{"id":512,"date":"2022-11-08T22:56:24","date_gmt":"2022-11-09T01:56:24","guid":{"rendered":"https:\/\/securitybsides.com.br\/2022\/?page_id=512"},"modified":"2022-11-20T08:46:54","modified_gmt":"2022-11-20T11:46:54","slug":"atividades","status":"publish","type":"page","link":"https:\/\/securitybsides.com.br\/2022\/atividades\/","title":{"rendered":"Atividades"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">BioHacking<\/h2>\n\n\n\n<table id=\"tablepress-2\" class=\"tablepress tablepress-id-2\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>CP02<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Biohacking: Programa\u00e7\u00e3o Biol\u00f3gica e o Futuro da Biotecnologia - Eduardo Padilha<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td class=\"column-2\">Citizen Science e Biohaking: Open Brain Stimulation - Juliano Sanches<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Biohacking e a necessidade de aprimoramento no contempor\u00e2neo - Deivison Louren\u00e7o<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">Do Gene ao Produto - Dra Cassia Prado<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Do biohacking ao mercado - superando barreiras - Fernanda Matias<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">Implante NFC LED - DYI Biohacking, seu corpo como ambiente de teste - Matheus Bagoardi (a.k.a. h4sh3r)<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-2 from cache -->\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/hackerculture.com.br\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"150\" height=\"52\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/11\/hacker-culture-logo-divi.png\" alt=\"\" class=\"wp-image-662\"\/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cloud Security<\/h2>\n\n\n\n<table id=\"tablepress-3\" class=\"tablepress tablepress-id-3\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>204<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Abertura  Alexandre Sieira<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:10<\/strong><\/center><\/td><td class=\"column-2\">CTF (Capture the Flag) AWS - Bruna Monarim e Rogerio Kasa (Amazon)<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>11:30<\/strong><\/center><\/td><td class=\"column-2\">Seguran\u00e7a cibern\u00e9tica em ambientes pr\u00f3prios e de terceiros em n\u00fameros - Dani Dilkin<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:30<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>13:30<\/strong><\/center><\/td><td class=\"column-2\">Shopping for Vulnerabilities - How Cloud Service Provider Marketplaces can Help White and Black Hat Vulnerability Research - Alexandre Sieira<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Foco em cultura para escalar seguran\u00e7a - Rog\u00e9rio Kasa e Tuanny de Bairos - AWS<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>15:30<\/strong><\/center><\/td><td class=\"column-2\">Metadata in the Multi-Cloud of Madness  - Bruno Cavalhero e Matheus Queiroz<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>16:30<\/strong><\/center><\/td><td class=\"column-2\">Gerenciamento seguro de configura\u00e7\u00f5es no Azure - Renato Groffe (Microsoft)<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>17:30<\/strong><\/center><\/td><td class=\"column-2\">Resultado CTF AWS - Bruna Monarim e Rogerio Kasa (Amazon)<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td class=\"column-2\">Fechamento -  Alexandre Sieira<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-3 from cache -->\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-thumbnail is-style-default\"><a href=\"https:\/\/www.tenchisecurity.com.br\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/11\/tenchi-edited-150x150.jpeg\" alt=\"\" class=\"wp-image-519\"\/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">AppSec<\/h2>\n\n\n\n<table id=\"tablepress-4\" class=\"tablepress tablepress-id-4\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>211<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:10<\/strong><\/center><\/td><td class=\"column-2\">Threat Modeling - A arte de encontrar problemas antes do software existir. <\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">SCA - Por que \u00e9 importante cuidar das libs de terceiros? <\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">SAST - Scan de c\u00f3digo como voc\u00ea nunca viu.<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">DAST - Cuidado ao executar em produ\u00e7\u00e3o <\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">DevSecOps, tudo integrado e quebrando tudo<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">Processos de AppSec, tenho ferramentas e agora? <\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-4 from cache -->\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/10\/nova8_logoAzul.png\" alt=\"\" class=\"wp-image-417\" width=\"150\" height=\"64\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Hacker Career Fair<\/h2>\n\n\n\n<table id=\"tablepress-5\" class=\"tablepress tablepress-id-5\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>203<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:10<\/strong><\/center><\/td><td class=\"column-2\">Como se dar bem em entrevistas<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Venha bater um papo com o time expert em vagas de InfoSec<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Como se destacar em processos seletivos<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">Din\u00e2mica: Estruturar uma \u00e1rea de AppSec do zero<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">O que \u00e9 necess\u00e1rio para elaborar um plano de carreira hacker<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">F\u00f3rum de carreiras<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-5 from cache -->\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/10\/nova8_logoAzul.png\" alt=\"\" class=\"wp-image-417\" width=\"150\" height=\"64\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Forense e OSINT<\/h2>\n\n\n\n<table id=\"tablepress-6\" class=\"tablepress tablepress-id-6\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>312<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Boas Vindas e Panorama do Mercado<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:20<\/strong><\/center><\/td><td class=\"column-2\">Introdu\u00e7\u00e3o \u00e0 Per\u00edcia Forense Digital e Investiga\u00e7\u00e3o Cibern\u00e9tica - Ana Moura<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:10<\/strong><\/center><\/td><td class=\"column-2\">T\u00e9cnicas de OSINT Aplicadas ao Pentest - Jos\u00e9 In\u00e1cio<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>13:00<\/strong><\/center><\/td><td class=\"column-2\">O Telepata: Modelagem de Amea\u00e7as com Intelig\u00eancia de Amea\u00e7as. - Aldo Alves<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>13:50<\/strong><\/center><\/td><td class=\"column-2\">Estudo de Caso: An\u00e1lise Forense em Dispositivos Integrados - Paulo Emerson de Oliveira Pereira \/ Oswaldo Galichio Neto \/ Ana Paula Dantas Buchianeri Federicci \/ Natalia Harsanyi de Oliveira<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:40<\/strong><\/center><\/td><td class=\"column-2\">Coleta de Dados e An\u00e1lise Forense em ambientes remotos - V\u00edtor Moura<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:30<\/strong><\/center><\/td><td class=\"column-2\">An\u00e1lise de Dump de mem\u00f3ria para bypassar criptografia BitLocker - Rodrigo Curcino<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:20<\/strong><\/center><\/td><td class=\"column-2\">Engenharia Reversa e An\u00e1lise de Malware - Cristian Souza<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:10<\/strong><\/center><\/td><td class=\"column-2\">Uma vis\u00e3o integrada em Ciberseguran\u00e7a com o SGSI - Cristian Souza<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-6 from cache -->\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Sala de atividades (CTF) &#8211; Sala 313<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CTF &#8211; Escape the Hack &#8211; Foco em OSINT e Cyber Security<\/strong><br>Ganha quem realizar em menos tempo<br>Aviso no grupo Telegram da Village<br>Passo a passo na segunda-feira dia 21\/11\/2022 Online com Cristian Souza<br>Pr\u00eamio &#8211; Alexa<br><\/li>\n\n\n\n<li><strong>CTF &#8211; Escape the Hack &#8211; Investiga\u00e7\u00e3o Forense<\/strong><br>Ganha quem realizar em menos tempo<br>Aviso no grupo Telegram da Village<br>Passo a passo na segunda-feira dia 21\/11\/2022 Online com Ana Moura \/ Vitor Moura \/ Joathan Pedro<br>Pr\u00eamio &#8211; Alexa<br><\/li>\n\n\n\n<li><strong>SORTEIO<\/strong><br>4 Livros &#8211; Entrevista Forense Corporativa<br>Norma ABNT ISO 27002:2022<br>Copo Stanley da Copa<br>Curso Ethical Hacking Foundation | EHF EXIN<br>Information Security Foundation | ISFS EXIN<br>Security Development Foundation<\/li>\n<\/ul>\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/11\/Logo-idesp-e-daryus-azul.png\" alt=\"\" class=\"wp-image-493\" width=\"300\" height=\"75\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Woman Village<\/h2>\n\n\n\n<table id=\"tablepress-7\" class=\"tablepress tablepress-id-7\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>321<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:15<\/strong><\/center><\/td><td class=\"column-2\">Mentoria  de Carreira - Paula Rodrigues, Eva Pereira, Sheyne Martins<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>11:45<\/strong><\/center><\/td><td class=\"column-2\">Alert fatigue - Quando tudo \u00e9 importante, nada \u00e9 importante - Ana Tessaro<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:15<\/strong><\/center><\/td><td class=\"column-2\">Bypassing Mobile Protections - Daiane Santos<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>12:45<\/strong><\/center><\/td><td class=\"column-2\">De maioria a minoria: O cen\u00e1rio excludente de mulheres na tecnologia e o papel da comunidade em sua revers\u00e3o - Maria Luiza Sabino<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>13:15<\/strong><\/center><\/td><td class=\"column-2\">Mulheres, tecnologia e sexismo estrutural. Uma abordagem antropol\u00f3gica do machismo e possiveis estrat\u00e9gias para um futuro tecnlogico com equinanimidade de g\u00eanero. - Valeria Brandini<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>13:45<\/strong><\/center><\/td><td class=\"column-2\">Seguran\u00e7a de Redes 101 - Divina Vitorino<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>14:15<\/strong><\/center><\/td><td class=\"column-2\">Engenharia Social e os golpes banc\u00e1rios: conceito, aplica\u00e7\u00e3o\u00a0e\u00a0preven\u00e7\u00e3o - Juliana D\u00b4Addio<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>14:45<\/strong><\/center><\/td><td class=\"column-2\">Mulheres e Carreira: SecOps e Red Team - Andrea Tom\u00e9 e Gabriela LoCaspi<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>15:15<\/strong><\/center><\/td><td class=\"column-2\">Malwarel\u00e2ndia tropical: Vis\u00e3o t\u00e1tica e estrat\u00e9gica sobre os malwares na Am\u00e9rica Latina - Cybelle Oliveira<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><center><strong>15:45<\/strong><\/center><\/td><td class=\"column-2\">Diversidade: o novo Hack das Empresas\u00a0Tech - Larissa Lotufo<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><center><strong>16:15<\/strong><\/center><\/td><td class=\"column-2\">Woman in cyber, um passeio sobre trajet\u00f3rias femininas - Gabi Salles, Alessandra Martins e Katia Lustosa<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\"><center><strong>16:45<\/strong><\/center><\/td><td class=\"column-2\">Simplificando resposta a incidentes com serveless na nuvem AWS - Bruna Monarin<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\"><center><strong>17:15<\/strong><\/center><\/td><td class=\"column-2\">Mentoria  de Carreira - Paula Rodrigues, Eva Pereira, Sheyne Martins<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\"><center><strong>17:45<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-7 from cache -->\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table has-medium-font-size\"><table class=\"has-fixed-layout\"><tbody><tr><td><a href=\"https:\/\/womcy.org\/pt\/\" data-type=\"URL\" data-id=\"https:\/\/womcy.org\/pt\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/11\/womcy-1024x341.jpg\" alt=\"\" width=\"256\" height=\"85\"><\/a><\/td><td><a href=\"https:\/\/instagram.com\/cyber_securitygirlsbr?igshid=YmMyMTA2M2Y=\" data-type=\"URL\" data-id=\"https:\/\/instagram.com\/cyber_securitygirlsbr?igshid=YmMyMTA2M2Y=\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"74\" class=\"wp-image-644\" style=\"width: 150px;\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/11\/csg.png\" alt=\"\"><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Hardware Hacking<\/h2>\n\n\n\n<table id=\"tablepress-8\" class=\"tablepress tablepress-id-8\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>323<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:10<\/strong><\/center><\/td><td class=\"column-2\">A Definir<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">A Definir<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">A Definir<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">A Definir<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">A Definir<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">A Definir<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-8 from cache -->\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"211\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/11\/Logo_GaroaHC_verde.png\" alt=\"\" class=\"wp-image-583\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">4Kids<\/h2>\n\n\n\n<table id=\"tablepress-10\" class=\"tablepress tablepress-id-10\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>323<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:30<\/strong><\/center><\/td><td class=\"column-2\">Dinamicas SEC4KIDS<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:15<\/strong><\/center><\/td><td class=\"column-2\">Rodada  Liga Hacker Rangers<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Dinamicas SEC4KIDS<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:30<\/strong><\/center><\/td><td class=\"column-2\">Rodada  Liga Hacker Rangers<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>15:45<\/strong><\/center><\/td><td class=\"column-2\">Roda de Conversa para Responsaveis (Como garantir a seguran\u00e7a digital dos meus filhos?)<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:00<\/strong><\/center><\/td><td class=\"column-2\">Campe\u00f5es da Liga Hacker Rangers<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-10 from cache -->\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.instagram.com\/sec4kids\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"51\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/11\/4kids.jpeg\" alt=\"\" class=\"wp-image-653\"\/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nl.joinhackshield.com\/pt-BR\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"106\" src=\"https:\/\/securitybsides.com.br\/2022\/wp-content\/uploads\/2022\/11\/hackshild.jpeg\" alt=\"\" class=\"wp-image-709\"\/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>BioHacking Apoiadores: Cloud Security Apoiadores: AppSec Apoiadores: Hacker Career Fair Apoiadores: Forense e OSINT Sala de atividades (CTF) &#8211; Sala 313 Apoiadores: Cyber Woman Village Apoiadores: Hardware Hacking Apoiadores: 4Kids Apoiadores:<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-512","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/pages\/512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/comments?post=512"}],"version-history":[{"count":24,"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/pages\/512\/revisions"}],"predecessor-version":[{"id":712,"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/pages\/512\/revisions\/712"}],"wp:attachment":[{"href":"https:\/\/securitybsides.com.br\/2022\/wp-json\/wp\/v2\/media?parent=512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}