-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathspeakers.html
216 lines (187 loc) · 7.35 KB
/
speakers.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
<!DOCTYPE html>
<html lang="en">
<head>
<link rel="icon" href="./resources/logo_mark.png" type="image/x-icon">
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Thalia Symposium: Cybercrime</title>
<link rel="stylesheet" href="./css/index.css">
<link rel="stylesheet" href="./css/cross.css">
<link rel="stylesheet" href="./css/speakers.css">
</head>
<body>
<div id="top-bar">
<div class="min-tab" id="shell-tab">
<div class="cross-stand-alone"></div>
<p>Shell</p>
</div>
</div>
<div id="grid">
<div id="logo-box">
<img src="./resources/logo.png">
</div>
<div class="shell-box" id="copyright-box">
<p>Symposium Shell [ Version 04.0.02509.1105 ] <br> <br>
Copyright Thalia Symposiumcie 2024 <br>
All rights reserved</p>
</div>
<div class="shell-box" id="command-line-box">
<p id="command-previous">root@thalia-user: ~/sbin$ cat schedule.html</p>
<p id="command-input">root@thalia-user: ~/sbin$ <span id="highlighter">_</span></p>
</div>
<div class="shell-box" id="menu-box">
<div id="button-box">
<a href="./index.html" onclick="return false;">
<button class="shell-button">
[ Main ]
</button>
</a>
<a href="./speakers.html" onclick="return false;">
<button class="shell-button">
[ Speakers ]
</button>
</a>
<a href="./sponsors.html" onclick="return false;">
<button class="shell-button">
[ Sponsors ]
</button>
</a>
<a href="./schedule.html" onclick="return false;">
<button class="shell-button">
[ Schedule ]
</button>
</a>
</div>
</div>
<div class="shell-box" id="info-box">
<p>root@thalia-user: ~/Local$: cat Contact.txt</p>
<br>
<p id="start-info"> [ OK ] email: [email protected] </p>
<p>[ OK ] phone: +31 (0)24 3653498</p>
<p>[ OK ] address: Toernooiveld 212, 6525 EC, Nijmegen</p>
</div>
<div id="on-load-top-box">
<p class="loading-output">root@thalia-user:~/Local$ <span id="load-bar">Awaiting endpoint.</span></p><br>
<p class="loading-output">root@thalia-user:~/Local$ <span id="page-identifier"></span> loaded succesfully!</p><br>
<p class="loading-output">root@thalia-user:~/Local$ Awaiting choice.</p><br>
<p class="loading-output"></p>
</div>
<div id="on-load-center-box">
<div id="speakers-container">
<div class="box-container-main">
<div class="box-container">
<div class="container2">
<div class="text-container2">
<p>Stjepan Picek</p>
</div>
<span class="cross"></span>
</div>
<div class="container">
<div class="image-container">
<img class="profile" src="./resources/speakers/stjepan.webp">
</div>
<div class="text-container">
<p>Stjepan Picek is an associate professor in the Digital Security (DiS) group. He studies the
intersection of cybersecurity and artificial intelligence. Combining those fields, he specializes in
implementation attacks (side-channel analysis, fault injection) and security of machine learning.
</p>
</div>
</div>
</div>
<div class="box-container">
<div class="container2">
<div class="text-container2">
<p>Andreas Hulsing</p>
</div>
<span class="cross"></span>
</div>
<div class="container">
<div class="image-container">
<img class="profile" src="./resources/speakers/andreas.jpg">
</div>
<div class="text-container">
<p>I am an associate professor leading the Applied and Provable Security (APS) group at Eindhoven
University of Technology (TU/e). My research
focuses on post-quantum cryptography – cryptography that resists quantum computer-aided attacks. </p>
</div>
</div>
</div>
<div class="box-container">
<div class="container2">
<div class="text-container2">
<p>Nedap - Riccardo ten Cate</p>
</div>
<span class="cross"></span>
</div>
<div class="container">
<div class="image-container">
<img class="profile" src="./resources/empty_photo.jpg">
</div>
<div class="text-container">
<p></p>
</div>
</div>
</div>
<div class="box-container">
<div class="container2">
<div class="text-container2">
<p>Politie - Tom Meurs</p>
</div>
<span class="cross"></span>
</div>
<div class="container">
<div class="image-container">
<img class="profile" src="./resources/speakers/tom.jpg">
</div>
<div class="text-container">
<p>Tom Meurs is a PhD candidate and analyst at TCC-ON and focuses on ransomware. How common is
ransomware in the Netherlands? How much damage do Dutch companies suffer from ransomware? Why do
victims pay the ransom? These are some of the research questions that concern Tom.</p>
</div>
</div>
</div>
<div class="box-container">
<div class="container2">
<div class="text-container2">
<p>ING - Victoria Agaronuan</p>
</div>
<span class="cross"></span>
</div>
<div class="container">
<div class="image-container">
<img class="profile" src="./resources/speakers/picture-Victoria.jpg">
</div>
<div class="text-container">
<p>Investigating and mitigating cyber security threats and incidents. In her daily tasks Victoria
integrates technical security triage skills with communication skills and process analysis to minimize
the impact of security incidents and prevent them from recurring.
</p>
</div>
</div>
</div>
<div class="box-container">
<div class="container2">
<div class="text-container2">
<p>ING - Stijn Meijer</p>
</div>
<span class="cross"></span>
</div>
<div class="container">
<div class="image-container">
<img class="profile" src="./resources/speakers/picture-Stijn.png">
</div>
<div class="text-container">
<p>Working every day to identify punctures in security defences, Stijn can use social engineering,
technical exploits, as well as business process mistakes to prove that something is insecure. And then
help fixing it.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<script src="./js/index.js"></script>
</body>
</html>