Building instantly exploitable protection for yourself and your partners against targeted cyber threats using MISP - Mr. Andras IKLODY (CIRCL) - June 15th, 2015 11:00 – 12:00
Should be a good introduction overview to MISP, which is an open-source threat intelligent platform of sorts. I have not been keeping up with it's development, so it should be worthwhile to see how it is going.
Ce1sus: A Contribution to an Improved Cyber Threat Intelligence Handling - Mr. Jean-Paul WEBER (GovCERT.lu) - June 16th, 2015 12:45 – 13:15
DSMS: Automating Decision Support and Monitoring Workflow for Incident Response - Mr. Chris HORSLEY (CSIRT Foundry), Mr. SC LEUNG (HKCERT) - June 16th, 2015 15:45 – 16:45
Fact Tables - A Case Study in Reducing Reactive Intrusion Time-to-Know by 95% - Mr. Jeff BOERIO (Intel Corp.) - June 16th, 2015 10:15 – 11:15
Sinfonier: Storm Builder for Security Intelligence - Mr. Fran GOMEZ (Telefonica), Mr. Leonardo AMOR (Telefonica) - June 17th, 2015 13:30 – 14:30
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling Indicators - Mr. Alexandre PINTO (Niddel), Mr. Alexandre SIEIRA (Niddel) - June 17th, 2015 13:30 – 14:30
Evaluating the Effectiveness of Fuzzy Hashing Techniques in Identifying Provenance of APT Binaries - Ms. Bhavna SOMAN (Intel Corporation) - June 18th, 2015 10:30 – 11:00
Bhavna is a MLSec Project member and has been doing some great work on malware analysis and classification. I am very excited to watch her presentation, and I am sure there will be a lot of great analysis and technical information there.
Validating and Improving Threat Intelligence Indicators - Mr. Douglas WILSON (FireEye) - June 17th, 2015 16:00 – 17:00
Doug is an industry veteran, and has been on the Threat Intelligence game for a long time. He told me that he put this presentation together as a "response" to my first TIQ-test presentation, so I am very interested to see where this conversation leads. As someone who is generating threat intelligence, he has a very different perspective of possible measurements than a customer that is just consuming them. Because of that, this presentation will probably have insights that I did not think of.
Collecting, Analyzing and Responding to Enterprise Scale DNS Events - Mr. Bill HORNE (Hewlett-Packard) - June 15th, 2015 15:00 – 16:00
I am a sucker for large-scale detection solutions so I will gladly attend this one. Hopefully it is does not focus too much on the data collection part (which is a very solved problem), and spends more time on the actual analytics. Also hope it is not just a thin layer on top of a sales pitch.
Incident Response Programming with R - Mr. Eric ZIELINSKI (Nationwide) - June 15th, 2015 16:00 – 17:00
Implementation of Machine Learning Methods for Improving Detection Accuracy on Intrusion Detection System (IDS) - Mr. Bisyron MASDUKI (Id-SIRTII), Mr. Muhammad SALAHUDDIEN (Id-SIRTII) - June 19th, 2015 10:15 – 11:15
Machine Learning for Cyber Security Intelligence - Mr. Edwin TUMP (NCSC-NL) - June 17th, 2015 16:00 – 17:00
Crisis Communication for Incident Response - Mr. Scott ROBERTS (GitHub) - June 16th, 2015 15:45 – 16:45
Scott has put together a great talk about what works and what does not work in relation to communicating breaches to the general public. Examples like the way Target handled their breach communications will be discussed about what they did wrong and what they did right. And surprisingly enough, he will have some interesting examples to share of people who did it right, believe it or not.
We just sent you an email. Please click the link in the email to confirm your subscription!
OKSubscriptions powered by Strikingly