3-DAY TRAINING 4 – Applied Data Science and Machine Learning for Cyber Security
|
Charles Givre
,
Austin Taylor
,
Deutsche Bank
|
Citizen Chain
|
Don Bailey
,
Lab Mouse Security
|
Our Quantum Future
|
Jaya Baloo
,
KPN
|
Travel Hacking: Hotel Edition
|
Hendrik Scholz
|
3-DAY TRAINING 5: Mastering Burp Suite Pro: 100% Hands-On
|
Nicolas Gregoire
|
CommSec: Closing Comments Day 1
|
Sanjeev Solanki
|
Modern Car Security
|
Jun Li
,
Qihoo 360 Technology Co., Ltd
|
CommSec: Hacking the 0day Market
|
Andrea Zapparoli Manzoni
,
Crowdfense
|
Hacking Robots: Lessons Learned, Current Research and New Perspectives
|
Stefano Zanero
,
Politecnico di Milano
|
CommSec: Challenges and Practices of Local Differential Privacy in Real-World
|
Pingchuan Ma
,
Zhiqiang Wang
,
CN Cert
,
Beijing Electronic Science and Technology Institute
|
CommSec: Applications of Open Source Hardware in Security Research
|
MaLiang
,
NSFOCUS
|
Security 2020: The Threats and Opportunities for Cyber Leaders
|
Eddie Schwartz
,
DarkMatter
|
CommSec: WELCOME DAY 2
|
Andrea Zapparoli Manzoni
,
Crowdfense
|
CommSec: BREAK
|
|
Defending The Enterprise in 2018
|
Saumil Shah
,
Net-Square
|
Telecoms: Generational Evolution of Attack Surfaces
|
Emmanuel Gadaix
,
TSTF
|
The Inner Workings of the Windows Runtime
|
James Forshaw
,
Google Project Zero
|
Raining Bikes: Dissecting a Cloud-Connected E-Scooter
|
Nikias Bassen
,
CORELLIUM
|
Some Experiments with Code Similarity
|
Halvar Flake
,
Google Inc.
|
From an Edge to an Edge: Defense Strategies in the Modern Age
|
Ofir Arkin
,
Israel Engineering and Operations @Forcepoint
|
Vulnerability Research: What It Takes to Keep Going and Going and Going
|
Fred Raynal
,
QUARKSLAB
|
CommSec: Application and Practice of Machine Learning in Anti-Malware
|
Chao Ye
,
Rising Safety Officer
|
Digging Deep: Finding 0days in Embedded Systems with Code Coverage Guided Fuzzing
|
Kai Jern Lau
,
JD Security
,
Nguyen Anh Quynh
|
CLOSING NOTE
|
Tony Lee
,
Dhillon ‘L33tdawg’ Kannabhiran
,
JD.com
,
Hack In The Box
|
CommSec: Smart Nation Meets Privacy-Preserving Analytics
|
Sanjeev Solanki
|
3-DAY TRAINING 6 – Hacking Mobile Networks with Software Defined Radios
|
Lin Huang
,
Qihoo 360
|
3-DAY TRAINING 2: Modern Malware Warfare: Basics, Delivery, and Advanced Analysis
|
Dr. Jared DeMott
,
Josh Stroschein
,
VDA Labs
|
CommSec: AI Powered Security and Securing AI
|
Jimmy Su
,
JD Research Center
|
CommSec: Expediting Exploitability Assessment through an Exploitation Facilitation Framework
|
Xinyu Xing
|
Watch This: Finding Vulnerabilities In A Closed Source Video Decoder Driver
|
Adam Donenfeld
,
Zimperium
|
CommSec: WELCOME DAY 1 – Sanjeev Solanki (Acronis)
|
Sanjeev Solanki
|
CommSec: Internet Talents View of Network Security
|
Wang Yu
|
Social Media Mining for Threat Intelligence
|
Dr. Fyodor Yarochkin
,
Trend Micro, Inc.
|
Offensive Memory Forensics
|
Hugo Teso
,
F-Secure
|
Using Machine-Learning to Investigate Web Campaigns at Large
|
Marco Balduzzi
,
Trend Micro, Inc.
|
Taint Driven Crash Triage
|
Richard Johnson
,
Cisco Talos Group
|
Monitoring Massive Network Traffic Using Bayesian Inference
|
David Rodriguez
,
Cisco Umbrella (OpenDNS)
|
CommSec: Solving The Last Mile Problem Between Machine Learning and Security Operations
|
Xiangyu Liu
,
Xinyue Shen
,
Alibaba Group Holding Limited
|
Bye, Bye IMSI Catchers: Security Enhancements In 5G
|
Lin Huang
,
Qihoo 360
|
CommSec: Closing Comments Day 2
|
Andrea Zapparoli Manzoni
,
Crowdfense
|
3-DAY TRAINING 1: Vulnerability Discovery and Triage Automation Training
|
Richard Johnson
,
Cisco Talos Group
|
CommSec: BREAK
|
|
CommSec: Unconventional Vulnerabilities In Google Cloud Platform
|
Venkatesh Sivakumar
,
DarkMatter LLC
|
CommSec: Who Hijacked My Smart Home: One URL to Hack ALL IoT Devices
|
Han Zi Dong
|
3-DAY TRAINING 3: Threat Intelligence Gathering Using Maltego
|
Andrew Macpherson
,
Paterva
|
RK87 – A Smart Contract Verification Tool
|
Thanh Nguyen
,
Van Hoa Nguyen
,
Verichains Lab / VNSECURITY
,
Verichains Lab
|
Your Personal Surveillance Device: How Your Smartphone Tracks Your Entire Life
|
Vladimir Katalov
,
ElcomSoft Co.Ltd.
|
CommSec: Manual Analysis of an APT Espionage Campaign
|
ZhiBo Wu
,
CETC30-30WISH
|
Stop Laughing! CYBER Security is Cool!
|
Adam Laurie
,
Aperture Labs
|
Attack Trees: Methodology and Application in Red Teaming Operations
|
Matteo Beccaro
,
Opposing Force s.r.l.
|
USB armory: Past, Present and Future
|
Andrea Barisani
,
Inverse Path
|
CommSec: The Security of Robot Operating Systems and Vulnerability Mining
|
HanZhe
|
CommSec: IoT Security Battlefield Notes
|
Zhuo Meng
,
Xiaomi IoT Security Lab
|
CommSec: Gentlemen – Start Your AIs: Self Racing Cars
|
Dhillon ‘L33tdawg’ Kannabhiran
,
Hack In The Box
|
Tools of The Trade
|
Evan Booth
,
Counter Hack Challenges
|
Apple iOS Access Permission Vulnerabilities
|
Benjamin Kunz
,
Vulnerability Lab
|