About Track 3 - Distilling Cyber Threat Information into Actionable Intelligence Training
The full agenda for track 3 is below. For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Distilling Cyber Threat Information into Actionable Intelligence Training
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Training and Product Demonstrations
Track 7: Mobile Signal Intercept and Electronic Surveillance Training and Product Demonstrations
Pre-Conference Seminars and Tutorials (Tuesday, 2 December 2014)
Track 3: Distilling Cyber Threat Information into Actionable Intelligence Training
This track addresses how to detect cyber threats in real-time and share threat information with private enterprises, government agencies as well as other telecom operators. This track is open to telecom operators, private enterprise person with security and investigation responsibilities, all government attendees and ISS vendors.
Tuesday, 2 December 2014
13:00-14:00 Zero-day attacks - Finding Advanced Threats in ALL of Your Data
How do you find advanced threats inside your network? With increasingly complex infrastructure and applications, and more sophisticated and determined attackers, how can you filter massive amounts of data, alerts and information to identify what's truly important to your network security? Is it even possible when working with a spreadsheet-style view with rows and columns containing massive amounts of data with little context? Is it possible to analyze every packet, conversation, protocol and file for threats and deviations from normal traffic easily and efficiently? How do you look into the past for threats you may have missed?
Scaling to terabytes or years of data, in-depth traffic analysis and powerful visualizations is what's needed. During this presentation, we will show you how real-time, network-wide situational awareness can be delivered through a combination of packet capture, big data analytics, security forensics and visualizations that help enterprises identify malware, targeted attacks and attackers.
C F Chui, Solutions Architect, APAC, Arbor Networks14:15-15:15 Changing Landscape of Cyber Security Threats - Are you ready?
Presented by Palo Alto Networks15:30-16:30 Thinking Like an Attacker (Not an Auditor)
Philippe Alcoy, Technical Director, International, Rapid7