CATEGORY |
TIME (UTC) |
TITLE |
SPEAKER(S) |
---|---|---|---|
Live Day 1 WEDNESDAY 30 SEPTEMBER |
16:00 UTC 16:30 UTC |
Hossein Jazi (Malwarebytes) & Jérôme Segura (Malwarebytes) |
|
Live Day 1 WEDNESDAY 30 SEPTEMBER |
16:30 UTC 17:00 UTC |
Aseel Kayal (Check Point Software Technologies) |
|
Live Day 1 WEDNESDAY 30 SEPTEMBER |
17:00 UTC 17:30 UTC |
Łukasz Siewierski (Google) |
|
Live Day 1 WEDNESDAY 30 SEPTEMBER |
17:45 UTC 18:15 UTC |
Gabor Szappanos (Sophos) & Vikas Singh (Sophos) |
|
Live Day 1 WEDNESDAY 30 SEPTEMBER |
18:15 UTC 18:45 UTC |
To catch a Banshee: how Kimsuky’s tradecraft betrays its complementary campaigns and mission |
Sveva Vittoria Scenarelli (PwC) |
Live Day 1 WEDNESDAY 30 SEPTEMBER |
19:00 UTC 19:30 UTC |
Paul Rascagneres (Cisco Talos) & Vitor Ventura (Cisco Talos) |
|
Live Day 1 WEDNESDAY 30 SEPTEMBER |
19:30 UTC 20:00 UTC |
David Ruiz (Malwarebytes) |
|
Live Day 2 THURSDAY 01 OCTOBER |
16:00 UTC 16:30 UTC |
Eugene Rodionov (Google), Richard Neal (Google) & Lin Chen (Google) |
|
Live Day 2 THURSDAY 01 OCTOBER |
16:30 UTC 17:00 UTC |
Who stole my 100,000 dollars’ worth of Bitcoin wallets – catch them all with new deceptive bait |
Tan Kean Siong (The Honeynet Project) |
Live Day 2 THURSDAY 01 OCTOBER |
17:00 UTC 17:30 UTC |
SilentFade: unveiling Chinese malware abusing Facebook ad platform |
Sanchit Karve (Facebook) & Jennifer Urgilez (Facebook) |
Live Day 2 THURSDAY 01 OCTOBER |
17:45 UTC 18:15 UTC |
LATAM financial cybercrime: competitors in crime sharing TTPs |
Jakub Souček (ESET) & Martin Jirkal (ESET) |
Live Day 2 THURSDAY 01 OCTOBER |
18:15 UTC 18:45 UTC |
Daniel Kapellmann Zafra (FireEye) |
|
Live Day 2 THURSDAY 01 OCTOBER |
19:00 UTC 19:30 UTC |
Veronica Valeros (Czech Technical University in Prague) & Sebastian García (Czech Technical University in Prague) |
|
Live Day 2 THURSDAY 01 OCTOBER |
19:30 UTC 20:00 UTC |
Patrick Wardle (Jamf) |
|
Live Day 3 FRIDAY 02 OCTOBER |
16:00 UTC 16:30 UTC |
Graphology of an exploit – hunting for exploits by looking for the author’s fingerprints |
Itay Cohen (Check Point Research) & Eyal Itkin (Check Point Research) |
Live Day 3 FRIDAY 02 OCTOBER |
16:30 UTC 17:00 UTC |
Zoltan Balazs (CUJO AI) & Hyrum Anderson (Microsoft) |
|
Live Day 3 FRIDAY 02 OCTOBER |
17:00 UTC 17:30 UTC |
Hunting for malware with command line logging and process trees |
Ivan Vanja Svajcer (Cisco Talos) |
Live Day 3 FRIDAY 02 OCTOBER |
17:45 UTC 18:15 UTC |
Tonto Team: exploring the TTPs of an advanced threat actor operating a large infrastructure |
Daniel Lunghi (Trend Micro) & Jaromir Horejsi (Trend Micro) |
Live Day 3 FRIDAY 02 OCTOBER |
18:15 UTC 18:45 UTC |
Matthieu Faou (ESET) & Francis Labelle (ESET) |
|
Live Day 3 FRIDAY 02 OCTOBER |
19:00 UTC 19:30 UTC |
InvisiMole: first-class persistence through second-class exploits |
Zuzana Hromcová (ESET) |
Live Day 3 FRIDAY 02 OCTOBER |
19:30 UTC 20:00 UTC |
Christiaan Beek (McAfee) |
|
On Demand |
|
2030: backcasting the potential rise and fall of cyber threat intelligence |
Jamie Collier (FireEye) |
On Demand |
|
Michał Leszczyński (CERT Polska) & Krzysztof Stopczański (CERT Polska (Former)) |
|
On Demand |
|
Advanced Pasta Threat: mapping threat actor usage of open-source offensive security tools |
Paul Litvak (Intezer) |
On Demand |
|
Daniel Frank (Cybereason) & Lior Rochberger (Cybereason) |
|
On Demand |
|
Paul Jung (Excellium Services) |
|
On Demand |
|
APT Hackers-for-Hire: Time to update your Threat Models (Partner Content) |
Liviu Arsene (Bitdefender) & Andra Cazacu (Bitdefender) |
On Demand |
|
Behind the Black Mirror: simulating attacks with mock C2 servers |
Scott Knight (VMware) |
On Demand |
|
Chasing the digital pirates: unveiling the container threats |
Tejas Girme (Qualys) |
On Demand |
|
Byeongjae Kim (Korea Internet & Security Agency), Taewoo Lee (Korea Internet & Security Agency), Sojun Ryu (Korea Internet & Security Agency) & Dongwook Kim (Korea Internet & Security Agency) |
|
On Demand |
|
Dr Aditya K. Sood (F5 Networks) & Rohit Bansal (SecNiche Security Labs) |
|
On Demand |
|
Rohit Satpathy (The PC Security Channel) |
|
On Demand |
|
Dancing samba with Dolphins: tracking a Brazilian threat actor moving to Europe |
Carlos Rubio (Blueliv) |
On Demand |
|
Dissecting fleeceware apps: the million-dollar money-making machine in Android and iOS |
Jagadeesh Chandraiah (Sophos) |
On Demand |
|
Dr. Nirmal Singh (Zscaler), Deepen Desai (Zscaler) & Avinash Kumar (Zscaler) |
|
On Demand |
|
James Shank (Team Cymru) & Jacomo Piccolini (Team Cymru) |
|
On Demand |
|
James Haughom (VMware), Stefano Ortolani (VMware) & Baibhav Singh (VMware) |
|
On Demand |
|
Ghost Mach-O: an analysis of Lazarus’ Mac-malware innovations |
Dinesh Devadoss (K7 Computing) |
On Demand |
|
GuLoader? No, CloudEyE. Flattening the attack curve of the top malicious dropper |
Alexey Bukhteyev (Check Point Software Technologies) & Arie Olshtein (Check Point Software Technologies) |
On Demand |
|
Doina Cosovan (Security Scorecard) & Cătălin Liță (Security Scorecard) |
|
On Demand |
|
Abhishek Singh (Prismo Systems), Manish Sardiwal (Prismo Systems) & Ramesh Mani (Prismo Systems) |
|
On Demand |
|
Lightweight emulation based IoC extraction for Gafgyt botnets |
Ya Liu (Qihoo 360) |
On Demand |
|
Matthias Meidinger (VMRay) |
|
On Demand |
|
Kalpesh Mantri (Quick Heal) |
|
On Demand |
|
Thibault Seret (McAfee) & Jeffrey Sman (McAfee) |
|
On Demand |
|
One year later: challenges for young anti-malware products today |
Sorin Mustaca (Endpoint Cybersecurity) |
On Demand |
|
Fumio Ozawa (NTT Security), Shogo Hayashi (NTT Security) & Rintaro Koike (NTT Security) |
|
On Demand |
|
Payment required: rare HTTP statuses and air-gaps avoidance from the authors of COMPFun |
Denis Legezo (Kaspersky) |
On Demand |
|
Ramsay: a cyber-espionage toolkit tailored for air-gapped networks |
Ignacio Sanmillan (ESET) |
On Demand |
|
Costin Ionescu (Broadcom) |
|
On Demand |
|
Desiree Beck (MITRE) |
|
On Demand |
|
Stealthy WastedLocker: eluding behaviour blockers, but not only |
Alexander Adamov (NioGuard Security Lab) |
On Demand |
|
Minhee Lee (Financial Security Institute) & Daegyu Kang (Financial Security Institute) |
|
On Demand |
|
Take care, spyware is slipping into your phones through Operation Poisoned News |
Nelson William Gamazo Sanchez (Trend Micro), Lilang Wu (Trend Micro), Elliot Cao (Trend Micro) & Ecular Xu (Trend Micro) |
On Demand |
|
Gabriela Nicolao (Deloitte) |
|
On Demand |
|
Abhijit Kulkarni (Incrux Technologies) & Prakash Jagdale (Incrux Technologies) |
|
On Demand |
|
Shai Alfasi (Reason Security) & Dana Yosifovich (Reason Security) |
|
On Demand |
|
Hiroshi Takeuchi (Macnica Networks) |
|
On Demand |
|
Monica Lopez (LPNP) |
|
On Demand |
|
Hajime Takai (NTT Security), Shogo Hayashi (NTT Security) & Rintaro Koike (NTT Security) |
|
TIPS |
|
TIPS #1 Opening Keynote: Collaborating with Competitors: A Better Strategy to Beat Adversaries |
Joe Levy (Sophos) |
TIPS |
|
Pete Renals (Palo Alto Networks) |
|
TIPS |
|
TIPS #3 Creating Network Effects: Intelligence Sharing for Supply Chain Security |
Andrea Little Limbago (Interos) |
TIPS |
|
Kathi Whitbey (Palo Alto Networks), Jeannette Jarvis (CTA) & Selena Larson (Dragos) |
|
TIPS |
|
TIPS #5 German Angst : Cybercrime Ecosystem in the DACH Region |
Abdelkader Cornelius (Recorded Future) |
TIPS |
|
Kathi Whitbey (Palo Alto Networks), Derek Manky (Fortinet), Righard Zwienenberg (ESET) & Noortje Henrichs (NCSC) |
|
TIPS |
|
Fernando Cajeme Acosta Zertuche (TELMEX Scitum) & Imelda Flores (TELMEX Scitum) |
|
TIPS |
|
Noortje Henrichs (NCSC) |