{"id":512,"date":"2022-11-08T22:56:24","date_gmt":"2022-11-09T01:56:24","guid":{"rendered":"https:\/\/securitybsides.com.br\/2022\/?page_id=512"},"modified":"2024-05-16T22:43:32","modified_gmt":"2024-05-17T01:43:32","slug":"atividades","status":"publish","type":"page","link":"https:\/\/securitybsides.com.br\/2024\/atividades\/","title":{"rendered":"Villages"},"content":{"rendered":"\n<p class=\"has-medium-font-size wp-block-paragraph\"><strong>As Villages da BSidesSP s\u00e3o espa\u00e7os tem\u00e1ticos organizados por comunidades ou parceiros nossos e ocorrem no domingo dia 19\/05\/2024. <\/strong><br><strong>A programa\u00e7\u00e3o das Villages \u00e9 independente da BSidesSP.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">AppSec Village<\/h2>\n\n\n\n<table id=\"tablepress-25\" class=\"tablepress tablepress-id-25 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>T\u00edtulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Resumo<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Seguran\u00e7a em desenvolvimento al\u00e9m de  ASTs (Application Security Testing) quebrando a esteira<\/td><td class=\"column-3\">Em um mundo cada vez mais digital, proteger nossas aplica\u00e7\u00f5es vai muito al\u00e9m de usar ferramentas de teste de seguran\u00e7a (ASTs). Na palestra vamos explorar como fortalecer a seguran\u00e7a de software com pr\u00e1ticas que integram DevSecOps, educam desenvolvedores e adotam estrat\u00e9gias proativas. Vamos desmistificar a ideia de que SAST, SCA, IAC entre outras ferramentas de AST s\u00e3o suficientes, mostrando como uma abordagem mais ampla pode tornar nossas aplica\u00e7\u00f5es muito mais seguras desde a concep\u00e7\u00e3o at\u00e9 a implementa\u00e7\u00e3o.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/wagnerelias\/\" rel=\"noopener\" target=\"_blank\">Wagner Elias<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Escape Room: Protect your Code<\/td><td class=\"column-3\">Encare este empolgante desafio de Escape Room Port\u00e1til! Forme uma equipe de at\u00e9 8 participantes e mergulhe em 15 minutos desafiadores, onde voc\u00eas precisar\u00e3o resolver quatro intrigantes desafios contidos em uma maleta. Esses desafios exigir\u00e3o habilidades de l\u00f3gica, resolu\u00e7\u00e3o de problemas, capacidades mec\u00e2nicas e, essencialmente, pr\u00e1ticas de codifica\u00e7\u00e3o segura para assegurar que seu software fique protegido contra vulnerabilidades. Preparado para testar suas habilidades sob press\u00e3o?<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td rowspan=\"3\" class=\"column-2\">Escape Room: Protect your Code<\/td><td rowspan=\"3\" class=\"column-3\">Encare este empolgante desafio de Escape Room Port\u00e1til! Forme uma equipe de at\u00e9 8 participantes e mergulhe em 15 minutos desafiadores, onde voc\u00eas precisar\u00e3o resolver quatro intrigantes desafios contidos em uma maleta. Esses desafios exigir\u00e3o habilidades de l\u00f3gica, resolu\u00e7\u00e3o de problemas, capacidades mec\u00e2nicas e, essencialmente, pr\u00e1ticas de codifica\u00e7\u00e3o segura para assegurar que seu software fique protegido contra vulnerabilidades. Preparado para testar suas habilidades sob press\u00e3o?<\/td><td rowspan=\"3\" class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td rowspan=\"2\" class=\"column-2\">Escape Room: Protect your Code<\/td><td rowspan=\"2\" class=\"column-3\">Encare este empolgante desafio de Escape Room Port\u00e1til! Forme uma equipe de at\u00e9 8 participantes e mergulhe em 15 minutos desafiadores, onde voc\u00eas precisar\u00e3o resolver quatro intrigantes desafios contidos em uma maleta. Esses desafios exigir\u00e3o habilidades de l\u00f3gica, resolu\u00e7\u00e3o de problemas, capacidades mec\u00e2nicas e, essencialmente, pr\u00e1ticas de codifica\u00e7\u00e3o segura para assegurar que seu software fique protegido contra vulnerabilidades. Preparado para testar suas habilidades sob press\u00e3o?<\/td><td rowspan=\"2\" class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-25 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong>Organiza\u00e7\u00e3o:<\/strong><\/p>\n\n\n\n<table id=\"tablepress-24\" class=\"tablepress tablepress-id-24\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><a href=\"https:\/\/www.convisoappsec.com\/\" rel=\"noopener\" target=\"_blank\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/logo_conviso.png\" alt=\"\" width=\"150\" height=\"28\" class=\"aligncenter size-thumbnail wp-image-1377\" \/><\/a><\/center><\/th><td class=\"column-2\"><\/td>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<\/tbody>\n<\/table>\n<!-- #tablepress-24 from cache -->\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-968c2540-9789-4f80-8973-505cf18d3a2d\">Bio Hacking Village<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Nesta edi\u00e7\u00e3o teremos no Village de BioHacking, a instala\u00e7\u00e3o de BioChips com Leonard Akira da MyBioChip (<a href=\"https:\/\/www.mybiochip.com.br\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.mybiochip.com.br<\/a>), Body Piercer especialista na aplica\u00e7\u00e3o de BioChips. No s\u00e1bado teremos o sorteio de 02 BioChips + Instala\u00e7\u00e3o para os presentes no evento (das 15h as 18h). N\u00e3o percam esta novidade!<\/p>\n\n\n\n<table id=\"tablepress-2\" class=\"tablepress tablepress-id-2 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>T\u00edtulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Descri\u00e7\u00e3o<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Biohacking: como equilibrar novidade e privacidade?<\/td><td class=\"column-3\">Biohacking busca alcan\u00e7ar melhorias para o corpo e a mente atrav\u00e9s da ci\u00eancia e tecnologia. Todavia, \u00e9 essencial equilibrar o uso dessa inova\u00e7\u00e3o com a prote\u00e7\u00e3o dos usu\u00e1rios, garantindo \u00e9tica, seguran\u00e7a e privacidade desde o in\u00edcio e em todo o processo.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/natalia-fischer\/\" rel=\"noopener\" target=\"_blank\">Natalia Fischer<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">A CONFIRMAR<\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">BioHacking e o Futuro do Transumanismo<\/td><td class=\"column-3\">Uma palestra explicando os pr\u00f3ximos passos da Evolu\u00e7\u00e3o Humana em dire\u00e7\u00e3o a um Futuro CyberTech.<\/td><td class=\"column-4\"><a href=\"http:\/\/instagram.com\/leo_akira\" rel=\"noopener\" target=\"_blank\">Leo Akira<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">A CONFIRMAR<\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Hackeando c\u00e9rebros &#8211; Como proteger seus dados cerebrais<\/td><td class=\"column-3\">Essa palestra explora o cen\u00e1rio atual do Biohacking underground e da ind\u00fastria m\u00e9dica, trazendo questionamentos sobre a prote\u00e7\u00e3o de dados m\u00e9dicos sens\u00edveis que aparecem com o advento dessa tecnologia.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.instagram.com\/mattgtralli\" rel=\"noopener\" target=\"_blank\">Matt<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">A CONFIRMAR<\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-2 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong>Organiza\u00e7\u00e3o:<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.linkedin.com\/in\/raulcandido\/\" target=\"_blank\" rel=\"noreferrer noopener\">Raul Candido<\/a> e <a href=\"https:\/\/www.linkedin.com\/in\/salomao\" target=\"_blank\" rel=\"noreferrer noopener\">Salom\u00e3o<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">CISOs Village<\/h2>\n\n\n\n<table id=\"tablepress-16\" class=\"tablepress tablepress-id-16 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Titulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Resumo<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Advancing AI: Considerations about Governance, Risk and Security<\/td><td class=\"column-3\">A palestra explorar\u00e1 o papel transformador da IA nos neg\u00f3cios com um olhar cr\u00edtico sobre governan\u00e7a, gest\u00e3o de riscos e seguran\u00e7a. Com base em insights e desenvolvimentos recentes, ser\u00e1 abordada uma vis\u00e3o geral abrangente que enfatiza a import\u00e2ncia de estruturas robustas de governan\u00e7a de IA, identifica\u00e7\u00e3o e mitiga\u00e7\u00e3o de riscos relacionados \u00e0 IA, e o papel vital da seguran\u00e7a para manter a integridade dos neg\u00f3cios e a confian\u00e7a nas aplica\u00e7\u00f5es de IA.<\/td><td class=\"column-4\">Gustavo Galegale<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Enfrentando os desafios de seguran\u00e7a da informa\u00e7\u00e3o e de privacidade da atualidade com os recursos de pequenas e m\u00e9dias empresas<\/td><td class=\"column-3\">A palestra come\u00e7ar\u00e1 a ser desenvolvida atrav\u00e9s da contextualiza\u00e7\u00e3o do papel e da signific\u00e2ncia das pequenas e m\u00e9dias empresas para a economia, aprofundando sobre as rela\u00e7\u00f5es que estas possuem com as grandes organiza\u00e7\u00f5es e os principais riscos decorrentes da execu\u00e7\u00e3o das atividades terceirizadas, que cada vez mais pautam as pr\u00e1ticas de sele\u00e7\u00e3o e gerenciamento dos fornecedores.<br \/>\nA tem\u00e1tica ser\u00e1 desenvolvida apresentando os principais desafios de seguran\u00e7a da informa\u00e7\u00e3o e privacidade comuns a estas empresas, que possuem a necessidade de se manter relevantes em um mercado altamente competitivo com poucos recursos financeiros, e discorrer\u00e1 sobre a gera\u00e7\u00e3o de valor enquanto introduz os benef\u00edcios de uma abordagem estruturada sob a lideran\u00e7a de um CISO para tornar as empresas cada dia mais seguras.<\/td><td class=\"column-4\">Marina Moraes<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td class=\"column-2\">vCISOs: L\u00edder de Seguran\u00e7a, TI ou de Riscos Corporativos?<\/td><td class=\"column-3\">As organiza\u00e7\u00f5es usam CISOs virtuais porque s\u00e3o mais acess\u00edveis do que CISOs em tempo integral. Eles tamb\u00e9m podem ser ben\u00e9ficos para organiza\u00e7\u00f5es que n\u00e3o est\u00e3o no setor de TI.O que \u00e9 um CISO virtual e como ele pode ajudar sua organiza\u00e7\u00e3o<br \/>\n&#8211; Os benef\u00edcios de usar um CISO virtual<br \/>\n&#8211; Os desafios de usar um CISO virtual<br \/>\n&#8211; Como escolher o CISO virtual certo para sua organiza\u00e7\u00e3o<\/td><td class=\"column-4\">Erick Kumagai<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Do Zero Trust ao Digital Trust<\/td><td class=\"column-3\">Embora o NIST defina o Zero Trust como um modelo de seguran\u00e7a que elimina a confian\u00e7a impl\u00edcita e assume que nenhum usu\u00e1rio, dispositivo ou servi\u00e7o \u00e9 confi\u00e1vel por padr\u00e3o, a ISACA apresenta o Digital Trust como uma abordagem hol\u00edstica para a seguran\u00e7a cibern\u00e9tica que se baseia em tr\u00eas pilares: Confian\u00e7a \/ Risco \/ Resili\u00eancia<br \/>\nPara fortalecer ainda mais sua postura de seguran\u00e7a, a empresa pode adotar o Digital Trust, implementando medidas como: Gerenciamento de Identidade e Acesso (IAM) \/ Segmenta\u00e7\u00e3o de Rede \/ Monitoramento Cont\u00ednuo \/ Planos de Recupera\u00e7\u00e3o de Desastres<br \/>\nAo combinar os princ\u00edpios do Zero Trust com a vis\u00e3o hol\u00edstica do Digital Trust, as empresas podem criar uma postura de seguran\u00e7a cibern\u00e9tica robusta e resiliente, capaz de proteger seus ativos digitais contra as amea\u00e7as em constante evolu\u00e7\u00e3o.<br \/>\n<\/td><td class=\"column-4\">Renato Borba<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">Engenharia Social e Deep Fake com IA<\/td><td class=\"column-3\">Elementos para uma Vis\u00e3o Executiva em Seguran\u00e7a Cibern\u00e9tica com Engenharia Social e Deep Fake com IA para CISOs:<br \/>\n1. Compreendendo a Amea\u00e7a: Engenharia Social e Deepfakes<br \/>\n2. Impacto nos Neg\u00f3cios<br \/>\n3. Desafios<br \/>\n4. Estrat\u00e9gias de Mitiga\u00e7\u00e3o<br \/>\n5. Lideran\u00e7a e Governan\u00e7a<br \/>\n6. Olhando para o Futuro&#8221;<\/td><td class=\"column-4\">Natanael dos Santos<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Intelig\u00eancia de amea\u00e7as e solu\u00e7\u00f5es protetivas &#8211; o que bate na porta do CISO e como levar\u00a0isso\u00a0ao\u00a0Board<\/td><td class=\"column-3\">Painel<\/td><td class=\"column-4\">Renato Borba &#8211; Moderador<br \/>\nThiago Bordini &#8211; Especialista CTI<br \/>\nThiago Tassele &#8211; Especialista em solu\u00e7\u00e3o de prote\u00e7\u00e3o<br \/>\nLeandro Ludwig &#8211; CISO (Bradesco)<br \/>\nFabiana Tanaka &#8211; CISO (Leroy)<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">Gest\u00e3o do Programa de Privacidade por Indicadores para\/ap\u00f3s Implementa\u00e7\u00e3o da LGPD.<\/td><td class=\"column-3\">A Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais (LGPD) trouxe um novo paradigma para o tratamento de dados no Brasil, exigindo das empresas robustas medidas de prote\u00e7\u00e3o e governan\u00e7a. O CISO, como l\u00edder em seguran\u00e7a da informa\u00e7\u00e3o, assume um papel crucial na implementa\u00e7\u00e3o e gest\u00e3o eficaz de um programa de privacidade, utilizando indicadores como b\u00fassola para o sucesso.<br \/>\n1. Compreendendo o Cen\u00e1rio da LGPD<br \/>\n2. Estabelecendo um Programa de Privacidade S\u00f3lido<br \/>\n3. O Poder dos Indicadores de Privacidade<br \/>\n4. Monitoramento e Tomada de Decis\u00f5es Estrat\u00e9gicas<br \/>\n5. Gest\u00e3o de Riscos e Conformidade Cont\u00ednua<\/td><td class=\"column-4\">Jos\u00e9 Galdino<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-16 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong>Organiza\u00e7\u00e3o<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/engage.isaca.org\/saopaulochapter\/home\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"150\" height=\"52\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/logo_isaca.jpeg\" alt=\"\" class=\"wp-image-1397\"\/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cloud Security<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Call For Papers <a href=\"https:\/\/www.linkedin.com\/posts\/tenchisecurity_bsides-sp-2024-call-for-papers-cfp-activity-7185626781507325953-ZBqE?utm_source=share&amp;utm_medium=member_ios\">ABERTO &#8211; Clique aqui<\/a><\/strong><\/p>\n\n\n\n<table id=\"tablepress-3\" class=\"tablepress tablepress-id-3 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>T\u00edtulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:10<\/strong><\/center><\/td><td class=\"column-2\">O canivete-su\u00ed\u00e7o de WAF: do b\u00e1sico at\u00e9 gambiarras t\u00e9cnicas e adestramento de equipes<\/td><td class=\"column-3\">Lucas Andrade Cioffi<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:50<\/strong><\/center><\/td><td class=\"column-2\">Fortificando a AWS: Explorando as Melhores Pr\u00e1ticas de Seguran\u00e7a com IAM<\/td><td class=\"column-3\">Fernando Alencar<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:30<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Seguran\u00e7a em Cloud 50-50: O modelo de responsabilidade compartilhada<\/td><td class=\"column-3\">Divina Vitorino<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>15:10<\/strong><\/center><\/td><td class=\"column-2\">Misconfiguration: Analisando Attack Paths em ambientes de nuvem<\/td><td class=\"column-3\">Filipi Pires<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:50<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>17:00<\/strong><\/center><\/td><td class=\"column-2\">Monitoramento e Resposta a Incidentes &#8211; Uma mudan\u00e7a de paradigmas<\/td><td class=\"column-3\">Ramon Martinez<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-3 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong>Organiza\u00e7\u00e3o:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-medium is-resized\"><a href=\"https:\/\/www.tenchisecurity.com.br\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"230\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/Asset-18Tenchi-Update-2023-300x230.png\" alt=\"\" class=\"wp-image-1290\" style=\"object-fit:contain;width:150px;height:150px\" srcset=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/Asset-18Tenchi-Update-2023-300x230.png 300w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/Asset-18Tenchi-Update-2023.png 524w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-x-large-font-size wp-block-paragraph\" style=\"font-style:normal;font-weight:700\">Conscientiza\u00e7\u00e3o Village<\/p>\n\n\n\n<table id=\"tablepress-19\" class=\"tablepress tablepress-id-19 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>T\u00edtulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Intelig\u00eancia Artificial X Ciberseguran\u00e7a: estrat\u00e9gias para se manter protegido\u00a0na\u00a0era\u00a0da\u00a0IA<\/td><td class=\"column-3\">Vin\u00edcius Perallis | CEO &#8211; Hacker Rangers<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:30<\/strong><\/center><\/td><td class=\"column-2\">Phishing: por que ele ainda \u00e9 uma amea\u00e7a no ambiente\u00a0corporativo?<\/td><td class=\"column-3\">Fernanda Mara Cruz | Analista em S.I. e professora no ensino superior &#8211; Pravaler<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Educa\u00e7\u00e3o acess\u00edvel em seguran\u00e7a\u00a0da\u00a0informa\u00e7\u00e3o<\/td><td class=\"column-3\">Daniela Guidugli | Information Security Analist &#8211; IAM de Creditas<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:30<\/strong><\/center><\/td><td class=\"column-2\">Atividade pr\u00e1tica para te ajudar a n\u00e3o cair em um phishing<\/td><td class=\"column-3\">A\u00e7\u00e3o: Phishing F\u00edsico<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>13:00<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">RedZone \u2013 Criando um PodCast de conscientiza\u00e7\u00e3o\u00a0do\u00a0zero.<\/td><td class=\"column-3\">Alexandre Armellini | Red Team Director Cipher &amp; Fernando Amatte | Threat Intelligence Manager<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:00<\/strong><\/center><\/td><td class=\"column-2\">Coincid\u00eancia ou destino? A arte da manipula\u00e7\u00e3o na era digital<\/td><td class=\"column-3\">Fl\u00e1vio Costa | Especialista em Ciberseguran\u00e7a &#8211; Fortinet<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>15:30<\/strong><\/center><\/td><td class=\"column-2\">Atividade pr\u00e1tica para te ajudar a n\u00e3o cair em um phishing<\/td><td class=\"column-3\">A\u00e7\u00e3o: Phishing F\u00edsico<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>16:00<\/strong><\/center><\/td><td class=\"column-2\">Curso ISAC &#8211; Information Security Awareness<\/td><td class=\"column-3\">C\u00e9u Balzano | Head de Produtos e Inova\u00e7\u00e3o &#8211; CULTSEC<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>16:30<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>17:00<\/strong><\/center><\/td><td class=\"column-2\">Atividade pr\u00e1tica para te ajudar a n\u00e3o cair em um phishing<\/td><td class=\"column-3\">A\u00e7\u00e3o: Phishing F\u00edsico<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><center><strong>17:30<br \/>\n<\/strong><\/center><\/td><td class=\"column-2\">Senhas: um refor\u00e7o ao sigilo e seguran\u00e7a\u00a0das\u00a0informa\u00e7\u00f5es<\/td><td class=\"column-3\">Nat\u00e1lia Fisher | DPO e Consultora em Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; NF Servi\u00e7os<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><center><strong>18:00<\/strong><\/center><\/td><td class=\"column-2\">Atividade pr\u00e1tica para te ajudar a n\u00e3o cair em um phishing<\/td><td class=\"column-3\">A\u00e7\u00e3o: Phishing F\u00edsico<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-19 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong>Organiza\u00e7\u00e3o:<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.linkedin.com\/in\/balzano\/\" target=\"_blank\" rel=\"noreferrer noopener\">C\u00e9u Balzano<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Apoio:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/hackerrangers.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2022\/10\/logotipo_hacker_rangers-1024x489.png\" alt=\"\" class=\"wp-image-431\" style=\"width:150px\"\/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Woman Village<\/h2>\n\n\n\n<table id=\"tablepress-7\" class=\"tablepress tablepress-id-7 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Tema<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Palestrantre<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Computa\u00e7\u00e3o Qu\u00e2ntica: Uma nova era de inova\u00e7\u00f5es<\/td><td class=\"column-3\">In\u00eas Brosso e Arnaldo Gunzi<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:20<\/strong><\/center><\/td><td class=\"column-2\">Acessibilidade e Seguran\u00e7a<\/td><td class=\"column-3\">Paula Papis e Thierry Marconde<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:40<\/strong><\/center><\/td><td class=\"column-2\">Seguran\u00e7a na Internet: Conscientiza\u00e7\u00e3o do usu\u00e1rio<\/td><td class=\"column-3\">Micarla Melo<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Quando a Seguran\u00e7a Cibern\u00e9tica encontra a Preven\u00e7\u00e3o a Fraudes<\/td><td class=\"column-3\">Juliana Silveira D&#8217;Addio<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:20<\/strong><\/center><\/td><td class=\"column-2\">Seguran\u00e7a compartilhada: Pr\u00e1ticas recomendadas do CIS controls v8 para gest\u00e3o de provedores de servi\u00e7os <\/td><td class=\"column-3\">Fernanda Mara Cruz<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>12:40<\/strong><\/center><\/td><td class=\"column-2\">Explorando o Cyber Universo: Tecnologia Educacional em SI<\/td><td class=\"column-3\">Maiza Dias<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>13:00<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Exposure Management<\/td><td class=\"column-3\">Ana Cerqueira<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>14:50<\/strong><\/center><\/td><td class=\"column-2\">OSINT em Fraudes Eletr\u00f4nicas<\/td><td class=\"column-3\">Vitor Pereira<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>15:10<\/strong><\/center><\/td><td class=\"column-2\">Cadeia de Impacto: Moldando o Futuro de IA de Alto Risco<\/td><td class=\"column-3\">Alessandra Martins<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>15:30<\/strong><\/center><\/td><td class=\"column-2\">Vamos dar um passeio seguro? Uma volta por algumas ferramentas de seguran\u00e7a da Microsoft<\/td><td class=\"column-3\">Gabriela Salles<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><center><strong>15:50<\/strong><\/center><\/td><td class=\"column-2\">Como networking pode salvar sua empresa de um ciberataque<\/td><td class=\"column-3\">Talu Gomes<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Humanizando o Hacker: A import\u00e2ncia das soft skills na seguran\u00e7a ofensiva<\/td><td class=\"column-3\">Dante Souza<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\"><center><strong>17:10<\/strong><\/center><\/td><td class=\"column-2\">IA x Appsec Mobile<\/td><td class=\"column-3\">Celso Hummel<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\"><center><strong>17:30<\/strong><\/center><\/td><td class=\"column-2\">Engenharia reversa para mulheres<\/td><td class=\"column-3\">Gabriela Vicari, Gabrielle Alves, Thayse Solis e Bianca Garcia<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-7 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong>Organiza\u00e7\u00e3o<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table><tbody><tr><td><a href=\"https:\/\/www.linkedin.com\/company\/cybersecuritygirlsbr\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/company\/cybersecuritygirlsbr\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"74\" class=\"wp-image-644\" style=\"width: 150px;\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2022\/11\/csg.png\" alt=\"\"><\/a><\/td><td><a href=\"https:\/\/womcy.org\/pt\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"50\" class=\"wp-image-492\" style=\"width: 150px;\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2022\/11\/womcy-e1668134118585.jpg\" alt=\"\"><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Village Dumont Hackerspace<\/h2>\n\n\n\n<table id=\"tablepress-8\" class=\"tablepress tablepress-id-8\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Atividade<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:05<\/strong><\/center><\/td><td class=\"column-2\">Bluetooth Hacking<\/td><td class=\"column-3\">Gabu<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:40<\/strong><\/center><\/td><td class=\"column-2\">Forma\u00e7\u00e3o de Comunidade para capacita\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o.<\/td><td class=\"column-3\">Arnaldo Napolitano Sanchez<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:15<br \/>\n<\/strong><\/center><\/td><td class=\"column-2\">O dia que fiz engenharia reversa num jogo de Gameboy Advance<\/td><td class=\"column-3\">Bruno Macabeus<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Introdu\u00e7\u00e3o a stack gr\u00e1fica do Linux<\/td><td class=\"column-3\">Zeh Ortigoza<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:05<\/strong><\/center><\/td><td class=\"column-2\">Explorando Vulnerabilidades nos sistemas keyless automotivos<\/td><td class=\"column-3\">Ana Clara Aravecchia<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:40<\/strong><\/center><\/td><td class=\"column-2\">Os perigos do wi-fi phishing, e como se prevenir<\/td><td class=\"column-3\">Matheus Henrique Rodrigues\/ Guilherme da Silva Oliveira<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Mensagens criptografadas do Whatsapp &#8211; Como elas acontecem exemplificadas atrav\u00e9s da Cifra de C\u00e9sar<\/td><td class=\"column-3\">Romenia Ishiyama<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>17:25<\/strong><\/center><\/td><td class=\"column-2\">N\u00e3o deixe o cadeado destrancado na nuvem! No\u00e7\u00f5es b\u00e1sicas de seguran\u00e7a na nuvem<\/td><td class=\"column-3\">Fl\u00e1vio Pimenta<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>18:00<\/strong><\/center><\/td><td class=\"column-2\">Definindo sua pipeline de CI\/CD no GitLab com o poderoso Checkov integrado ao Terraform<\/td><td class=\"column-3\">Amaury Borges Souza<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-8 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong><strong>Organiza\u00e7\u00e3o<\/strong>:<\/strong><\/p>\n\n\n\n<table id=\"tablepress-17\" class=\"tablepress tablepress-id-17\">\n<tbody>\n<tr class=\"row-1\">\n\t<td class=\"column-1\"><center><a href=\"https:\/\/www.instagram.com\/abcmakerspace\/\" rel=\"noopener\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/ABCMakerspace.png\" alt=\"\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-1273\" \/><\/center><\/a><\/td><td class=\"column-2\"><center><a href=\"https:\/\/www.linkedin.com\/company\/chap%C3%A9u-de-palha-hacker-club\/\" rel=\"noopener\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/chapedepalhahackerclube.jpg\" alt=\"\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-1274\" \/><\/center><\/a><\/td><td class=\"column-3\"><center><a href=\"https:\/\/twitter.com\/DumontHS\" rel=\"noopener\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/DumontHackerspace.png\" alt=\"\" width=\"150\" height=\"176\" class=\"aligncenter size-full wp-image-1275\" \/><\/center><\/a><\/td><td class=\"column-4\"><center><a href=\"https:\/\/lhc.net.br\/w\/index.php?title=P%C3%A1gina_principal\" rel=\"noopener\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/lhc-hackerspace.png\" alt=\"\" width=\"150\" height=\"100\" class=\"aligncenter size-full wp-image-1276\" \/><\/center><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-17 from cache -->\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Forense<\/h2>\n\n\n\n<table id=\"tablepress-6\" class=\"tablepress tablepress-id-6 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>T\u00edtulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Descri\u00e7\u00e3o<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:10<\/strong><\/center><\/td><td class=\"column-2\">Desmistificando o Reboleto<\/td><td class=\"column-3\">A palestra tem o foco em realizar a an\u00e1lise da cadeia de ataque do Reboleto, o qual se trata de uma ferramenta utilizada por criminosos para realizar a altera\u00e7\u00e3o de dados de boletos (c\u00f3digos e QR Codes). O foco \u00e9 apresentar detalhes do funcionamento e detalhes de investiga\u00e7\u00f5es.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/caiquebarqueta\/\" rel=\"noopener\" target=\"_blank\">Caique Barqueta<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Per\u00edcia Forense Digital como estrat\u00e9gia de neg\u00f3cios.<\/td><td class=\"column-3\">Como a per\u00edcia digital se encaixa em diversos nichos de neg\u00f3cios, os benef\u00edcios e diferenciais<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/peritopeterson\/\" rel=\"noopener\" target=\"_blank\">Peterson Batista<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Belkasoft Evidence X na pr\u00e1tica<\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/renancavalheiro\/\" rel=\"noopener\" target=\"_blank\">Renan Cavalheiro<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">Casos da vida Pericial<\/td><td class=\"column-3\">Estou a disposi\u00e7\u00e3o para trazer e <br \/>\ncontextualizar casos periciais<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/andr%C3%A9-lorinczi\/\" rel=\"noopener\" target=\"_blank\">Andr\u00e9 Lorinczi<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Pericia em audio e comparacao de locutores<\/td><td class=\"column-3\">Uma analise de como e feito uma pericia em audio.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.instagram.com\/edsspericiadigitalforense\" rel=\"noopener\" target=\"_blank\">Ezio Silva<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">Aplicaca\u00e7\u00e3o de LGPD e Pericicia Computacional<\/td><td class=\"column-3\">Principios da Computa\u00e7\u00e3o Forense em demandas com a LGPD.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/ricardo-capozzi\" rel=\"noopener\" target=\"_blank\">Ricardo Capozzi<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-6 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong>Organiza\u00e7\u00e3o<\/strong>:<\/p>\n\n\n\n<table id=\"tablepress-13\" class=\"tablepress tablepress-id-13\">\n<tbody>\n<tr class=\"row-1\">\n\t<td class=\"column-1\"><center><a href=\"https:\/\/www.apecof.org.br\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/APECOF-2-PNG-150x150.png\" alt=\"\" width=\"150\" height=\"150\" class=\"aligncenter size-thumbnail wp-image-1113\" srcset=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/APECOF-2-PNG-150x150.png 150w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/APECOF-2-PNG-300x300.png 300w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/APECOF-2-PNG-1024x1024.png 1024w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/APECOF-2-PNG-768x768.png 768w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/APECOF-2-PNG-1536x1536.png 1536w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/APECOF-2-PNG.png 1772w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/center><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-13 from cache -->\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" id=\"block-a413c55c-af13-4216-84f8-f1fef9efe4a0\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Village AI<\/h2>\n\n\n\n<figure class=\"wp-block-image size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"300\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/logo_village_ai-200x300.jpeg\" alt=\"\" class=\"wp-image-1392\" srcset=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/logo_village_ai-200x300.jpeg 200w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/logo_village_ai.jpeg 239w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<table id=\"tablepress-14\" class=\"tablepress tablepress-id-14 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Titulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Descri\u00e7\u00e3o<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">IA Generativa, um futuro inevit\u00e1vel<\/td><td class=\"column-3\">Veremos na apresenta\u00e7\u00e3o o potencial da IA generativa, capaz de conceber informa\u00e7\u00f5es e m\u00eddias in\u00e9ditas a partir de bancos de dados j\u00e1 existentes. Estamos vivendo o momento mais disruptivo da humanidade, e com estas habilidades, tornam-se aptas a produzir dados, imagens, v\u00eddeos e sons exclusivos e originais. Precisamos superar a vis\u00e3o equivocada onde a m\u00e1quina \u00e9 advers\u00e1ria do ser humano e passar a encar\u00e1-la como uma ferramenta eficiente para tarefas.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/alessandro-de-oliveira-faria\/\" rel=\"noopener\" target=\"_blank\">Alessandro de Oliveira Faria<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">O que \u00e9 prompt hacking?<\/td><td class=\"column-3\">A palestra ir\u00e1 dar uma introdu\u00e7\u00e3o sobre o que s\u00e3o LLMs e o que \u00e9 prompt hacking. Ap\u00f3s a introdu\u00e7\u00e3o, a ideia \u00e9 falar de alguns m\u00e9todos de ataque como prompt leaking, jailbreaking, etc. e estrat\u00e9gias de neutraliza\u00e7\u00e3o como filtering, sandwich defense, xml tagging, etc. Como \u00e9 uma \u00e1rea nova com constantes publica\u00e7\u00f5es, \u00e9 poss\u00edvel que eu inclua t\u00e9cnicas mais recentes at\u00e9 o dia da palestra.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/cassiasamp\" rel=\"noopener\" target=\"_blank\">C\u00e1ssia Sampaio<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td class=\"column-2\">Lingu\u00edstica Computacional aplicada \u00e0 Ciberseguran\u00e7a<\/td><td class=\"column-3\">Lingu\u00edstica Computacional \u00e9 a base da Intelig\u00eancia Artificial generativa atual. Nessa palestra, ensinaremos o p\u00fablico sobre processos b\u00e1sicos de processamentos de Dados de Texto at\u00e9 a chegada na IA. Ap\u00f3s isso, explicaremos as principais aplica\u00e7\u00f5es do campo em Ciberseguran\u00e7a, explicando t\u00e9cnicas de an\u00e1lise como Estilometria, Detec\u00e7\u00e3o de Phishing, Identifica\u00e7\u00e3o de L\u00edngua M\u00e3e, clusteriza\u00e7\u00e3o de dados, Embeddings e outros.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/ismael-deus-marques-msc-ba91861b2\/\" rel=\"noopener\" target=\"_blank\">Ismael Deus Marques<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Seguran\u00e7a ofensiva no mundo da IA<\/td><td class=\"column-3\">Um breve resumo em quais s\u00e3o os cen\u00e1rios e desafios existentes da seguran\u00e7a ofensiva com foco em IA, definindo a import\u00e2ncia do AI Red Team assim como ataques e casos de uso recentes e relacionados com o tema.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/lucaspalma\/\" rel=\"noopener\" target=\"_blank\">Lucas Palma<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">Modelagem de Amea\u00e7as, AI e Neurodata: sim, isso faz sentido<\/td><td class=\"column-3\">Esta palestra trabalha com a interse\u00e7\u00e3o da modelagem de amea\u00e7as (tanto em Seguran\u00e7a quanto em Privacidade), intelig\u00eancia artificial (IA) e dados oriundos de Brain Computer Interface (BCI) e outros gadgets cerebrais, explorando como esses campos convergem e se complementam, al\u00e9m de discutir o que j\u00e1 \u00e9 poss\u00edvel fazer, ainda que sem um framework oficial.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/marshallowitz\/\" rel=\"noopener\" target=\"_blank\">Sofia Marshallowitz<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Neural Networks in Phishing URL Detection<\/td><td class=\"column-3\">A palestra ir\u00e1 explorar um modelo de detec\u00e7\u00e3o de phishing baseado na an\u00e1lise de URL, abrangendo etapas como coleta, pr\u00e9-processamento de dados, aplica\u00e7\u00e3o do modelo e alertas. Um caso real de IA ser\u00e1 apresentado, com \u00eanfase na aplica\u00e7\u00e3o de Redes Neurais Convolucionais para detectar phishing.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/mateus-fernandes-ds\/\" rel=\"noopener\" target=\"_blank\">Mateus Fernandes<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">Painel: Por que o Red Team precisa conhecer algoritmos de LLM ?<br \/>\nMediador: Sylvio Musto Neto, MBA, CySA | <br \/>\n<\/td><td class=\"column-3\">O objetivo do painel \u00e9 promover um di\u00e1logo interativo e multidisciplinar sobre o papel crucial dos algoritmos de LLM (Large Language Models) na ciberseguran\u00e7a, destacando como o conhecimento aprofundado nessa \u00e1rea pode fortalecer as opera\u00e7\u00f5es do Red Team. Este painel visa unir especialistas de diferentes dom\u00ednios para explorar sinergias, compartilhar insights e discutir estrat\u00e9gias inovadoras que integram IA generativa, lingu\u00edstica computacional, modelagem de amea\u00e7as e t\u00e9cnicas de seguran\u00e7a ofensiva, com o objetivo de antecipar, detectar e neutralizar amea\u00e7as cibern\u00e9ticas de forma mais eficaz.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/sylviomusto\/\" rel=\"noopener\" target=\"_blank\">Sylvio Musto Neto<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-14 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong><strong>Organiza\u00e7\u00e3o<\/strong>:<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.linkedin.com\/in\/pedrobezerragrc\/\" data-type=\"link\" data-id=\"https:\/\/www.linkedin.com\/in\/pedrobezerragrc\/\" target=\"_blank\" rel=\"noreferrer noopener\">Pedro Bezerra<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">4Kids<\/h2>\n\n\n\n<table id=\"tablepress-10\" class=\"tablepress tablepress-id-10 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Titulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Esta\u00e7\u00e3o Brincadeiras STEM<\/td><td class=\"column-3\">Alessandra Pacheco e Estefanni Ferreira<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Esta\u00e7\u00e3o Leitura e Artes no Papel [STEM e Prote\u00e7\u00e3o de Dados]<\/td><td class=\"column-3\">Alessandra Pacheco e Estefanni Ferreira<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td class=\"column-2\">Esta\u00e7\u00e3o Gincana Goleada Segura<\/td><td class=\"column-3\">Alessandra Pacheco e Gleice Galdino<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Esta\u00e7\u00e3o Brincadeiras STEM<\/td><td class=\"column-3\">Gleice Galdino, Estefanni Ferreira<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">Esta\u00e7\u00e3o Gincana Goleada Segura<\/td><td class=\"column-3\">Alessandra Pacheco e Estefanni Ferreira<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Roda de Conversa &#8211; Tema: A import\u00e2ncia do controle parental e orienta\u00e7\u00f5es de configura\u00e7\u00e3o<\/td><td class=\"column-3\">Alessandra Pacheco, Gleice Galdino, Eva Pereira<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">Esta\u00e7\u00e3o Leitura e Artes no Papel [STEM e Prote\u00e7\u00e3o de Dados]<\/td><td class=\"column-3\">Gleice Galdino, Estefanni Ferreira<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-10 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong><strong>Organiza\u00e7\u00e3o<\/strong>:<\/strong><\/p>\n\n\n\n<table id=\"tablepress-23\" class=\"tablepress tablepress-id-23\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><a href=\"https:\/\/www.instagram.com\/sec4kids\/\" rel=\"noopener\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/sec4kids-150x150.png\" alt=\"\" width=\"150\" height=\"150\" class=\"aligncenter size-thumbnail wp-image-1308\" \/><\/a><\/center><\/th><th class=\"column-2\"><center><b>Apoio:<\/b><br><a href=\"https:\/\/hackerrangers.com\/\" rel=\"noopener\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/logo_hr.png\" alt=\"\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-1365\" \/><\/a><\/center><\/th><th class=\"column-3\"><center><a href=\"https:\/\/womcy.org\/pt\/\" el=\"noopener\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2023\/06\/Programa-WOMCY-GIRLS-150x150.png\" alt=\"\" width=\"150\" height=\"150\" class=\"aligncenter size-thumbnail wp-image-976\" \/><\/a><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<\/tbody>\n<\/table>\n<!-- #tablepress-23 from cache -->\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Mobile Security Village<\/h2>\n\n\n\n<figure class=\"wp-block-image size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/mobile_village-300x300.jpeg\" alt=\"\" class=\"wp-image-1394\" srcset=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/mobile_village-300x300.jpeg 300w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/mobile_village-1024x1024.jpeg 1024w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/mobile_village-150x150.jpeg 150w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/mobile_village-768x768.jpeg 768w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/mobile_village.jpeg 1080w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure>\n\n\n\n<table id=\"tablepress-4\" class=\"tablepress tablepress-id-4 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>T\u00edtulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Abertura<\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:10<\/strong><\/center><\/td><td class=\"column-2\">Mobile Appsec x IA<\/td><td class=\"column-3\">Celso Hummel<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Hardening Mobile Apps<\/td><td class=\"column-3\">Lucas Palma<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Como me tornei usu\u00e1rio Super no Duolingo sem pagar &#8211; O passo a passo para crackear o mais famoso app de l\u00ednguas<\/td><td class=\"column-3\">Rafael Sousa<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:10<\/strong><\/center><\/td><td class=\"column-2\">MobSec Tools: Al\u00e9m de Frida e Objection<\/td><td class=\"column-3\">Bruno Sena<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Mobile App Obfuscation<\/td><td class=\"column-3\">Larissa Maruyama<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">Como saber se sua escova de dentes faz parte de uma botnet?<\/td><td class=\"column-3\">Gabriel Barbosa (Gabu)<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:20<\/strong><\/center><\/td><td class=\"column-2\">Sorteio MobSec Crew<\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-4 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong><strong>Organiza\u00e7\u00e3o<\/strong>:<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.linkedin.com\/in\/bruno-lopes-sena\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bruno Sena<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">OSINT Village<\/h2>\n\n\n\n<table id=\"tablepress-5\" class=\"tablepress tablepress-id-5 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>T\u00edtulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Descri\u00e7\u00e3o<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:10<\/strong><\/center><\/td><td class=\"column-2\">Pesquisa na DeepWeb atrav\u00e9s da Surface<\/td><td class=\"column-3\">A apresenta\u00e7\u00e3o ser\u00e1 baseada na demonstra\u00e7\u00e3o de algumas t\u00e9cnicas e ferramentas que possibilitam pesquisar alguns dados da deepweb atrav\u00e9s de ferramentas da surface<\/td><td class=\"column-4\">Paloma Saldanha<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">OSINT para o Bem: Fazendo a Diferen\u00e7a na Vida das Pessoas<\/td><td class=\"column-3\">A palestra abordar\u00e1 como OSINT pode ser usadi para o bem e impactar e fazer a diferen\u00e7a real nas vidas das pessoas. inspirado na for\u00e7a tarefa do Skull Games pretendo abordar como t\u00e9cnicas eficientes e recursos de intelig\u00eancia de fontes abertas pode ajudar a identificar suspeitos e produzir provas.Nossa palestra ir\u00e1 explorar o poder transformador da Intelig\u00eancia de Fontes Abertas (OSINT) no combate ao abuso e na assist\u00eancia \u00e0s v\u00edtimas. Inspirados pela for\u00e7a-tarefa do Skull Games, discutiremos como a aplica\u00e7\u00e3o de t\u00e9cnicas avan\u00e7adas e o uso estrat\u00e9gico de recursos de OSINT podem ser cruciais na identifica\u00e7\u00e3o de predadores sexuais e suas v\u00edtimas, produzindo provas vitais para a aplica\u00e7\u00e3o da lei.<\/td><td class=\"column-4\">Daniel Donda<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Prevendo comportamentos de usu\u00e1rios em redes sociais usando OSINT e SOCMINT<\/td><td class=\"column-3\">Hoje cada postagem nas redes sociais e cada intera\u00e7\u00e3o online podem revelar detalhes \u00edntimos sobre nossa vida pessoal e profissional, a necessidade de inova\u00e7\u00e3o na defesa contra amea\u00e7as cibern\u00e9ticas \u00e9 mais evidente do que nunca. A palestra abordar\u00e1 essa quest\u00e3o de forma abrangente, explorando estrat\u00e9gias avan\u00e7adas de Intelig\u00eancia de Fontes Abertas e Intelig\u00eancia de M\u00eddia Social utilizadas por atacantes para identificar e selecionar alvos com precis\u00e3o.<\/td><td class=\"column-4\">Daivision<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">Mitos, fraquezas e crimes imperfeitos: 10 anos de investiga\u00e7\u00e3o sobre Darknets<\/td><td class=\"column-3\">Ser\u00e3o desmistificados alguns mitos relacionados \u00e0 Darkweb, algumas fragilidades que ocorreram nos \u00faltimos 10 anos ser\u00e3o discutidos e alguns crimes inform\u00e1ticos cometidos em Darknets que levaram a pris\u00f5es pelas autoridades policiais<br \/>\r\nser\u00e1 abordado. Por fim, alguns casos de desanonimiza\u00e7\u00e3o de servi\u00e7os ocultos devido a falhas de seguran\u00e7a ou falta de conhecimento ao implementar o servi\u00e7o oculto ser\u00e3o discutidos.<\/td><td class=\"column-4\">Francisco Rodriguez<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td class=\"column-2\">Al\u00e9m do perfil &#8211; OSINT e o poder da investiga\u00e7\u00e3o em redes sociais<\/td><td class=\"column-3\">&#8220;Vou ensinar como coletar informa\u00e7\u00f5es utilizando OSINT.<br \/>\nPrimeiro dou uma explica\u00e7\u00e3o sobre osint e vou ensinar a N\u00c2O usar ferramentas e sim pensar de uma forma analitica. <br \/>\nUma forma diferente de OSINT e foco na parte de SOCMINT, investiga\u00e7\u00e3o em redes sociais.&#8221;<\/td><td class=\"column-4\">Lucas Moreira<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Parece real mas n\u00e3o \u00e9: a import\u00e2ncia da verifica\u00e7\u00e3o de dados no processo de Hunting<\/td><td class=\"column-3\">Ao consultar um documento p\u00fablico voc\u00ea suspeita que uma informa\u00e7\u00e3o chave possa est\u00e1 errado? Se est\u00e1 errado, o erro \u00e9 proposital ou apenas um descuido? <br \/>\n<br \/>\nNesta palestra vamos descobrir o qu\u00e3o importante \u00e9 validar as informa\u00e7\u00f5es no processo de Hunting e como fugir dessas poss\u00edveis armadilhas.<\/td><td class=\"column-4\">Corvo<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">A dualidade da Cyber Threat Intelligence: Entre as sombras e a Luz<\/td><td class=\"column-3\">A talk ir\u00e1 ter como objetivo explorar os dois extremos de CTI, cada um representando uma faceta diferente da batalha cibern\u00e9tica. Iremos abordar t\u00e1ticas utilizadas pelo Lado Negro e tamb\u00e9m t\u00e1ticas que podem ser utilizadas pelo Lado Luminoso. Por fim, teremos um estudo de caso real visando rastrear sites da deep\/dark web utilizando de t\u00e9cnicas como o favicon.<\/td><td class=\"column-4\">Caique Barqueta<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-5 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong><strong>Organiza\u00e7\u00e3o<\/strong>:<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.linkedin.com\/in\/j\u00falio-c\u00e9sar-ferreira-rodrigues\/\" target=\"_blank\" rel=\"noreferrer noopener\">JC GreenMind<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-e8acbec1-c50d-4922-b481-d7901482ac50\">Red Team Village<\/h2>\n\n\n\n<table id=\"tablepress-15\" class=\"tablepress tablepress-id-15 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Titulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Descri\u00e7\u00e3o<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Electron Exposed: Red Team Revelations (macOS Edition)<\/td><td class=\"column-3\">In the world of cybersecurity, the stakes are always high, and at this year&#8217;s Bsides in S\u00e3o Paulo, we&#8217;re bringing a serious focus to the Red Team Village. Our objective? To dissect macOS Electron applications and reveal the vulnerabilities lurking beneath the surface.<br \/>\n<br \/>\nElectron applications, while popular, have shown vulnerabilities that can be exploited with relative ease. In this talk, we&#8217;ll uncover how these applications can be manipulated to bypass security measures, gaining access to directories protected by the Transparency, Consent, and Control (TCC). Furthermore, we&#8217;ll demonstrate techniques for implanting backdoors, effectively transforming these apps into gateways for privilege escalation.<br \/>\n<br \/>\nWe&#8217;ll provide an in-depth examination of the anatomy of an macOS Electron app, exposing the exploitation scenarios with meticulous detail. Through case studies, we&#8217;ll illustrate vulnerabilities that persist despite patches and highlight overlooked risks by manufacturers, emphasizing the real-world implications for both red team simulations and genuine attackers.<br \/>\n<br \/>\nOur discussion will underscore the critical necessity of hardening Electron applications against exploitation. Without proper fortification, these apps serve as low-hanging fruit for adversaries seeking to compromise systems. We&#8217;ll outline essential hardening techniques tailored to the diverse permissions these apps wield within the system.<br \/>\n<br \/>\nFinally, we&#8217;ll explore the more ominous implications of these vulnerabilities. Some applications boast entitlements granting access to sensitive resources like cameras and audio, which can be exploited for surveillance purposes. We&#8217;ll reveal how these entitlements can be leveraged to compromise user privacy, adding a sobering dimension to our exploration.<br \/>\n<br \/>\nThroughout the talk, we&#8217;ll present 3 CVEs acquired through our research, providing tangible evidence of the risks at hand.<br \/>\n<br \/>\nJoin us as we shine a light on the vulnerabilities inherent in Electron applications.<br \/>\nThis talk is essential for anyone involved in red team operations. See you there.<\/td><td class=\"column-4\"><a href=\"http:\/\/- https:\/\/www.linkedin.com\/in\/espreto\" rel=\"noopener\" target=\"_blank\">Roberto Espreto<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">An\u00e1lise de T\u00e9cnicas de Living off the Land usadas pelo grupo Volt Typhoon<\/td><td class=\"column-3\">A proposta da apresenta\u00e7\u00e3o \u00e9 realizar um exame das estrat\u00e9gias utilizadas pelo grupo cibern\u00e9tico Volt Typhoon conhecido por empregar t\u00e9cnicas de Living off the Land (LotL) em seus ataques. Dessa forma ser\u00e3o abordadas as TTPs de fases do engajamento desse grupo listadas pela Cybersecurity and Infrastructure Security Agency (CISA) diferenciando as t\u00e9cnicas aplicadas na vida real com o que aprendemos ao estudar para certifica\u00e7\u00f5es como OSCP e OSEP.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/angellocassio\" rel=\"noopener\" target=\"_blank\">Angello Cassio<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:50<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td class=\"column-2\">Unleashing GitOps: Leveraging GitOps for zero coast recon<\/td><td class=\"column-3\">Nesta palestra, exploramos o uso do GitOps para fins de recon e threat hunting, oferecendo um caminho para estrat\u00e9gias de reconhecimento de custo zero usando o Github. Ao aproveitar os princ\u00edpios do GitOps, os pesquisadores de seguran\u00e7a podem otimizar seus fluxos de trabalho de recon, playbooks e afins. Vamos usar a stack de ferramentas do ProjectDiscovery em conjunto com o HEDnsExtractor e criar uma receita do zero para retroaliementar seu processo de recon usando GitOps.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/isdebuggerpresent\/\" rel=\"noopener\" target=\"_blank\">Ialle Teixeira <\/a> e <a href=\"https:\/\/www.linkedin.com\/in\/neriberto\/\" rel=\"noopener\" target=\"_blank\">Neriberto Prado<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>14:30<\/strong><\/center><\/td><td class=\"column-2\">Bypassing almost all EDR\/XDR<\/td><td class=\"column-3\">Nesta palastra mostro algumas t\u00e9cnicas para realizar bypass em camas de defesa que atuam em ring 3 (UserLand).<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/helviojunior\/\" rel=\"noopener\" target=\"_blank\">Helvio Junior<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:20<\/strong><\/center><\/td><td class=\"column-2\">Fazendo Diferencia\u00e7\u00e3o de Bin\u00e1rios para Encontrar falhas e explor\u00e1-las!<\/td><td class=\"column-3\">Aqui pretendo demonstrar as principais t\u00e9cnicas usadas para explora\u00e7\u00e3o de bin\u00e1rios para encontrar falhas e vulnerabilidades, fazendo diferencia\u00e7\u00e3o entre elas e assim explora-las<\/td><td class=\"column-4\"><a href=\"https:\/\/www.instagram.com\/hackingnaweboficial\/\" rel=\"noopener\" target=\"_blank\">Rafael Sousa<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:10<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:50<\/strong><\/center><\/td><td class=\"column-2\">Potencializando A\u00e7\u00f5es Ofensivas atrav\u00e9s de OSINT Automatizada em Grupos de Telegram<\/td><td class=\"column-3\">A Palestra ir\u00e1 abordar o processo de OSINT automatizada em grupos de telegram com a ferramenta TEx (Telegram Explorer) e a an\u00e1lise das mensagens com o foco em extrair dados, informa\u00e7\u00f5es e insights \u00fateis para potencializar o alcance do Red Team e a\u00e7\u00f5es Ofensivas.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/guilherme-bacellar\/\" rel=\"noopener\" target=\"_blank\">Guilherme Bacelar<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\">Fortalecendo a defesa. T\u00e1ticas e T\u00e9cnicas de RedTeam para um BlueTeam mais eficiente<\/td><td class=\"column-3\">A ideia \u00e9 mostrar como uma pessoa que j\u00e1 foi do Red team e colocar ela dentro do blue team e trazer t\u00e1ticas e t\u00e9cnicas utilizadas pelo Red team a favor do blue team<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/%F0%9F%90%A7paulo-trindade-63058119\/\" rel=\"noopener\" target=\"_blank\">Paulo Trindade<\/a> e <a href=\"https:\/\/www.linkedin.com\/in\/ricardo-lvs\/\" rel=\"noopener\" target=\"_blank\">Ricardo Alves<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-15 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong>Organizadores:<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.linkedin.com\/in\/filipipires\/\" target=\"_blank\" rel=\"noreferrer noopener\">Filipi Pires<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Apoiadores:<\/strong><\/p>\n\n\n\n<table id=\"tablepress-20\" class=\"tablepress tablepress-id-20\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><a href=\"https:\/\/senhasegura.com\/pt-br\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/senhasegura-300x65.png\" alt=\"\" width=\"300\" height=\"65\" class=\"aligncenter size-medium wp-image-1137\" srcset=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/senhasegura-300x65.png 300w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/04\/senhasegura.png 386w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/th><th class=\"column-2\"><center><a href=\"https:\/\/redteamvillage.io\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/rtv-150x150.jpeg\" alt=\"\" width=\"150\" height=\"150\" class=\"aligncenter size-thumbnail wp-image-1328\" srcset=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/rtv-150x150.jpeg 150w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/rtv-300x300.jpeg 300w, https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2024\/05\/rtv.jpeg 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<\/tbody>\n<\/table>\n<!-- #tablepress-20 from cache -->\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Village &#8211; Somos Um<\/h2>\n\n\n\n<table id=\"tablepress-18\" class=\"tablepress tablepress-id-18\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Titulo<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Recep\u00e7\u00e3o &#8211; Village Somos Um<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:30<\/strong><\/center><\/td><td class=\"column-2\">Boas Vindas dos membros + Agenda do Dia<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>12:00<\/strong><\/center><\/td><td class=\"column-2\">Colonialismo Digital com Rodolfo Avelino + Sessao de aut\u00f3grafo de seu livro<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:40<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>14:40<\/strong><\/center><\/td><td class=\"column-2\">Algoritmos Racistas com Ruan Brand\u00e3o<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>15:00<\/strong><\/center><\/td><td class=\"column-2\">Painel Hist\u00f3rias Negras em Cyber: Desafios e Oportunidades com Eva Pereira, Daniele Ferreira, Cleber Brand\u00e3o e modera\u00e7\u00e3o de Gustavo Marques.<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>16:00<\/strong><\/center><\/td><td class=\"column-2\">Conex\u00e3o Afro com Jobson Santana<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>16:40<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>17:00<\/strong><\/center><\/td><td class=\"column-2\">Espa\u00e7o aberto para d\u00favidas e mentoria<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>18:00<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-18 from cache -->\n\n\n<p class=\"wp-block-paragraph\"><strong><strong>Organiza\u00e7\u00e3o<\/strong>:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"164\" src=\"https:\/\/securitybsides.com.br\/2024\/wp-content\/uploads\/2023\/06\/somos1-1.jpeg\" alt=\"\" class=\"wp-image-933\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>As Villages da BSidesSP s\u00e3o espa\u00e7os tem\u00e1ticos organizados por comunidades ou parceiros nossos e ocorrem no domingo dia 19\/05\/2024. A programa\u00e7\u00e3o das Villages \u00e9 independente da BSidesSP. AppSec Village Organiza\u00e7\u00e3o: Bio Hacking Village Nesta edi\u00e7\u00e3o teremos no Village de BioHacking, a instala\u00e7\u00e3o de BioChips com Leonard Akira da MyBioChip (https:\/\/www.mybiochip.com.br), Body Piercer especialista na aplica\u00e7\u00e3o&hellip;&nbsp;<a href=\"https:\/\/securitybsides.com.br\/2024\/atividades\/\" rel=\"bookmark\">Continue a ler &raquo;<span class=\"screen-reader-text\">Villages<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-512","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybsides.com.br\/2024\/wp-json\/wp\/v2\/pages\/512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybsides.com.br\/2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybsides.com.br\/2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2024\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2024\/wp-json\/wp\/v2\/comments?post=512"}],"version-history":[{"count":75,"href":"https:\/\/securitybsides.com.br\/2024\/wp-json\/wp\/v2\/pages\/512\/revisions"}],"predecessor-version":[{"id":1440,"href":"https:\/\/securitybsides.com.br\/2024\/wp-json\/wp\/v2\/pages\/512\/revisions\/1440"}],"wp:attachment":[{"href":"https:\/\/securitybsides.com.br\/2024\/wp-json\/wp\/v2\/media?parent=512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}