring and Selecting SSL/TLS Deployment Configurations

Lamya Al Qaydi, Security Researcher, xen1thLabs


 2.00 pm - 5.00 pm




















Hands-on-Hacking and Deep-dive into the world of Low-Frequency RFID

Milosch Meriac, Principal Security Researcher, Hardware Lab, xen1thLabs

Chaouki Kasmi, Director Mobile and Telecommunication Lab, xen1thLabs

Learn how to perform security assessments on RFID systems and how to exploit the discovered weaknesses!

Attendees will explore  the weaknesses of existing low frequency (LF) RFID systems while learning building and using RFID hardware tools for reading and emulating RFID cards. Attendees will build and keep a hardware kit for reading and emulating LF RFID cards.


  • A brief introduction into RFID – physics and protocols.
  • Participants will build and test a Low Frequency RFID sniffer which they can take home afterwards. They will capture RFID signals and manually decode them on-screen to reverse engineer the protocol.
  • After sniffing we’ll split out into groups – prototyping emulation or automated decoding as needed.
  • Workshop is limited to 12 participants, signup required via mail at Registration is on a first come first serve basis. No-shows will be replaced by candidates on the waiting-list after 15 minutes. Please inform us in advance if you can’t make it.


  • We expect people to bring a laptop (4GB RAM or more) that can boot from a Linux USB live system (provided by us) – or a native Linux system with full admin rights (Audacity and Docker installed, full root privileges required – Fedora Linux Version 29 (64 bit) is preferred, Ubuntu supported, too – for other distributions, people are on their own or must be able to boot our live system over USB). Please download and run the Fedora 29 life system at - or install Fedora on your laptop in case you want to be on the safe side and have the same system as the instructor.
  • In case of a windows/mac-system full admin access is required (please pre-install and test Audacity in that case).
  • Workshop starts at 2pm and will be held open-ended up to 5pm (3h total).


Workshop Speakers


Bernice McCallum, Threat Intelligence Director, DarkMatter

Bernice McCallum is the Threat Intelligence Center Director at DarkMatter with responsibility for developing and managing a cyber threat intelligence center that  analyzes a variety of information and intelligence relevant to the cyber threats facing the systems, assets, and resources critical to the nation and develop relevant research studies and recommendations, including cyber- and network-related data in support of investigations and operations. 

Prior to joining DarkMatter, Bernice worked at Philips and BlackBerry where she developed, implemented and managed high value, cost effective, global threat intelligence capabilities, which facilitated effective risk management. Bernice’s career also includes leadership roles in Security Incident Response and Business Continuity Management at BlackBerry. 

Bernice obtained her Bachelor of Science in Computing and Information Systems from London Metropolitan University (UK), her Master of Science in Information Security from Royal Holloway University of London (UK) and her Master of Laws in Information Technology and Telecommunications Law from University of Strathclyde (UK).

Bernice has attained several industry recognised professional certifications – GCTI, CISM, CISA and CISSP – which remain in good standing. Bernice maintains active membership in Information Systems Audit and Control Association (ISACA) and  International Information Systems Security Certification Consortium, Inc., (ISC)²® and is a member on the EC-Council Threat Intelligence Advisory Board.


Milosch Meriac, Principal Security Researcher, Hardware Lab, xen1thLabs, DarkMatter

Milosch Meriac is interested in hardware & embedded software security, protocols and security projects around mobile devices and the Internet of Things. He considers himself  a hardware hacker.

Before joining DarkMatter, Milosch was leading the Arm Research Security group where he worked on advanced IoT security solutions to allow detection and remote recovery from attacks or malware infection on embedded devices.

One of his earlier security projects at Arm was the ARMmbed uVisor, a secure hypervisor that enforces hardware security boundaries between embedded software components using the ARMv7M memory protection unit on contemporary ARM Cortex M3/M4 microcontrollers.

Milosch has co-founded open hardware projects like and and designed the first open Active RFID reader hardware design to enable sophisticated research on human interaction and the spread of diseases as part of His open hardware OpenPCD RFID reader & sniffer designs targeting security researcher were used to break MIFARE Classic security.

He has fun breaking HID's iCLASS RFID readers & card security to make his point about security by obscurity and the treatment of fellow security researchers. As one of the three maintainers of the former Xbox-Linux Project, Milosch helped breaking the Xbox security in 2002 and ported the first Linux System to the Xbox.

He enjoys designing secure ultra low power wireless devices with privacy-enabled protocols and services.


Victor Mateu, Cryptographer, DarkMatter

Victor Mateu is an information security researcher with a PhD (2015) in applied cryptography. In the last couple of years, he has been involved with the design and implementation of cryptographic protocols.

Most recently, he is part of the cryptography team at DarkMatter where he is specialized post quantum cryptography and its implementation, either generic or specifically tailored for lightweight devices.


Eldar Marcussen, Lead Security Researcher, DarkMatter

Eldar is a long time security researcher and penetration tester. As a highly skilled bug hunter and exploit developer, Eldar was a recipient of the first CVE 10k candidate numbers.

He has also developed and delivered training courses on the art of bug hunting. In addition to finding vulnerabilities and writing exploits, he utilises his spare time to contribute to and maintain several open source projects aimed at security and penetration testing.


Rocky De Wiest, Senior Security Consultant, DarkMatter

Rocky De Wiest is a threat hunter and an experienced reverse-engineer who has been working with DarkMatter for two years. He has over 7 years of experience in information security. Is his years as an information security professional he has dealt with many targeted attacks, where he assisted in the incident response, hunting, as well as reversing of APT malware. Over the past years, he has led a significant amount of threat hunts throughout the region, which gave him great insights on a in the environment.


Maxim Deweerdt, Lead Consultant, DarkMatter

Maxim Deweerdt is Lead consultant at DarkMatter and a certified Incident Response and Digital Forensics (DFIR) professional. He’s been involved in many IR cases and several APT investigations. He was an early adopter of the threat hunting mind-set and has been helping many setting up their own Threat Hunting programs. Maxim is a respected public speaker on several Cybersecurity topics (e.g. Threat Hunting) and has been accepted at InfoSecurity, RSA, the SANS Threat Hunting Summit and others. He also an instructor for the SANS institute, where Maxim teaches the SEC511: Continuous Monitoring and Security Operations course.


Alexander Sherkin, Software Architect , DarkMatter

Architect at DarkMatter. As part of secure communications team, he is responsible for system architecture and security component design and development.

Over the past 10 years, Alex has worked for BlackBerry (previously Research In Motion) in a number of technical and technical leadership positions. At BlackBerry, he has designed and built security protocols, smart card frameworks, encryption modules, certificate enrolment systems, and secure email.

Alexander has a Computer Science degree with a minor in Combinatorics and Optimisation from the University of Waterloo, Canada. He holds over 25 patents in the field of certificate enrolment, security protocols, email security, server-side security, and security counter-measures.


Eric Eifert, Senior Vice President, DarkMatter

Eric Eifert is the Senior Vice President of Managed Security Services at DarkMatter. With more than 20 years of military and civilian experience in information technology and cyber security, Eric leads the DarkMatter team of security and technology professionals. His team provides customers onsite and remote security operations centre services. These include intrusion detection and prevention, security event monitoring and detection, incident investigation, 24/7 continuous diagnostics and mitigation, and event resolution. Eric and his team also assist customers in designing and building insider-threat detection capabilities; integrated network and security operation centres; continuous governance, risk and compliance monitoring; and cyber-situational awareness dashboards.


Juned Ansari, Senior Cyber Security Consultant, DarkMatter

Juned is working in DarkMatter as Senior Cyber Security Consultant in the Computer Network Defense practice. He holds a post graduate degree in Business Administration and a Bachelors in Computer Science. GXPN, GREM and GCFA are some of the technical certifications he has acquired over his professional career. Previously he has worked in global MNCs such as Microsoft, Deloitte and CSC. His primary area of expertise is Red Team exercises and he loves to make things work in ways that they are not designed to work.

He has authored two books on Penetration testing. Computers, Crypto Currency and Drones are stuffs that keeps him occupied.


Srivatsa Venkatesh, SOC Ops Manager, DarkMatter

A passionate Cyber Security professional with over 9 years of experience in multiple domains. My Expertise is majorly in Security Operations and SIEM. I started as a SOC Analyst and today I am currently working as the Operations Manager and Technical Lead in the MSS SOC of one of the leading cyber security companies in the middle-east region. I have built, transformed and managed multiple SOCs throughout the region. I have also designed and implemented SIEM deployments across the region. Currently, I manage 2 teams of 17 cyber professionals in all and am responsible for all services delivered by the SOC (Engineering and Operations).


Venkatesh Sivakumar, Security Consultant, DarkMatter

Venkatesh Sivakumar is a security consultant working with DarkMatter LLC. He is one of the top security researcher in Google vulnerability reward program. He is acknowledged 100+ companies which includes Google, Facebook, Microsoft, Twitter, Yahoo, AT&T, Dutch Govt, Blackberry, Apple, Oracle, Ebay etc. for reporting vulnerabilities in their applications.

He is also Offensive Certified Security Professional. He is also CTF player @ h4ckx0r5 .He has also authored few articles for PentestMag and hakin9. He has also given talks at universities, colleges and Null & OWASP community meetups. He was also a speaker at Nullcon, Ncsc India, c0c0n etc.


Chaouki Kasmi, Director  Mobile and Telecommunication Lab, xen1thLabs, DarkMatter

Chaouki Kasmi is the Director of the Mobile and Telecommunication Lab of DarkMatter. Previously working in the Wireless Security Lab of ANSSI for 8 years, his areas of expertise is Electromagnetic Security, RF Security and Hardware Security. He has co-authored more than 90 papers in scientific and hacking conferences/journal papers partially published in the framework of his PhD.

Since 2011 he has been working on using High Power Electromagnetics sources as an innovative attack vector in the cyber security domain as demonstrated in the remote and silent voice command injection techniques on smartphones at Hack In Paris 2015 and 2016.

He has been recognized as High Power Electromagnetic Life Fellow by the Summa Foundation and he received two young scientist awards in 2014 and 2015 from the International Union of Radio Science –URSI where he serves as Vice-President for the Commission E – Section France and Early Career Representative (ECR) Commission E International.



 Registration closed.

For any queries please email

Back To Event Listing