About Track 3 - Threat Detection from Automated OSINT Collection and Analysis
The full agenda for track 3 is below. For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Threat Detection from Automated OSINT Collection and Analysis
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Product Training
Track 6: Social Network Monitoring and Big Data Analytics Product Training
Track 7: Mobile Signal Intercept and Electronic Surveillance Product TrainingPre-Conference: Seminars and Tutorials (Monday, 16 March 2015)
Track 3: Threat Detection from Automated OSINT Collection and Analysis
This track focuses on OSINT automation platforms, which can provide early warning of and protection against Internet-based security attacks.
Tuesday, 17 March 2015
9:00-9:30 | Intelligent Profiling with OSINT Presented by Tasheel Information Technology and CTS |
9:30-10:00 | Automating Malware Analysis to Assist in Cyber Crime Investigations Presented by CyberPoint International |
11:30-12:00 | ProtAct: detection of cyber threats and complete analysis within a few minutes Presented by FoxIt |
12:00-12:30 | OSINT: Are you sure you are looking in the right place? Presented by Advanced Systems |
14:00-14:30 | Communications Insight: Identify Leaks, Threats, and Cyber Attacks More Quickly, Easily, and Cost-Effectively Presented by SS8 |
4:30-15:00 | Finding, Investigating, and Stopping Stealthy Persistent Threats Presented by SS8 |
15:30-16:30 | The APT Evolution - Ever Rising Critical Infrastructure Threats! With the rising threats and increasing attacks on the national infrastructure to the point of an almost unspoken Cyber War, Governments across the world are facing increasing challenges to protect national critical infrastructure. Would regular concepts of information security apply and defend nations? Is it enough to have national protection standards in place or should Government get involved in implementation? On this topic, Mr. Hazzaa presents a thorough analysis of current protection measures in place and ways to circumvent, with focus on APT development and protection. Case studies will be discussed on how a well-staged APT can bypass layered defenses and strike energy, utilities, oil & gas and telecom to bring down the national critical infrastructure. The presentation covers both sides of the story – The Attacker & the Defender Presented by ISnSC |