RE: [EXTERNAL] CALL FOR PAPERS - Hackers 2 Hackers Conference 16th- edition

From: Michael Artemio Go Rebultan <>
To: Rodrigo Rubira Branco (BSDaemon) <>, <>
Subject: RE: [EXTERNAL] CALL FOR PAPERS - Hackers 2 Hackers Conference 16th- edition

Hackers 2 Hackers Conference - TALK.txt

Hi Rodrigo:
Thank you so much for this CFP. Kindly see attached from my end.

In my talk on the incoming "2019 Industrial Control Systems (ICS) Cyber Security Conference | Singapore" (, I will be covering Zero-day & fileless malware hunting in operational Technology (OT) environment which shows the persistence attacks from different threat actors and their cleverness.

It’s a pleasure be of service!

Warmest regards,
Global Information Security - Operations/DFIR

-----Original Message-----
From: Rodrigo Rubira Branco (BSDaemon) <> 
Sent: Monday, April 8, 2019 12:32 PM
Subject: [EXTERNAL] CALL FOR PAPERS - Hackers 2 Hackers Conference 16th edition

CALL FOR PAPERS - Hackers 2 Hackers Conference 16th edition

The call for papers for H2HC 16th edition is now open.  H2HC is a hacker conference taking place in Sao Paulo, Brazil, on 26th and 27th of October 2019.


For another consecutive year and past success we have been having, the annual Hackers 2 Hackers Conference will be held again in Sao Paulo, on 26 and 27 of october of 2019 and aims to get together industry, government, academia and underground hackers to share knowledge and leading-edge ideas about information security and everything related to it.

H2HC will feature national and international speakers and attendees with a wide range of skills. The atmosphere is favorable to present all facets of computer security subject and will be a great opportunity to network with like-minded people and enthusiasts.

The conference is a dual-language conference, with ALL talks in the main track in English or simultaneously translated to English by professional linguists with experience in computer sciences translation.


H2HC 16th Edition will take place at Novotel Center Norte, and expect to have around 1300 attendees in each day of the event.  The conference has two tracks, is open-bar (whiskey, vodka, beer, water, soda - minors are not allowed to drink alcoholic drink during the event) and has many other goodies (Capture-the-flag games, maker spaces and many workshops).

[*] About Sao Paulo (taken from

The city is the largest in Brazil and first in South America by population. Quite often Sao Paulo intimidates people because of its size, its constant pedestrian and vehicle traffic, ethnic and cultural multiplicity. Sao Paulo will surprise you whether you come here on business or for an expo, a congress or a convention, stay for at least one more day. Let yourself be seduced by the cultural diversity of this many-faceted city which vibrates, dictates fashion, is always anticipating trends, and welcomes Brazilians and foreigners from all over. And oh, do not forget to have fun in South America's wildest night life.

[ - TOPICS - ]

H2HC committee gives preference to lectures with practical demonstration. The conference staff will try to provide every equipment needed for the presentation in the case the author cannot provide them.

The following topics include, but are not limited to:
* Exploit development techniques
* Telecom security and phone phreaking
* Fuzzing and application security test
* Penetration testing
* Web application security
* Techniques for development of secure software and systems
* Hardware hacking, embedded systems and other electronic devices
* Mobile devices exploitation, Symbian, P2K and bluetooth technologies
* Analysis of virus, worms and all sorts of malwares
* Reverse engineering
* Rootkits
* Security in Wi-Fi and VoIP environments
* Information about smartcard and RFID security and similars
* Technical approach to alternative operating systems
* Denial of service attacks and/or countermeasures
* Security aspects in SCADA and industrial environments and "obscure"
* Cryptography
* Lockpicking, trashing, physical security and urban exploration
* Internet, privacy and Big Brother
* Information warfare and industrial espionage


Conference and trainings - H2HC Sao Paulo/Brazil

24 and 25, 28 and 29 of october: H2HC Trainings
26 and 27 of october of 2019: H2HC 16th Edition

Deadline and submissions

Deadline for proposal submissions: 17 of July of 2019 Deadline for slides submissions: 17 of August of 2019

Notification of acceptance or rejection: no before than 10 of August of 2019

 * E-mail for proposal submissions: cfp *noSPAM* h2hc *dot* com *dot* br

Make sure to provide along with your submission the following details:
* Speaker name or handle, address, e-mail, phone number and general contact information
* A brief but informative description about your talk
* Short biography of the presenter, including organization, company and affiliations
* Estimated time-length of presentation
* General topic of the speech (eg.: network security, secure programming, computer forensics, etc.)
* Any other technical requirements for your lecture
* Whether you need visa to enter Brazil or not (this is very important)

Speakers will be allocated 50 minutes of presentation time, although, if needed, we can extend the presentation length if requested in advance.

Preferable file format for papers and slides are both PDF and/or PPT.

Speakers are asked to hand in slides used in their lectures.  We do have recording for all talks, let us know if you prefer that we do not make the video of yours available.

PLEASE NOTE: Bear in mind no sales pitches will be allowed. If your presentation involves advertisement of products or services please do not submit.


Speakers' privileges are:
* H2HC staff can guarantee and we will provide accommodation for 3 nights
* For each non-Brazil resident speaker we might be able to cover travel expenses up to USD 1,200.00
* For each Brazil resident speaker we cover travel expenses
* Free pass to the conference
* Parties! Plenty of parties... Hope you enjoy it, otherwise you can stay in the hotel, sleep and regret!...

[ - Program Committe - ]

pipacs - Maintainer, PaX Project
spender - Maintainer, GRSecurity Project Stefano Zanero - Professor, Politecnico di Milano Alexander Matrosov - Embedded Security Lead, NVIDIA BSDaemon - Chief Security Researcher, Intel Corporation Natalie Silvanovich - Security Researcher, Google Project Zero Marion Marschalek - Senior Security Researcher, Intel Corporation

[ - Other information - ]

For further information please check out our web site it will be updated with everything regarding the conference.

[ - GPG Key - ]

We recommend to encrypt all communications. Our key fingerprint: 17BA 5D5B 40C0 CA12 0965 CD30 C379 9510 8462 0E28

Name and or Handle *: Mike Art Rebultan aka "Strainer"
Email Address *:
Mobile Number *: +65.84820917
Title and Company : DFIR/SecOps/Purple Team (APAC Lead) - Global IT & OT / @Equinix Inc.
Location *: Singapore
Brief Bio: *:  More than 8 years of Unix Systems Administration experience plus 8 years of IT security practitioner in cybercrime investigation and incident response in ICS/SCADA environment. Currently based in Singapore as a purple team lead in APAC security operations. Holds both a masters degree in IT and a graduate diploma in digital forensics and cybersecurity.

Presentation Title *: LET'S LAUNCH CYBER-KINETIC ATTACK | As Easy As 1-2-3
Abstract *:
The how is no longer a question in todays advanced persistent threat (APT) as exploits availability becomes rampant from both shallow and the dark web but when where every control systems security professionals and incident responders are not yet ready. 

And just imagine life without electricity and fuel that controls and gives every comfort we have today; air-condition, communications, medical supplies, transportations, foods and drinks, and even military defense that supposed to protect the Filipino people is down. With the very fast evolving landscape of cybersecurity threats to all critical and industrial firms, this precious life can be destroyed in just a blink of an eye anytime that no one is prepared for survival.

By leveraging the open source intelligence (OSINT), this presentation will showcase how simply an attacker could launch a cyber-kinetic attack and educate military, government authorities, and private sectors on defending their turf to prevent Firesale and cause catastrophic incident proactively.

This presentation is a vendor-neutral and no sales pitch but to highlight the timely wake-up call for all security researchers and practitioners in every nation against Cyber Warfare that everyone thoughts a myth.

1.     Be enlighten on the huge differences between IT and OT and how Incident Responders will fit to cover both environment.
2.      Practical implementation of Defense-in-Depth for both IT and OT against APTs.
3.       Learn and apply the best practices in ICS/SCADA and IT security.
4.    Understand Cyber-Kinetic attack and how to mitigate the risks.
5.      Equip attendees with the most dangerous threat in the Cyber-world.

1.     Government Officials and Authorities
2.        Private sectors from Aerospace, Maritime, Water & Waste, Industrial, Energy & Electrical Grid, Oil & Gas
3.     Financial and Banking Organizations
4. Telecommunication and Data Center Companies
4. Security Researchers and Consultants
5.        Defenders and Red Teamers

Copyright © 1995-2019 All rights reserved.