Our Renowned RenasCON Speakers
Pentest Lead, TRS Group of Companies
Talk Abstract
Imagine a world where your data is stored in an invisible fortress, accessible from anywhere, yet shielded from prying eyes.
This is the world of cloud computing, a technological marvel that has transformed the way we store, access, and share information.
However, as with any revolutionary advancement, cloud computing has not escaped its fair share of myths and misconceptions, particularly when it comes to security.
Today, I stand before you to unravel these myths, dissect the misconceptions, and shed light on the true state of cloud security.
Join me as we embark on a journey to demystify the cloud and discover the realities that lie beneath the surface.
Mr. Jubaer, a distinguished security researcher (OSCP), has a remarkable reputation in the domains of information and cloud security.
With an illustrious track record spanning over 5 years, Mr. Jubaer’s hands-on experience in penetration testing, network security, and vulnerability assessment is extensive.
His portfolio boasts noteworthy achievements, notably the discovery of the Apple vulnerability (CVE-2023-23526), which adds to his impressive record of identifying vulnerabilities across more than 300 companies, including industry giants such as Apple, Grab, Google, Yahoo, Facebook, and Uber.
Mr. Jubaer’s diligent contributions have been generously rewarded, evident in his prominent standing on HackerOne’s bug bounty platform with an impressive 3.5k reputation. Beyond his technical prowess, Mr. Jubaer actively nurtures the security community through his insightful articles and the development of potent tools utilizing the Python and Go languages. His expertise further extends to security compliance (GRC) and the intricacies of Web3 technologies, demonstrating his comprehensive command of the evolving security landscape.
Secretary, ISACA Dhaka Chapter | Head of Information Security, Eastern Bank Ltd
Talk Abstract
The proposed presentation focuses on the importance of having a comprehensive plan and strategy in place to respond to security breaches effectively.
Security breaches refer to unauthorized access, theft, manipulation, or exposure of sensitive data or information within an organization’s systems, networks, or infrastructure.
The purpose of such a presentation is to emphasize that no system or organization is completely immune to security breaches, and it’s essential to be proactive in preparing for and responding to these incidents.
The presentation will cover:
Currently Mr. Azad is serving as Head of Information Security at Eastern Bank Ltd with more than 20 years professional experience. Over the years, he has earned several professional certifications like CISA, CISM, CRISC, COBIT, CISSP, CDPSE, CEH, ISO 27001-LA, and ITIL. He had several research work publications in different countries, including The USA, Spain, Germany, Egypt, Hong Kong, UAE, and Thailand.
He also achieved international recognition as a contributor.
Mr. Azad is a member of below professional societies:
He is a seasoned speaker on cyber security, data privacy, security governance, and AI at home and abroad. He has contributed significantly during the pandemic session to protect the information system of the Bank as cyber-attacks increased a lot during this time. The organization has achieved PCI DSS & ISO 27001 compliance. Recently his contribution was covered in different media.
Security Engineer, Trustaira Limited
Talk Abstract
In today’s cybersecurity landscape, knowledge is power, and precision is paramount.
Enter “Observer,” a formidable tool designed to fortify our digital defenses by honing in on the intricacies of internet assets and the vulnerabilities within.
Observer, at its core, is a cybersecurity sentinel. Its primary mission revolves around intensive data collection, analysis, and visualization. It probes specific internet assets, scrutinizing their technological configurations and exposing potential weaknesses.
Furthermore, Observer excels in crafting a detailed threat landscape, painting a vivid picture of how adversaries may exploit these vulnerabilities
With a passion for offensive security and a deep interest in threat intelligence, A. R Maheer is an accomplished professional who brings a wealth of experience to the cybersecurity field.
As a developer and pentester, he has dedicated his career to crafting tools that empower offensive security researchers to achieve more meaningful outcomes.
Currently serving as a Security Engineer at Trustaira Limited, A. R Maheer is also the founder of System00 Security, an initiative born out of his commitment to advancing the cybersecurity landscape. His unwavering dedication to the field makes him a notable figure in the realm of cybersecurity.
Independent Security Researcher
Talk Abstract
Join Almas, a seasoned Information Security Researcher with a decade of experience, as he unravels the world of cyber deception.
In this talk, he exposes how URLs and links can be manipulated to compromise trust in the digital realm. Through real-world examples, Almas demonstrates the power of cyber illusions and provides insights into defense strategies.
Explore the hidden vulnerabilities of the web and learn to navigate the digital landscape with skepticism and knowledge as your guides.
An enthusiastic and experienced Information Security Researcher from Bangladesh with ten years of industry experience. Almas has collaborated with prominent companies and organizations, honing AppSec, VAPT, Digital Forensics, Reverse Engineering, and Exploit Development skills.
Beyond technical prowess, he has demonstrated leadership and adeptness in team management.
Managing Director, Octagram Limited
Talk Abstract
Join Almas, a seasoned Information Security Researcher with a decade of experience, as he unravels the world of cyber deception.
In this talk, he exposes how URLs and links can be manipulated to compromise trust in the digital realm. Through real-world examples, Almas demonstrates the power of cyber illusions and provides insights into defense strategies.
Explore the hidden vulnerabilities of the web and learn to navigate the digital landscape with skepticism and knowledge as your guides.
Md. Hassan Shahriar Fahim, a devoted cyber security enthusiast and accomplished cyber crime analyst, has played a pivotal role as an OSINT and cyber crime analyst within a distinguished law enforcement agency, contributing extensively for over four years. Over the span of a decade, he has steadfastly immersed in the dynamic landscape of cyber security, continuously refining his skills to navigate the ever-evolving challenges and advancements effectively.
His passion for knowledge dissemination has led him to orchestrate several impactful training sessions, catering to diverse audiences, including educational institutions, IT enthusiast groups, and esteemed law enforcement agencies. This commitment to education has been pivotal in fostering a heightened sense of cyber awareness and preparedness.
In addition, he has leveraged his expertise to contribute substantively to a human rights NGO, with a specific focus on elevating the digital safety of women within the intricate realm of cyber. This multifaceted journey underscores his unwavering dedication to fortifying cyber security and championing a safer digital domain. been
Senior Internet Security Specialist, APNIC
Talk Abstract
Honeypots can be a great tool for detection and learning for incident responders and security practitioners. In this talk I will highlight some of the threats captured in our community honeynet project with a brief analysis. The take aways will be some lessons learned for the security community & practitioners.
Adli Wahid has been a vital APNIC member since February 2014, exhibiting outstanding technical leadership and extensive cyber security expertise. As APNIC’s dedicated security evangelist, Adli plays a key role in outreach, engagement, and fostering collaboration within the regional community. His notable contributions include election to the FIRST.org Board of Directors in 2015.
Adli actively collaborates with members, LEAs, and CERTs/CSIRTs. He also spearheads the Honeynet Project and elevates Threat Sharing across Asia Pacific. Additionally, he conducts talks, workshops, and guides security team setup, while nurturing Security Communities for growth in the Asia Pacific.
Adli’s unwavering commitment shapes APNIC’s dedication to a secure digital future.
Additional Deputy Police Commissioner, DMP, Dhaka
30th BCS Police, Bangladesh
Ex System Engineer, Grameenphone
Talk Abstract
.
A K M Sazzadul Alam is a distinguished professional with an extensive background in the field of telecommunications and security. With a wealth of experience, he has effectively managed various critical systems, including two-way radio communication, Hybrid PABX, Data Centre, Transmission Network, LAN, WiFi, Internet distribution, IP CCTV, Ground to Air communication, Website, AFIS, and other databases. His exceptional leadership skills and expertise have been instrumental in ensuring the smooth operation and security of these vital systems.
Mr. Sazzad’s remarkable career journey also includes serving as an Additional Deputy Police Commissioner with the Dhaka Metropolitan Police, where he has made significant contributions to maintaining law and order in the capital city. He achieved the 30th BCS Cadre in Bangladesh Police, a testament to his dedication and commitment.
Prior to his role in law enforcement, Mr. Sazzad held the position of System Engineer at Grameenphone, one of the leading telecommunications companies in Bangladesh. His work in the telecommunications industry reflects his strong foundation in Electronics and Communication Engineering, earned from KUET (Khulna University of Engineering and Technology).
Mr. Sazzad’s unwavering dedication to his profession and his commitment to the betterment of society make him a respected and admired figure in the fields of telecommunications, law enforcement, and engineering. His contributions have left a lasting impact, and he continues to inspire those around him through his exemplary work and leadership.
RCT, APNIC
Talk Abstract
The topic will share an introduction to IPv6 and it’s impact. Following with common security features and risks between IPv6 & IPv4. Finally it will brief the new key security features and risks that we need to be aware of
Q S Tahmeed has more than 17 years of experience working in ISP/NSP entities in Bangladesh. He has strong knowledge and experience in the design, development & operation of scalable and resilient network infrastructure and services. His technical interest areas include Internet Routing and security, OSPF, IPv6 Deployment, Network Automation, MPLS, Network Security, and Segment Routing. Tahmeed shares his knowledge as the retained community trainer in Bangladesh for APNIC.
Founder, TheTeamPhoenix
CTO, Pipeline Inc.
Talk Abstract
.
A. S. M. Shamim Reza is a Cyber Security Researcher passionate about Artificial Intelligence. He joined the Pipeline executive leadership team as the CTO in 2021 and is responsible for supervising technology teams throughout Pipeline’s markets, including product engineering, design, and AI research, as well as offering new enthusiasm to propel Pipeline toward its next chapter of growth.
He has more than 15 years of experience across enterprise solution design, infrastructure management & automation, security monitoring & management, security assessment & compliance, threat hunting & anomaly detection, and incident response & forensic analysis. He has served the Leading ISP in Bangladesh for over 12 years. In addition, Mr. Shamim is the founder of TheTeamPhoenix, a nonprofit initiative dedicated to enhancing the community’s well-being in the Cyber Security and technology domain. As part of sharing knowledge, Shamim has been conducting hands-on training on Cyber Security Analysis in Bangladesh, including threat hunting, network penetration testing, forensic analysis, infrastructure security monitoring, and automation. He has contributed as a Co-Instructor of the Network and System Security workshop at several SANOG conferences. In addition, Mr. Shamim has been sharing his knowledge regularly at conferences, like – RootConf, bdNOG, btNOG, SANOG, APRICOT, APNIC, Open Source Summit, etc.
Talk Abstract
Our project focuses on the development of an intentionally vulnerable web application designed for the purpose of enhancing application security research. The primary objective is to provide valuable resources to software engineers, security researchers, and students who are interested in in-depth analysis of security aspects within Flask-based applications.
Product Security Engineer, Evident Bd Ltd.
I am Fatin Sirat. I have completed my bachelor’s from North South University. I have been acknowledged by Sony, Jet.com, Master card, Digital Ocean, and many other vendors for security research. I hold the EJPT & certified appsec practitioner certifications. I am currently working as a product security engineer at Evident Bd Ltd.
Software Developer, One Ummah Bd.
I am Md Saikat. I am currently studying IUBAT. I have been acknowledged by Skillshare, Pickme, Payoneer, Nord Security, and many others for participating in their bug bounty programs. I am currently working as a software developer in One Ummah Bd.
Want to be a collaborator on our project? We’re waiting for you.
© The Team Phoenix 2025
All rights reserved.