top of page


Muhammad Shahmeer



Shahmeer Amir stands as a globally recognized Ethical Hacker, ranking as the third most accomplished bug hunter globally. His expertise has been instrumental in assisting over 400 Fortune companies, such as Facebook, Microsoft, Yahoo, and Twitter, in resolving critical security issues within their systems. Shahmeer's entrepreneurial ventures in the Cyber Security realm have led to the establishment of multiple startups, with his current role involving the leadership of three startups across four countries.  In his capacity as the CEO of Younite, Shahmeer's flagship company is actively engaged in developing next-generation audio-video communication technologies. Additionally, he serves as the CEO of Veiliux, positioned as Asia's inaugural mainstream Cyber Security startup with a presence in the Asia Pacific, UAE, and the UK. Authiun, another startup under Shahmeer's leadership, offers a comprehensive passwordless authentication solution tailored for the 21st century.  Furthermore, Shahmeer serves as the Cyber Security Advisor to the Ministry of Finance in the Government of Pakistan. His involvement spans various projects, including Deep Sea Tracking, Digital Transformation of Legislation, and the Digitization of Pakistani Cultural Content. As a testament to his influence in the tech industry, he holds a position on the Forbes Technology Council.

Hacking SCADAs for fun and Profit: Hacking ICS, Oil Rigs and Vessels

In the realm of cyber espionage, our focus today centers on the intricate art of hacking Supervisory Control and Data Acquisition (SCADA) systems, particularly within critical infrastructures like oil rigs and vessels. This presentation delves deep into the methodologies employed by cyber adversaries to compromise SCADA and Industrial Control Systems (ICS), unveiling the vulnerabilities that can expose sensitive information. Embark on an interactive journey as we showcase live demonstrations, illustrating how these systems can be manipulated to wreak havoc—causing physical damage, operational disruptions, and unauthorized data access. Within the context of "The Art of Cyber Espionage: Hacking SCADAs, Oil Rigs, and Vessels," participants will not only witness these techniques in action but also glean insights on identifying vulnerabilities and fortifying SCADA and ICS systems to thwart potential attacks. This session aims to equip attendees with the knowledge needed to comprehend the evolving threat landscape against critical infrastructure. By exploring various attack scenarios and their real-world impacts, participants will gain a holistic understanding of the adversarial techniques used to exploit vulnerabilities. The overarching goal is to empower organizations to proactively secure their SCADA and ICS environments, mitigating the risks posed by cyber espionage.

bottom of page