Extended Program and Session Layout
Presentations Tuesday - Thursday
Session A: Threat Hunting and Information Sharing
- Multinational Threat Hunting operations to combat growing Threats / Karlis Svilans and Rudolfs Kelle
- Overcoming the Confidentiality Conflict -- Bridging the gap between publicly sharing information in IR engagements and potential Repercussions / Jose Jair Cardoso de Santanna, Patrick van Looy, Jet Boverhuis and Romy Wajon
Session B: Policy (re-) considered
- Management from Below: The Geneva Dialogue / Serge Droz
- How to measure Efficiency in Security Operations / Jan Kopriva
Session C: Cyber Threat Intelligence
- Backing your Threat Hunting activities with contextualised Threat Intelligence / Emilien Le Jamtel and Paul Amicelli
- Time Series Analysis for Securitiy Professionals and Threat Hunters / Jan Kohlrausch
- IntelOwl - Making the Life of Security Analysts easier / Matteo Lodi and Simone Berni
Session D: How to defend ...
- Fortifying your Defenses: Proactive Threat Mitigation and Environment Hardening through a TTP-focused Approach / Mirza Asrar Baig, Arsalan Iqbal and Sajal Khalid
- Use Machine Learning to automatically map CVEs and the MITRE ATT&CK Enterprise matrix / Sylvain Cortes
- New Operational Support on Regional Level in EU by ENISA / Andrea Dufkova and Matej Salmik
Session E: How to deal with ...
- Beyond the Hype: Research on how Cybercriminals are Really Using GenAI / David Sancho and Vincenzo Ciancaglini
- Project Achilles - a novel Vulnerability Management System / Michal Greguš, Alexander Valach and Marián Danko
- Understanding the Anatomy of Cybersecurity Advisory Feed Data / Andrej Zieger and Henning Krause
Session F: Deep Dive and Forensics
- From Infection to Encryption: A Deep Dive into Threat Actors Malicious Code / Nicklas Keijser and Alexander Andersson
- Navigating Digital Forensic Readiness - Best Practices and Real-World Strategies / Darja-Anna Yurovsky
Session G: Response requires ...
- Prototyping a Network Intrusion Detection System: A Deep Dive into CERT.LV’s IACS Lab for Safeguarding Critical Infrastructures / Rudolfs Kelle
- Open-Sourcing Network Visibility and DDoS Attacks Mitigation with NeMo for GÉANT and NRENs / Eugene A Brin and Jochen Schönfelder
- Simulation of a large-scale Security Incident - Keeping juggling red/blue/white balls / Daniel Kouril, Sven Gabriel, David Crooks, Barbara Krasovec and Baptiste Grenier
Session H: Current and future Future
- Prepare for Impact: Incident Response Building Blocks / Lisa Lobmeyer and Christoph Lobmeyer
- Tales of the Future Past / Lara Schreuer and Saâd Kadhi
Trainings
Due to the number of different trainings - 8 trainings with 12 deliverables - we will be using two locations on Monday, details are in the agenda: the Auditorio (ids: MA*) itself and the Hotel Silken Atlántida (ids: MB*) , which is within walking distance of the Auditorio (700 m). On Friday we will only use the Auditorio (ids: FA* + FB*).
Monday, 26 Februar 2024
Full-Day tutorial:
- MA1: Improving your Role as CSIRT/SOC Manager by Vilius Benetis
Morning Half-Day tutorials:
- MA2: Learning about Crisis Management in a Tabletop Exercise by Maria Edblom Tauson and Anne-Marie Achrenius
- MB1: Security Awareness with Dungeons & Dragons: A Piece of Cake by Fabio Greiner and Oli Schacher
- MB2: SIM3 101 - Measuring and Improving Your Team's Maturity by Olivier Caleff
Afternoon Half-Day tutorials:
- MB4: Practical and hands-on Experience for Blue Teams by Klaus Möller, Stefan Kelm and Tobias Dussa
- MB3: Security Awareness with Dungeons & Dragons: A Piece of Cake by Fabio Greiner and Oli Schacher (this is the second delivery of this training at this conference)
- MA3: SIM3 for Advanced or Experienced Teams by Olivier Caleff
Friday, 1 March 2024
Full-Day tutorial:
- FA1: Communication Skills for Incident Response by Jeff James Bryan Carpenter and Don Stikvoort
Morning Half-Day tutorials:
- FB1: Cyber Fortress Enterprise - A Simulation-Strategic Game Based on Scenarios of the Latest Advanced Cyber Attacks by Marcin Fronczak and Piotr Kępski
- FB2: SIM3 101 - Measuring and Improving Your Team's Maturity by Olivier Caleff (this is the second delivery of this training at this conference)
Afternoon Half-Day tutorials:
- FB3: Cyber Fortress Enterprise - A Simulation-Strategic Game Based on Scenarios of the Latest Advanced Cyber Attacks by Marcin Fronczak and Piotr Kępski (this is the second delivery of this training at this conference)
- FB4: Practical and hands-on Experience for Blue Teams by Klaus Möller, Stefan Kelm and Tobias Dussa (this is the second delivery of this training at this conference)