{"id":21,"date":"2022-10-08T23:55:08","date_gmt":"2022-10-09T02:55:08","guid":{"rendered":"https:\/\/securitybsides.com.br\/2022\/?page_id=21"},"modified":"2022-11-08T00:43:49","modified_gmt":"2022-11-08T03:43:49","slug":"agenda","status":"publish","type":"page","link":"https:\/\/securitybsides.com.br\/2022\/agenda\/","title":{"rendered":"Agenda"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"21\" class=\"elementor elementor-21\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dd12a9b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd12a9b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-31a62ca\" data-id=\"31a62ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a540241 elementor-widget elementor-widget-heading\" data-id=\"a540241\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/securitybsides.com.br\/2022\/descricao-das-palestras-e-palestrantes\/\">Clique aqui e confira os detalhes das apresenta\u00e7\u00f5es e palestrantes<\/a><\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ff9d8d1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ff9d8d1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3a0c519d\" data-id=\"3a0c519d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75327d9c elementor-widget elementor-widget-text-editor\" data-id=\"75327d9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<div><b>Grade principal:<\/b><\/div>\n<div>\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Audit\u00f3rio<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Sala 202<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Sala 311<\/strong><\/center><\/th><th class=\"column-5\"><center><strong>Mini Audit\u00f3rio &#8211; Sala 201<\/strong><\/center><\/th><th class=\"column-6\"><center><strong>LAB CP01<\/strong><\/center><\/th><th class=\"column-7\"><center><strong>213<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td colspan=\"6\" class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td colspan=\"6\" class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:10<\/strong><\/center><\/td><td class=\"column-2\">Backdoor de 350 reais &#8211; Thiago Cunha<\/td><td class=\"column-3\">Como usar Gamifica\u00e7\u00e3o para construir Cultura de Ciberseguran\u00e7a no ambiente corporativo. &#8211; Vin\u00edcius Perallis<\/td><td class=\"column-4\">Hunting and Prevent ADCS Attacks &#8211; Fabricio Gimenes<\/td><td class=\"column-5\">O que o SAST n\u00e3o v\u00ea o cora\u00e7\u00e3o n\u00e3o sente &#8211; Tiago Zaniquelli<\/td><td rowspan=\"2\" class=\"column-6\">Dissection Android<br \/>\nApplications &#8211; Basic<br \/>\nSamuel Almeida<\/td><td class=\"column-7\">Configs vulner\u00e1veis comuns em stacks Google (Workspace + GCP) &#8211; Lucas Andrade Cioffi e Natalia Sampaio<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Blacks in Cyber Brasil &#8211; Social Justice and The Black Experience in Information Security &#8211; Cleber Brand\u00e3o (Clebeer)<\/td><td class=\"column-3\">Para al\u00e9m das hard skills: Soft skills para pessoas profissionais de ciberseguran\u00e7a &#8211; Sheyne Martins<\/td><td class=\"column-4\">Metaversos, sanduiches de inseguran\u00e7as e vulnerabilidades, venha j\u00e1 provar o seu! &#8211; Pedro Bezerra<\/td><td class=\"column-5\">Implementando AST tools nas CI\/CD pipelines &#8211; Rafaela Durlo e Gabriel Prevelate<\/td><td class=\"column-7\">Projeto OSINT Brazuca: Reposit\u00f3rio criado com intuito de reunir informa\u00e7\u00f5es, fontes(websites\/portais) e tricks de OSINT dentro do contexto Brasil &#8211; Cleiton Pinheiro<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"6\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Malware Attack using Exploitation with Reverse Shell, PowerShell, and malicious VBS &#8211; Filipi Pires<\/td><td class=\"column-3\">Exploit Prediction Scoring System (EPSS) &#8211; Aperfei\u00e7oando a prioriza\u00e7\u00e3o de vulnerabilidades de forma efetiva &#8211; Rodrigo Montoro e Leonardo Pinheiro<\/td><td class=\"column-4\">This person does not<br \/>\nexist is not a persona &#8211; Reinaldo Bispo (a.k.a. corvo)<\/td><td class=\"column-5\">Enquanto o Xerife viver &#8211; A hist\u00f3ria do You sh0t the Sheriff &#8211; Willian Caprino<\/td><td rowspan=\"2\" class=\"column-6\">Threat Hunting: Detecting data exfiltration over DNS &#8211; Guilherme Faro<\/td><td rowspan=\"2\" class=\"column-7\">Invadindo aplica\u00e7\u00f5es e corrigindo c\u00f3digos na pr\u00e1tica &#8211; Victor Matuk<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">BlackCat Ransomware: T\u00e1ticas e T\u00e9cnicas em um Ataque Direcionado &#8211; Gustavo Palazolo<\/td><td class=\"column-3\">DevOps is the new AD &#8211; Victor Pasknel<\/td><td class=\"column-4\">LGPD &#8211; Direito ao Esquecimento e o Mapeamento de Personas &#8211; M\u00e1rcio Roberto de Sousa Ramalho<\/td><td class=\"column-5\">N\u00e3o Responda &#8211; Jean Rafael Tardem Delefrati<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"6\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">HTTP Request Smuggling<br \/>\nExplained &#8211; Ricardo Iramar dos Santos<\/td><td class=\"column-3\">Melhores praticas de seguran\u00e7a em arquiteturas serverless na AWS &#8211; Raphael Lima<\/td><td class=\"column-4\">Ataques e Vulnerabilidades na Camada de Roteamento em Sensores loT &#8211; Estef\u00e2nia Pianoski<\/td><td class=\"column-5\">Per\u00edcia Forense &#8211; Como se<br \/>\nantecipar para lidar com<br \/>\ncrimes e incidentes<br \/>\ndigitais? &#8211; Danilo R\u00e9gis<\/td><td rowspan=\"2\" class=\"column-6\"><\/td><td rowspan=\"2\" class=\"column-7\">Invadindo aplica\u00e7\u00f5es e corrigindo c\u00f3digos na pr\u00e1tica (continua\u00e7\u00e3o) &#8211; Victor Matuk<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">50 Tons de Ransomware: Li\u00e7\u00f5es do Campo de Batalha &#8211; Jefferson Macedo<\/td><td class=\"column-3\">Cryptojacking in the wild on<br \/>\nGoogle Chrome &#8211; Vinicius Vieira(v1n1v131r4)<\/td><td class=\"column-4\">Instrumentando aplica\u00e7\u00f5es cross-platform com reFlutter + Frida. &#8211; Felipe Novais (a.k.a. crw|3y)<\/td><td class=\"column-5\">Como a Seguran\u00e7a da Informa\u00e7\u00e3o se popularizou ao longo das ultimas d\u00e9cadas e como o ser humano parou no tempo&#8230; &#8211; Felipe Prado<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"6\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-1 from cache --><\/div>\n<div>\u00a0<\/div>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Clique aqui e confira os detalhes das apresenta\u00e7\u00f5es e palestrantes Grade principal: \u00a0<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-21","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/pages\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":23,"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":484,"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/pages\/21\/revisions\/484"}],"wp:attachment":[{"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}