2015 Honeynet Project Workshop
18-20 May 2015 | Stavanger Norway
May 18 - Monday
May 19 - Tuesday
8:00 | CxO STRATEGIC TRACKREGISTRATION |
|
9:00 | Welcome to CxO Strategic Track | |
9:15 | Criminality Reinvented: Assessing the Cybercrime Evolution - Francesca Bosco | |
10:00 | Graphing all the Malware: Using Graph Databases to Mine Twitter For Malware - Ryan Smith | |
10:30 | Coffee Break | |
10:45 | Securing the Human Being - Lance Spitzner |
|
11:30 | LUNCH | |
12:30 | Hacking your mind - Kai Roer | |
13:00 | Searching for silver bullets - detecting application layer DoS attacks - Natalia Stakhanova | |
13:30 | Rethinking Enterprise Security: Lifecycle Defense - Felix Leder | |
14:00 | Conducting the perfect crime: the one you cannot detect - Per Thorsheim | |
14:30 | Coffee Break | 14:50 | Using Visualization to Develop Mitigation Strategies - Kara Nance |
15:20 | T-Pot: Automated Honeypot deployment in less than 30 minutes - Marco Ochse & André Vorbach | 15:50 | A Criminological Perspective on Intrusion Kill Chains and Adaptive Adversaries - Aunshul Rege |
16:20 | Closing Remarks |
8:00 | HANDS-ON TUTORIAL TRAININGSREGISTRATION |
|
#1 | #2 | |
---|---|---|
9:00 - 11:30 | ||
Big Data Visualization for Security (part 1) Raffael Marty |
Android Malware Analysis (part 1) Hugo Gonzalez & Ryan Smith |
|
11:30 | LUNCH | |
12:30 - 16:00 | ||
Big Data Visualization for Security (part 2) Raffael Marty |
Android Malware Analysis (part 2) Hugo Gonzalez & Ryan Smith |
17:30 | Event promoted by The Norwegian Computer Association (DND) at Clarion Hotel Energy. Free entrance for Workshop atendees. |
May 20 - Wednesday
8:00 | HANDS-ON TUTORIAL TRAININGSREGISTRATION |
|||
#1 | #2 | #3 | #4 | |
---|---|---|---|---|
9:00 - 11:30 | ||||
Virtualization Security (part 1) Brian Hay |
Malicious Documents Analysis (part 1) Mahmud Ab Rahman |
Network Analysis and Forensics (part 1) Guillaume Arcas |
Build a Security Culture Kai Roer |
|
11:30 | LUNCH | |||
12:30 - 16:00 | ||||
Virtualization Security (part 2) Brian Hay |
Malicious Documents Analysis (part 2) Mahmud Ab Rahman |
Network Analysis and Forensics (part 2) Guillaume Arcas |
Moloch: full packet capture and analysis framework William Salusky |
|
16:00 | Closing Remarks | |||
18:00 | Closing Party at Rica Forum Hotel, 21st floor |