Personal Information
Organization / Workplace
Moscow, Russia Russian Federation
Occupation
PhD, Head Of/TeamLead
Industry
Technology / Software / Internet
About
Over a decade in cybersecurity, including digital forensics, I've gained deep insights into often misinterpreted security principles. My expertise covers advanced secure architecture, design, and development of defensive and offensive solutions.
As a security lead expert, I focus on privacy protection, data leakage prevention, and R&D security research. I lead cutting-edge projects and deliver innovative products, coordinating teams to enhance cyber resilience in critical infrastructure.
I'm also a renowned speaker with 10+ y of experience at major international conf's, covering wide topics. My talks at events like CyberCrimeForum, DefCamp, and HackerHalted are known for technical depth
Tags
yury chemerkin
conference
presentation
mobile security
cyber security
security
information security
mobile
hakin9
hakin9 magazine
blackberry
mobile application security
application security
mobile apps
mobile applications
cloud
cloud security
cloud computing
technology
defcamp
malware
emm
mdm
misleading
private data
data leakage
smart devices
iot
groteck business media
social network privacy
rootkit
hacktivity
hackerhalted
ita
hackmiami
mobile application development
mobile device management
smart applications
deepsec
mobile forensics
live forensics
forensics
hakin9 ondemand
hakin9 bible
Информационная безопаснос
hakin9 extra
android
facebook
interview
when developer's api simplify user-mode rootkits d
forensic
password
does your blackberry smartphone have ears?
information technology
balccon
deepintel
hackfest
defcon
hacker halted
isociety
i-society
notacon
application
ios
data security
vulnerability
privacy
byod
wearable
data protection
watch
security assistant
iot security
mobile computing
research
conferences
enterprise management
intelligencesec
dead forensics
amazon web services
aws
compliance
pentest
playbook
hakin9 ebook
twitter
hakin9 mobile
when developers api simplify user mode rootkits de
user mode rootkit
groteck
comparison of android and blackberry forensic tech
interview with yury chemerkin
hakin9 magazine hakin9 blackberry
to get round to the heart of fortress
password-stealer
password stealer
email
sms
is data secure on the password protected blackberr
screen-stealer
screen stealer
bes
bis
why is password protection a fallacy - a point of
the backroom message thats stolen your deal
a security system that changed the world
publications
publication
See more
Presentations
(58)Documents
(46)Likes
(30)Attacking XML Security
Yusuf Motiwala
•
16 years ago
OPSEC for hackers
grugq
•
11 years ago
BYOD с точки зрения ИБ. Подводные и надводные камни внедрения
Aleksey Lukatskiy
•
11 years ago
10 Tips for Making Beautiful Slideshow Presentations by www.visuali.se
Edahn Small
•
12 years ago
Visualize your Twitter network
Verkostoanatomia
•
12 years ago
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really?
Positive Hack Days
•
12 years ago
Безопасность без антивирусов 4
Positive Hack Days
•
12 years ago
Безопасность без антивирусов 3
Positive Hack Days
•
12 years ago
Безопасность без антивирусов 1
Positive Hack Days
•
12 years ago
HIJACKING ATTACKS ON ANDROID DEVICES
Positive Hack Days
•
12 years ago
Manish Chasta - Android forensics
Positive Hack Days
•
12 years ago
Manish Chasta - Securing Android Applications
Positive Hack Days
•
12 years ago
Бизнес-модель и речь в лифте
Андрей Кухаренко
•
12 years ago
Overview of Amazon Web Services
Amazon Web Services
•
12 years ago
4 сценария внедрения BYOD на предприятии
Aleksey Lukatskiy
•
12 years ago
Demo: Introduction to AWS, Cambridge
Amazon Web Services
•
12 years ago
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
Amazon Web Services
•
12 years ago
Outsmarting smartphones
SensePost
•
12 years ago
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Alert Logic
•
12 years ago
Worldwide security requirements
Aleksey Lukatskiy
•
12 years ago
Архитектура сети без границ
Cisco Russia
•
12 years ago
Mobility and cloud security
Aleksey Lukatskiy
•
12 years ago
Crypto regulations in Russia
Aleksey Lukatskiy
•
12 years ago
Mobile phone cultures
sman 2 mataram
•
12 years ago
Face recognition tech1
Ankit Gupta
•
12 years ago
Threat Modeling (Part 5)
Aleksey Lukatskiy
•
14 years ago
Threat Modeling (Part 4)
Aleksey Lukatskiy
•
14 years ago
Threat Modeling (Part 3)
Aleksey Lukatskiy
•
14 years ago
Threat Modeling (Part 2)
Aleksey Lukatskiy
•
14 years ago
Threat Modeling (Part 1)
Aleksey Lukatskiy
•
14 years ago
Personal Information
Organization / Workplace
Moscow, Russia Russian Federation
Occupation
PhD, Head Of/TeamLead
Industry
Technology / Software / Internet
About
Over a decade in cybersecurity, including digital forensics, I've gained deep insights into often misinterpreted security principles. My expertise covers advanced secure architecture, design, and development of defensive and offensive solutions.
As a security lead expert, I focus on privacy protection, data leakage prevention, and R&D security research. I lead cutting-edge projects and deliver innovative products, coordinating teams to enhance cyber resilience in critical infrastructure.
I'm also a renowned speaker with 10+ y of experience at major international conf's, covering wide topics. My talks at events like CyberCrimeForum, DefCamp, and HackerHalted are known for technical depth
Tags
yury chemerkin
conference
presentation
mobile security
cyber security
security
information security
mobile
hakin9
hakin9 magazine
blackberry
mobile application security
application security
mobile apps
mobile applications
cloud
cloud security
cloud computing
technology
defcamp
malware
emm
mdm
misleading
private data
data leakage
smart devices
iot
groteck business media
social network privacy
rootkit
hacktivity
hackerhalted
ita
hackmiami
mobile application development
mobile device management
smart applications
deepsec
mobile forensics
live forensics
forensics
hakin9 ondemand
hakin9 bible
Информационная безопаснос
hakin9 extra
android
facebook
interview
when developer's api simplify user-mode rootkits d
forensic
password
does your blackberry smartphone have ears?
information technology
balccon
deepintel
hackfest
defcon
hacker halted
isociety
i-society
notacon
application
ios
data security
vulnerability
privacy
byod
wearable
data protection
watch
security assistant
iot security
mobile computing
research
conferences
enterprise management
intelligencesec
dead forensics
amazon web services
aws
compliance
pentest
playbook
hakin9 ebook
twitter
hakin9 mobile
when developers api simplify user mode rootkits de
user mode rootkit
groteck
comparison of android and blackberry forensic tech
interview with yury chemerkin
hakin9 magazine hakin9 blackberry
to get round to the heart of fortress
password-stealer
password stealer
email
sms
is data secure on the password protected blackberr
screen-stealer
screen stealer
bes
bis
why is password protection a fallacy - a point of
the backroom message thats stolen your deal
a security system that changed the world
publications
publication
See more