The full agenda for track 1 is below. For information on any other track, please click the links below.
Track 1: ISS for Lawful Interception and Criminal Investigation
Track 2: ISS for Telecom Metadata Retention and NSA Access
Track 3: ISS for Cyber Threat Detection and Information Sharing
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Product Demonstrations
Track 7: ISS for Dark Web, TOR and Bitcoin Investigation
Advanced Hi-Tech, Cyber Crime Investigation Training (29 September - 1 October 2015)
31 classroom training hours, scheduled over 3 days, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors.
Track 1: ISS for Lawful Interception and Criminal Investigation
Wednesday, September 30, 2015
9:00-10:00 Current and Future Standardization Challenges: Encryption, Network Function Virtualization, Cloud Computing and More
Alex Leadbeater, Chairman, SA3 LI and EU Data Retention Compliance Manager, BT11:30-12:00 Session A 100 Gbit Capture is Different
Presented by CSPi's High Performance Products11:30-12:30 Session B Zero in On Your Target: Advanced Social Engineering Techniques
Hacking Team presenter to be announced12:00-12:30 Session A Connect to Anything and see Everything: 100% Visibility of next generation optical networks
Alan McDade, Founder & Chief Commercial Officer, Lumacron Technology1:30-2:30 pm Signals Intelligence and Interception for DWDM Networks
Presented by NetQuest3:00-3:30 pm Session A Scalable LI Solutions for dealing with LTE/VoLTE Roaming and OTT
Michael Hammer, Principal Engineer, Yaana Technologies3:30-4:00 pm Session A Understanding the challenge of full VoLTE visibility on 10/40/100G interfaces in the mobile core network
Presented by Fiberblaze3:00-4:00 pm Session B Google, Apple, Facebook and other Internet Giants Battle Law Enforcement over User Privacy Rights
Joel Margolis, General Counsel and Executive VP, Government Affairs, SubsentioThursday, October 1, 2015
8:30-9:30 Session A FPGA based Deep Packet Processing at 100G
Presented by Accolade Technology9:00-9:30 Session B Utimaco Data Retention Suite
Utimaco DRS describing data retention function, use cases, challenges, implementation option for telecom operators and data analysis function.
Dirk Börgerding, Technical Sales, Utimaco TS GmbH10:30-11:30 Deep Packet Inspection in Clouds and NFV
Curt Schwaderer, VP of Engineering, Yaana Technologies8:30-1:00 How Criminals and Terrorists Electronically Communicate Today and Available ISS Products for Interception and Surveillance
Jerry Lucas, President, TeleStrategies