About Track 4 - Encrypted Traffic Monitoring and IT Intrusion Product Training
The full agenda for track 4 is below. For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Distilling Cyber Threat Information into Actionable Intelligence Training
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Training and Product Demonstrations
Track 7: Mobile Signal Intercept and Electronic Surveillance Training and Product Demonstrations
Pre-Conference Seminars and Tutorials (Tuesday, 2 December 2014)
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Tuesday, 2 December 2014
13:00-14:00 Encryption of mass-communication changed the game's rules: Remote Stealth Surveillance
Presented by AGTWednesday, 3 December 2014
9:00-10:00 Session A ONE. Targeted Deployment of Surveillance Capabilities
Presented by FinFisher9:00-10:00 Session B Tactical IP Intercept for HTTPS Monitoring & Remote Intrusion
Jitendra Verma, Director, Business Development, ClearTrail Technologies11:30-12:00 Session A Encryption of mass-communication changed the game's rules, learn how to stay ahead of Remote Stealth Surveillance
Presented by AGT11:30-12:30 Session B Unconventional IP Monitoring
Presented by IPS13:30-14:30 Session A Intruding Personal Devices with Remote Control System: Live Demo of Latest Attack and Data Gathering Techniques
Marco Valleri, CTO, Alberto Ornaghi, Software Architect, Fabrizio Cornelli, QA Manager, Hacking Team13:30-14:30 Session B Encryption, Non-Decryption & Way Forward
Naveen Jaiswal, Head - R&D, Vehere15:00-16:00 Session A FinFisherâ„¢: Maximum Impact - The Evolution of IT Investigation
Presented by FinFisher15:00-16:00 Session B DARK EAGLE: Fully configurable remote IT Intrusion Solution; Case studies, Demos and Tips in latest intrusion techniques
Presented by GR SistemiThursday, 4 December 2014
8:30-9:30 Session B Methodologies and Instruments for Remote IT Intrusion
Presented by RCS