{"id":512,"date":"2022-11-08T22:56:24","date_gmt":"2022-11-09T01:56:24","guid":{"rendered":"https:\/\/securitybsides.com.br\/2022\/?page_id=512"},"modified":"2023-06-25T10:07:14","modified_gmt":"2023-06-25T13:07:14","slug":"atividades","status":"publish","type":"page","link":"https:\/\/securitybsides.com.br\/2023\/atividades\/","title":{"rendered":"Atividades"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cloud Security<\/h2>\n\n\n\n<table id=\"tablepress-3\" class=\"tablepress tablepress-id-3\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Adorinam Barbosa<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Abertura  Alexandre Sieira<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:05<\/strong><\/center><\/td><td class=\"column-2\">Cloud Security Weather Forecasting &#8211; An opinionated set of insights of how to implement advanced cloud security\t&#8211; Alexandre Sieira<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>11:50<\/strong><\/center><\/td><td class=\"column-2\">Conhe\u00e7a seus clusters Kubernetes como a palma de sua m\u00e3o &#8211; Jo\u00e3o Brito<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:30<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Conhe\u00e7a seus clusters Kubernetes como a palma de sua m\u00e3o &#8211; Matheus Queiroz<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">Distributed Endpoint Security with Google Workspace &#8211; Felipe Zanetti<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:30<\/strong><\/center><\/td><td class=\"column-2\">Intervalo<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:10<\/strong><\/center><\/td><td class=\"column-2\">Distributed Endpoint Security with Google Workspace &#8211; Dani Dilkin<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td class=\"column-2\">Encerramento<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-3 from cache -->\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-thumbnail\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2022\/11\/tenchi-edited-e1668133959236-150x150.jpeg\" alt=\"\" class=\"wp-image-519\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Forense e OSINT<\/h2>\n\n\n\n<p>Demonstra\u00e7\u00e3o no Village do processo de extra\u00e7\u00e3o avan\u00e7ada com insumos (celulares, material de solda, etc) para realiza\u00e7\u00e3o de chipoff;<br>Demonstra\u00e7\u00e3o no Village de aquisi\u00e7\u00e3o forense em celulares com o software Avilla Forense (com a presen\u00e7a do criador da ferramenta, o policial civil Daniel Avilla);<br>Demonstra\u00e7\u00e3o no Village da \u00faltima vers\u00e3o do software Belkasoft com a presen\u00e7a do representante da empresa no Brasil;<br>Demonstra\u00e7\u00e3o no Village de coleta Forense de smartphone com a \u00faltima vers\u00e3o do Cellebrite UFED-II pela STWBRASIL.<\/p>\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/academiadeforensedigital.com.br\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/05\/Logo-AFD-azul.png\" alt=\"\" class=\"wp-image-798\" width=\"150\" height=\"150\" srcset=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/05\/Logo-AFD-azul.png 300w, https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/05\/Logo-AFD-azul-150x150.png 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/figure>\n<\/div>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Woman Village<\/h2>\n\n\n\n<table id=\"tablepress-7\" class=\"tablepress tablepress-id-7\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>A Definir<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">\"Cyber Resili\u00eancia: Framework NIST e Continuidade de Neg\u00f3cios\" - Camila I<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>11:30<\/strong><\/center><\/td><td class=\"column-2\">Ciberguerra - o que o conflito R\u00fassia x Ucrania temnnos ensinado? - Larissa Lotufo<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">A.I Regulations Challenges and Impacts - Caindo na real - Alessandra Martins<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>13:00<\/strong><\/center><\/td><td class=\"column-2\">Identidades: passado, presente e futuro -Celso Hummel<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>13:30<\/strong><\/center><\/td><td class=\"column-2\">Autoconhecimento e Prop\u00f3sito - Sheyne Martins e Rafaela Ferreira<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>14:15<\/strong><\/center><\/td><td class=\"column-2\">\"IA, quem paga as facilidades oferecidas?\" - Gabriela Salles<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>14:45<\/strong><\/center><\/td><td class=\"column-2\">GRC - Uma Vis\u00e3o Geral - Micheli Damasceno<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>15:15<\/strong><\/center><\/td><td class=\"column-2\">Desmistificando o Seguro Cyber - Luciana <\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>15:45<\/strong><\/center><\/td><td class=\"column-2\">Gest\u00e3o do Tempo e Produtividade - Stephanie Arias<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><center><strong>16:30<\/strong><\/center><\/td><td class=\"column-2\">Desmistificando apresenta\u00e7\u00f5es: Como perder a vergonha de falar em p\u00fablica e alavancar\u00a0a\u00a0sua\u00a0carreira - Elaine Rodrigues<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><center><strong>17:15<\/strong><\/center><\/td><td class=\"column-2\">Mentoria de Carreira - Andrea Tom\u00e9<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\"><center><strong>17:45<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-7 from cache -->\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table><tbody><tr><td><a href=\"https:\/\/www.linkedin.com\/company\/cybersecuritygirlsbr\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/company\/cybersecuritygirlsbr\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"150\" height=\"74\" class=\"wp-image-644\" style=\"width: 150px;\" src=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2022\/11\/csg.png\" alt=\"\"><\/a><\/td><td><a href=\"https:\/\/womcy.org\/pt\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"50\" class=\"wp-image-492\" style=\"width: 150px;\" src=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2022\/11\/womcy-e1668134118585.jpg\" alt=\"\"><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Garoa Hackerspace Village<\/h2>\n\n\n\n<p>Em breve<\/p>\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">4Kids<\/h2>\n\n\n\n<table id=\"tablepress-10\" class=\"tablepress tablepress-id-10\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Hor\u00e1rio<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Tema<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>Integral<\/strong><\/center><\/td><td class=\"column-2\">Gamefica\u00e7\u00e3o online - Comportamento Seguro (L)<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>Integral<\/strong><\/center><\/td><td class=\"column-2\">Jogos offline (Jogo da mem\u00f3ria, Sudoku, Cifra de Cesar) <\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:30<\/strong><\/center><\/td><td class=\"column-2\">Torneio Hacker Rangers  - Sorteio de premios<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Conta\u00e7\u00e3o de Historias:  Jo\u00e3o e Maria na Era Cyber (palestra)<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>15:30<\/strong><\/center><\/td><td class=\"column-2\">Roda de Conversa com Pais: Como falar de Seguran\u00e7a e Privacidade com os filhos? (palestra)<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>16:30<\/strong><\/center><\/td><td class=\"column-2\">Vamos falar de Diversidade? Historias de Crian\u00e7as Negras - SomosUm.Black (palestra)<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>17:00<\/strong><\/center><\/td><td class=\"column-2\">Torneio Hacker Rangers  - Sorteio de\u00a0premios<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-10 from cache -->\n\n\n\n<p><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table><tbody><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" class=\"wp-image-585\" style=\"width: 150px;\" src=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2022\/11\/Hekate.png\" alt=\"\"><\/td><td><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"174\" class=\"wp-image-978\" style=\"width: 150px;\" src=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/sec4kids.jpg\" alt=\"\" srcset=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/sec4kids.jpg 982w, https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/sec4kids-258x300.jpg 258w, https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/sec4kids-882x1024.jpg 882w, https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/sec4kids-768x892.jpg 768w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/td><td><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"140\" class=\"wp-image-975\" style=\"width: 150px;\" src=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/Programa-WOMCY-GEEK.png\" alt=\"\" srcset=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/Programa-WOMCY-GEEK.png 768w, https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/Programa-WOMCY-GEEK-300x279.png 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/td><td><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"140\" class=\"wp-image-976\" style=\"width: 150px;\" src=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/Programa-WOMCY-GIRLS.png\" alt=\"\" srcset=\"https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/Programa-WOMCY-GIRLS.png 768w, https:\/\/securitybsides.com.br\/2023\/wp-content\/uploads\/2023\/06\/Programa-WOMCY-GIRLS-300x279.png 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Security Apoiadores: Forense e OSINT Demonstra\u00e7\u00e3o no Village do processo de extra\u00e7\u00e3o avan\u00e7ada com insumos (celulares, material de solda, etc) para realiza\u00e7\u00e3o de chipoff;Demonstra\u00e7\u00e3o no Village de aquisi\u00e7\u00e3o forense em celulares com o software Avilla Forense (com a presen\u00e7a do criador da ferramenta, o policial civil Daniel Avilla);Demonstra\u00e7\u00e3o no Village da \u00faltima vers\u00e3o do&hellip;&nbsp;<a href=\"https:\/\/securitybsides.com.br\/2023\/atividades\/\" rel=\"bookmark\">Continue a ler &raquo;<span class=\"screen-reader-text\">Atividades<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-512","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybsides.com.br\/2023\/wp-json\/wp\/v2\/pages\/512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybsides.com.br\/2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybsides.com.br\/2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2023\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2023\/wp-json\/wp\/v2\/comments?post=512"}],"version-history":[{"count":36,"href":"https:\/\/securitybsides.com.br\/2023\/wp-json\/wp\/v2\/pages\/512\/revisions"}],"predecessor-version":[{"id":994,"href":"https:\/\/securitybsides.com.br\/2023\/wp-json\/wp\/v2\/pages\/512\/revisions\/994"}],"wp:attachment":[{"href":"https:\/\/securitybsides.com.br\/2023\/wp-json\/wp\/v2\/media?parent=512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}