The full agenda for track 3 is below. For information on any other track, please click the links below.
Track 1: ISS for Lawful Interception and Criminal Investigation
Track 2: ISS for Telecom Metadata Retention and NSA Access
Track 3: ISS for Cyber Threat Detection and Information Sharing
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Product Demonstrations
Track 7: ISS for Dark Web, TOR and Bitcoin Investigation
Advanced Hi-Tech, Cyber Crime Investigation Training (29 September - 1 October 2015)
31 classroom training hours, scheduled over 3 days, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors.
Wednesday, September 30, 2015
9:00-10:00 Session A Why STIX and TAXII and Why Organizations and Vendors Should Adopt Them
Bret Jordan, Director of Security Architecture and Standards, Office of the CTO, Blue Coat Systems9:00-10:00 Session B Cyber Security: The Role of Government
Gordon Friend, Chief Engineer, BAE Systems Applied Intelligence11:30-12:30 pm Session A Best Practices for Sharing CTI in Financial Services
David Henry Eilken, VP Strategy, Soltra, An FS-ISAC & DTCC Company11:30-12:00 PM Session B Communications Insight: Identify Leaks, Threats, and Cyber Attacks More Quickly, Easily, and Cost-Effectively
Presented by SS812:00-12:30 pm Session B Finding, Investigating, and Stopping Stealthy Persistent Threats
Presented by SS81:30-2:00 pm Session A Investigating Crime Data Networks with Graph Visualization and Analysis
Presented by Tom Sawyer Software2:00-2:30 pm Session A Identifying important patterns in your communications data using network visualization
Corey Lanum, Cambridge Intelligence3:00-4:00 pm Session B International Cyber Threat Standards and New OASIS Cyber Threat Intelligence (CTI) Initiative Activities
Tony Rutkowski, EVP, Standards & Regulatory Affairs, Yaana Technologies and other OASIS CTI Members Invited