About Track 3 - Threat Detection from Automated OSINT Collection and Analysis
The full agenda for track 3 is below. For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigations
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Threat Detection from Automated OSINT Collection and Analysis
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Training and Product Demonstrations
Track 7: Mobile Location, Surveillance and Signal Intercept Training and Product DemonstrationsTraining Seminars by LEA's and Ph.D Computer Scientists (Tuesday, 2 June 2015)
Track 3: Threat Detection from Automated OSINT Collection and Analysis
This track focuses on OSINT automation platforms, which can provide early warning of and protection against Internet-based security attacks.
Tuesday, 2 June 2015
14:45-15:45 The Basics. What is available and how to access the Dark Web safely.
Stephen E Arnold, Managing Partner, ArnoldIT16:00-17:00 Services and bitcoin. The consumer services on the Dark Web and the basics of digital money for buying products and services
Stephen E Arnold, Managing Partner, ArnoldITWednesday, 3 June 2015
11:30-12:00 Communications Insight: Identify Leaks, Threats, and Cyber Attacks More Quickly, Easily, and Cost-Effectively
In a world plagued by constant and often malicious cyber attacks, enterprises and agencies rely more and more on comprehensive network visibility and awareness. The ability to collect, identify, and analyze communications with powerful network forensics and analytics enables security teams to derive actionable intelligence in a much more efficient and economical way. Learn more in this session about how communications insight can empower your team and modernize your entire information security strategy.
Presented by SS812:00-12:30 Finding, Investigating, and Stopping Stealthy Persistent Threats
The inevitable has happened: you've been breached. Now what do you do? In this session, we'll share how to identify and analyze stealthy and persistent threats with the power of deep application awareness, visualizations, and comprehensive communications insight. Find threats, determine what was compromised, and investigate how long attackers have been in your system so that you're better prepared to stop similar threats next time.
Presented by SS8