

Rosa Xochitl SARABIA BAUTISTA (Mnemo-CERT) SC LEUNG (HKCERT)Ĭrisis Communication for Incident ResponseĬyber Security Challenges in the Financial Sector: Internal and External Threats Carsten EIRAM (Risk Based Security)ĭSMS: Automating Decision Support and Monitoring Workflow for Incident Response Wayne BOLINE (DIB ISAC (DSIE)), Denise ANDERSON (FS-ISAC)īring Your Own Internet Of Things (BYO-IoT) Technology, Trust, and Connecting the Dots Security Operations: Moving to a Narrative-Driven ModelĬase Study: Creating Situational Awareness in a Modern World. Aldo ALBUQUERQUE (Tempest Security Intelligence) Ricardo ULISSES (Tempest Security Intelligence), Mr. The Cybercrime Evolution in Brazil: An Inside View of Recent Threats and the Strategic Role of Threat Intelligence When Business Process and Incident Response Collide: The Fine-Tuning of the IR ProgramĬe1sus: A Contribution to an Improved Cyber Threat Intelligence Handling Masato TERADA (Hitachi Incident Response Team), Yoichi SHINODA (JAIST), Mitsuhiro HATADA (NTT Communications Corporation) Seven Years in MWS: Experiences of the Community Based Data Sharing for Anti-Malware Research in Japanĭr.
ELITE PROXY SWITCHER 1.29 CRACK PROFESSIONAL
Michael HARRINGTON (Fidelis Cybersecurity Solutions)Ī Day in the Life of a Cyber Intelligence Professional Prepare Your Cybersecurity Team for Swift Containment Post Incident ZACCARO, Amber HARGROVE, Daniel SHORE, Kristin M. Shari LAWRENCE PFLEEGER (I3P-Dartmouth-GMU-NL-SE (various CSIRTS)), Julie A. Quality Over Quantity-Cutting Through Cyberthreat Intelligence Noise SecAdmin - Mitigating APTs – Tools for the Administrator Keynote Presentation: Securing our Future - Potsdam Iįact Tables - A Case Study in Reducing Reactive Intrusion Time-to-Know by 95% REPCHICK (George Mason University), Julie STEINKE (George Mason University)įIRST Update: Financial & Business ReviewįIRST Update: Financial & Business Review (cont.) Laura FLETCHER (George Mason University), Kristin M. Malware in Your Pipes: The State of SCADA MalwareĬollecting, Analyzing and Responding to Enterprise Scale DNS Eventsīarriers and Pathways to Improving the Effectiveness of Cybersecurity Information Sharing Among the Public and Private Sectors Luc DANDURAND (ITU), Sarah BROWN (Fox-IT) Pawel PAWLINSKI (CERT Polska / NASK), Mr. Timothy GRANCE (NIST), THOMAS MILLAR (US-CERT), Mr. Threat Information Sharing Perspectives, Strategies, and Threat Scenarios Mariko MIYA (CDI-CIRT (Cyber Defense Institute, Inc.) - Japan)Įveryday Etiquette: Responding to Uncoordinated Disclosuresī Workshop and Hands-on Training (cont.)Īfternoon Networking Break - Conservatory / Potsdam Foyer Working Towards the Tokyo 2020 Olympics - Situation in 2015 So You Want a Threat Intelligence Function (But Were Afraid to Ask) Stefan RITTER (National IT-Situation Centre and CERT-Bund, German Federal Office for Information Security BSI)ī Workshop and Hands-on Training Marie MOE (SINTEF ICT)ģJ4E - JIGSAW, JUMPSTART, JUNCTURE: Three Ways to Enhance Cyber-Exercise-Experience

Eireann LEVERETT (Cambridge Centre for Risk Studies), Dr. Wes YOUNG (CSIRT Gadgets)īuilding instantly exploitable protection for yourself and your partners against targeted cyber threats using MISP

Morning Networking Break - Conservatory / Potsdam Foyerīehind the Scenes this Week at FIRST - Potsdam IĪ Proposal for Cybersecurity Metrics Through Cyber Green Keynote Presentation: IT Security: Future Challenges for Government, Industry and Society - Potsdam IĬornelia ROGALL-GROTHE (German State Secretary & Federal Government Commissioner for Information Technology)
