CONNECT WITH US:
twitter facebook   linked in   rss

2015 Honeynet Project Workshop

18-20 May 2015 | Stavanger Norway


May 18 - Monday

8:00

SECURITY BRIEFINGS

REGISTRATION
9:00 Welcome remarks - Angelo Dell'Aera, CEO
9:30 The Honeynet Project: Then and Now - Lance Spitzner
10:00

Big Data Visualizaton - Raffael Marty

10:30 Coffee Break
10:45 Keynote: What Has Really Changed in Security - And What Has Stayed the Same?! - Anton Chuvakin
11:30 LUNCH
12:30 Smart Cities Serving Smart Citizens: Without Identity, Privacy, and Security, Disaster Is Around Every Street Corner - Lasse Andresen
12:50 Android malware code reuse: myths and reality - Natalia Stakhanova
13:10 Fighting politically motivated DDoS attacks. When Miners meet HYIPters - Arthur Blair (C-CERT)
13:30 Coffee Break
13:50

Smart Attacks: Defending the Changing Landscape - Felix Leder

14:10 Mobile Inception: a look inside modern espionage malware - Ryan Smith
14:50 Coffee Break
15:10 ICS Honeypot Deployment Strategies and Technologies - Lukas Rist
15:30 Android Botnets: past, present and future - Hugo Gonzalez
15:50 Mahmud Ab Rahman
16:10 Tomorrow Preview
 
18:00 Reception and food at Clarion Hotel Energy. Opening with the Mayor of Stavanger and presentation from Region Stavanger

 

May 19 - Tuesday

8:00

SECURITY DIVAS

REGISTRATION
9:00 Welcome and The story of Security Divas in Norway - Tone Bakås (Norwegian Centre for Information Security) & Renate Thoreid (DND)
9:15 The Dividing Line: What the Tools Can't Tell Us - Kara Nance (The Honeynet Project)
10:00 Youth shaping business in the 21th century. Creating the next generation of technology innovators (Kodu Cup and Hour of Code) - Kristine Beitland (Microsoft Norway)
10:30 Coffee Break
10:50 How Statoil is securing its values - Sonja Indrebø (Statoil)
11:30 LUNCH
12:30 Incident handling of cyber espionage - Marie Moe (SINTEF ICT)
13:05 What You Don't Know Will Hurt You - Hanne Moen (Mnemonic)
13:40 The softer side of security - how do we build a security culture? - Tone Skartveit
14:10 Forensics as a Service: Using computational-forensic methodologies in large-scale investigations of digital evidence and cybercrime - Katrin Franke (Center for Cyber and Information Security (CCIS))
14:30 Coffee Break
15:00 Can you put personal data in the Cloud? - Martha Eike
15:30 "Who hacked my drone?" Cybersecurity and Digital Forensics in Robotics - Francesca Bosco (UNICRI)

 

8:00

CxO STRATEGIC TRACK

REGISTRATION
9:00 Welcome to CxO Strategic Track
9:15 Criminality Reinvented: Assessing the Cybercrime Evolution - Francesca Bosco
10:00 Graphing all the Malware: Using Graph Databases to Mine Twitter For Malware - Ryan Smith
10:30 Coffee Break
10:45

Securing the Human Being - Lance Spitzner

11:30 LUNCH
12:30 Hacking your mind - Kai Roer
13:00 Searching for silver bullets - detecting application layer DoS attacks - Natalia Stakhanova
13:30 Rethinking Enterprise Security: Lifecycle Defense - Felix Leder
14:00 Conducting the perfect crime: the one you cannot detect - Per Thorsheim
14:30 Coffee Break
14:50 Using Visualization to Develop Mitigation Strategies - Kara Nance
15:20 T-Pot: Automated Honeypot deployment in less than 30 minutes - Marco Ochse & André Vorbach
15:50 A Criminological Perspective on Intrusion Kill Chains and Adaptive Adversaries - Aunshul Rege
16:20 Closing Remarks

 

8:00

HANDS-ON TUTORIAL TRAININGS

REGISTRATION
  #1 #2
9:00 - 11:30
Big Data Visualization for Security (part 1)

Raffael Marty
Android Malware Analysis (part 1)


Hugo Gonzalez & Ryan Smith
11:30 LUNCH
12:30 - 16:00
Big Data Visualization for Security (part 2)

Raffael Marty
Android Malware Analysis (part 2)


Hugo Gonzalez & Ryan Smith

 

17:30

Event promoted by The Norwegian Computer Association (DND) at Clarion Hotel Energy. Free entrance for Workshop atendees.

 

May 20 - Wednesday

8:00

HANDS-ON TUTORIAL TRAININGS

REGISTRATION
  #1 #2 #3 #4
9:00 - 11:30
Virtualization Security
(part 1)


Brian Hay
Malicious Documents Analysis
(part 1)


Mahmud Ab Rahman
Network Analysis and Forensics
(part 1)


Guillaume Arcas
Build a Security Culture

Kai Roer
11:30 LUNCH
12:30 - 16:00
Virtualization Security
(part 2)


Brian Hay
Malicious Documents Analysis
(part 2)


Mahmud Ab Rahman
Network Analysis and Forensics
(part 2)


Guillaume Arcas

Moloch: full packet capture and analysis framework

William Salusky

16:00 Closing Remarks
   
18:00

Closing Party at Rica Forum Hotel, 21st floor

 

Stay tuned, join the Workshop Newsletter!



Event Partner

DND Logo