About Track 4 - Encrypted Traffic Monitoring and IT Intrusion Product Training
The full agenda for track 4 is below. For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Threat Detection from Automated OSINT Collection and Analysis
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Product Training
Track 6: Social Network Monitoring and Big Data Analytics Product Training
Track 7: Mobile Signal Intercept and Electronic Surveillance Product TrainingPre-Conference: Seminars and Tutorials (Monday, 16 March 2015)
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Monday, 16 March 2015
13:30-14:30 | Encryption of mass-communication changed the game’s rules: Remote Stealth Surveillance Presented by AGT |
14:45-15:15 | HackingTeam and Its Competitors: IT Offensive Surveillance in Today's Changing, Challenging and Dangerous World Eric Rabe, Hacking Team |
Tuesday, 17 March 2015
9:00-10:00 Session A | "Covert IT Operations with OSINT and FinFisher™ - Real Scenarios" Presented by FinFisher |
9:00-10:00 Session B | Carrier Grade Platform to Intercept Secured Communications and Remote Intrusion Presented by ClearTrail Technologies |
11:30-12:30 Session A | FinFisher™: Maximum Impact - The Evolution of IT Investigation Presented by FinFisher |
11:30-12:30 Session B | Encryption of mass-communication changed the game’s rules, learn how to stay ahead of Remote Stealth Surveillance Presented by AGT |
14:00-15:00 Session A | Intruding Personal Devices with Remote Control System: Live Demo of Latest Attack and Data Gathering Techniques Presented by Hacking Team |
14:00-15:00 Session B | Optimized Cryptanalysis Infrastructure - "Doing more with less" Presented by SciEngines |
15:30-16:30 Session A |
Cyber Weapons, Warfare, Decryption and Evasion Platforms Dr (hc) Ankur Srivastava, Founder, Aglaya |
15:30-16:30 Session B | Methodologies and Instruments for Remote IT Intrusion Presented by RCS S.p.A. |
Wednesday, 18 March 2015
9:00-10:00 | Cyber Weapons and Remote Delivery Mechanisms. A Live Presentation for Asymmetric Warfare and Decryption of Closed Online Services Dr (hc) Ankur Srivastava, Founder, Aglaya |