{"id":2142,"date":"2026-04-20T17:34:24","date_gmt":"2026-04-20T20:34:24","guid":{"rendered":"https:\/\/securitybsides.com.br\/2026\/?page_id=2142"},"modified":"2026-04-23T18:46:37","modified_gmt":"2026-04-23T21:46:37","slug":"palestras-e-treinamentos","status":"publish","type":"page","link":"https:\/\/securitybsides.com.br\/2026\/palestras-e-treinamentos\/","title":{"rendered":"Agenda"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center has-nv-c-2-color has-text-color has-link-color wp-elements-90f2668ec2796d969d3020634ca03575\"><strong><a href=\"https:\/\/securitybsides.com.br\/2026\/mini-treinamentos-e-workshops\/\" data-type=\"page\" data-id=\"1168\" target=\"_blank\" rel=\"noreferrer noopener\">Dia 16\/05\/2026 &#8211; S\u00e1bado<\/a><\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\"><strong>Workshops e Treinamentos<\/strong><\/h3>\n\n\n\n<table id=\"tablepress-30\" class=\"tablepress tablepress-id-30 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Hor\u00e1rio<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Sala a definir<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Sala a definir<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Sala a definir<\/strong><\/center><\/th><th class=\"column-5\"><center><strong>Sala a definir<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>14:00<\/strong><\/center><\/td><td colspan=\"4\" class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>14:45<\/strong><\/center><\/td><td colspan=\"4\" class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>15:00<\/strong><\/center><\/td><td rowspan=\"2\" class=\"column-2\">Fundamentos de Inteligencia Artificial: muito al\u00e9m de um prompt. &#8211; Renata Avelar de Mello<\/td><td rowspan=\"2\" class=\"column-3\">Investiga\u00e7\u00e3o Forense em AWS: coleta, preserva\u00e7\u00e3o e an\u00e1lise de evid\u00eancias em ambiente cloud. &#8211; M\u00e1rcio Bacci<\/td><td rowspan=\"2\" class=\"column-4\">Dark Web &#8211; O Submundo da Internet Profunda. &#8211; Reinaldo Bispo &#8211; corvo<\/td><td class=\"column-5\">ZapLab: Engenharia Reversa do Protocolo WhatsApp Web na Pr\u00e1tica &#8211; Gustavo Lichti<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>16:40<\/strong><\/center><\/td><td class=\"column-5\">Bluetooth Vulnerabilities: A Technical Deep Dive. &#8211; Isabela Ferreira de Vito<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>18:00<\/strong><\/center><\/td><td colspan=\"4\" class=\"column-2\"><center><strong>Encerramento<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-30 from cache -->\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-nv-c-2-color has-text-color has-link-color wp-elements-8aaeb456e644fdd1600a9c6ee6300c1a\"><strong><a href=\"https:\/\/securitybsides.com.br\/2026\/descricao-das-palestras-e-palestrantes\/\" data-type=\"page\" data-id=\"466\" target=\"_blank\" rel=\"noreferrer noopener\">Dia 17\/05\/2026 &#8211; Domingo<\/a><\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\"><strong>Palestras<\/strong><\/h3>\n\n\n\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Hor\u00e1rio<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Audit\u00f3rio Principal<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Audit\u00f3rio Reitoria<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>10:45<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">The Rise and Fall of ATS Malware &#8211; Fabio Assolini<\/td><td class=\"column-3\">QUIC-CID-FLOOD ATTACK &#8211; Th3Pr0f3ss0r<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>11:45<\/strong><\/center><\/td><td class=\"column-2\">Plotando o Caos: de Charts a Shell com t\u00e9cnicas de GenAI Red Teaming &#8211; Dandara Jatob\u00e1<\/td><td class=\"column-3\">From Signals to Predictions: Early Warning for Cyber Attacks &#8211; Andre Correa<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>12:25<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td class=\"column-2\">The Illusion of Control: Offensive Security Lessons from DLP Evasion &#8211; Dum_Dum e Charbel<\/td><td class=\"column-3\">Making the Invisible Visible: Using Threat Modeling to Expose Blind Spots in Modern SOCs &#8211; Leandro Rocha<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>14:25<\/strong><\/center><\/td><td class=\"column-2\">O Prompt \u00e9 a Evid\u00eancia: A forense digital Investigando Incidentes em Pipelines de IA Corporativa &#8211; Ricardo Capozzi<\/td><td class=\"column-3\">RACING FOR FUN AND PROFIT \u2013 When bugs turn into bonuses &#8211;  Maycon Vitali<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>15:10<\/strong><\/center><\/td><td class=\"column-2\">AImaru C2: A Nova Era do LotL (MCP AI-Driven C2) &#8211; Mario Lobo<\/td><td class=\"column-3\">Voc\u00ea Realmente Conhece Sua Superf\u00edcie de Ataque? Exposi\u00e7\u00e3o Real e Visibilidade Cont\u00ednua com IVRE &#8211; Andr\u00e9 Ricardo Landim<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>15:50<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>16:20<\/strong><\/center><\/td><td class=\"column-2\">Threat Hunting: DevOps \u00e9 o novo AD &#8211; Marcos Moraes<\/td><td class=\"column-3\">Subvertendo Detec\u00e7\u00f5es de Root: Uma An\u00e1lise Estat\u00edstica sobre a Efic\u00e1cia dos RASP &#8211; Filipe Baptistella e Marcos Moraes<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>17:05<\/strong><\/center><\/td><td class=\"column-2\">APT28 BadPaw\/MeowMeow: Da Campanha Real ao Lab Simulando um Ataque Real &#8211; Filipi Pires<\/td><td class=\"column-3\">Skip Ads, Download Malware: Ca\u00e7ando Campanhas de Infostealers no YouTube &#8211; Luiz Eduardo Paes Salom\u00e3o<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><center><strong>17:50<\/strong><\/center><\/td><td class=\"column-2\">NFC Card Password Bypass &#8211; Penegui<\/td><td class=\"column-3\">macOS Doesn\u2019t Get Malware\u2026Until It Does &#8211; Zoziel Freire<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"2\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-1 from cache -->\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dia 16\/05\/2026 &#8211; S\u00e1bado Workshops e Treinamentos Dia 17\/05\/2026 &#8211; Domingo Palestras<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-2142","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/comments?post=2142"}],"version-history":[{"count":6,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2142\/revisions"}],"predecessor-version":[{"id":2178,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2142\/revisions\/2178"}],"wp:attachment":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/media?parent=2142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}