Training: 8–9 November 2016
Tutorials & Conference: 9–11 November 2016
Amsterdam, NL

Schedule: Security in context (security datasci) sessions

Add to your personal schedule
9:00–12:30 Wednesday, 9 November, 2016
Location: E104/106 Level: Intermediate
Marcelle Lee (Fractal Security Group, LLC), Lisa Foreman-Jiggetts (Women's Society of Cyberjutsu)
Average rating: ***..
(3.67, 3 ratings)
You don’t have to be a SOC analyst or an incident response guru to leverage network forensics. Marcelle Lee and Lisa Foreman-Jiggetts explore the wealth of information that can be learned through network traffic analysis. Read more.
Add to your personal schedule
11:20–12:00 Thursday, 10 November, 2016
Location: G104/105 Level: Intermediate
Alex Pinto (Niddel)
Average rating: ****.
(4.29, 7 ratings)
Alex Pinto demonstrates how to apply descriptive statistics, graph theory, and nonlinear scoring techniques on the relationships of known network IOCs to log data and how to use those techniques to empower IR teams to encode analyst intuition into repeatable data techniques that can be used to simplify the triage stage and get actionable information with minimal human interaction. Read more.
Add to your personal schedule
13:15–13:55 Thursday, 10 November, 2016
Location: G104/105 Level: Intermediate
Hunter King (Google), August Huber (Google)
Average rating: ****.
(4.33, 3 ratings)
Hunter King and August Huber explain how to implement machine identity at scale in a heterogeneous environment. Discover the pitfalls of endpoint attestation. Hunter and August made the mistakes so you won't have to. Read more.
Add to your personal schedule
13:15–13:55 Thursday, 10 November, 2016
Location: G106/107
Trey Darley (Kingfisher Operations, sprl)
Average rating: *....
(1.00, 2 ratings)
Trey Darley cuts through the hype surrounding threat intelligence and reframes the concept within a broader historical context, showing how information sharing can be a effective tool for both organizations with sophisticated security programs and organizations falling below the security poverty line. Read more.
Add to your personal schedule
14:10–14:50 Thursday, 10 November, 2016
Location: G104/105 Level: Intermediate
Merike Kaeo (Farsight Security)
Average rating: ****.
(4.40, 5 ratings)
Nothing good or bad can happen on the Internet without involving the Domain Name System (DNS), which provides visibility of the global Internet and unparalleled intelligence on cybercriminals and attack methods. Merike Käo discusses the value of DNS to cyber investigations and explores how real-time DNS observations can improve accuracy and response time to cyberattacks. Read more.
Add to your personal schedule
15:50–16:30 Thursday, 10 November, 2016
Location: G104/105 Level: Beginner
Steve Touw (Immuta)
Average rating: ***..
(3.50, 2 ratings)
The global populace is asking for the IT industry to be held responsible for the safe-guarding of individual data. If the cat is out of the bag and collection will not stop, then the next logical question is how do we protect the privacy of individuals? Steven Touw examines how to design your data and analytics architecture to keep your data science teams delivering results legally. Read more.
Add to your personal schedule
11:20–12:00 Friday, 11 November, 2016
Location: G102 Level: Beginner
Noé Lutz (Google Inc.)
Average rating: ****.
(4.80, 5 ratings)
Developers face significant challenges defending their platforms from attackers who try to co-opt platforms to distribute attacks on users. Noé Lutz discusses lessons learned over the past decade by the Google Safe Browsing (GSB) team about how to thwart these increasingly sophisticated threats, focusing on how developers can leverage GSB’s open source APIs to protect their users. Read more.
Add to your personal schedule
13:15–13:55 Friday, 11 November, 2016
Location: G104/105 Level: Intermediate
Alexandre Dulaunoy (CIRCL (The Computer Incident Response Center Luxembourg))
Average rating: ****.
(4.33, 3 ratings)
Information sharing is a key element in detecting security breaches and proactively protecting information systems and infrastructures, but the practical aspect is often forgotten. Alexandre Dulaunoy offers an overview of MISP, a free software tool that supports information-sharing practices among communities, and shares some lessons learned while building it. Read more.
Add to your personal schedule
14:10–14:50 Friday, 11 November, 2016
Location: G104/105 Level: Intermediate
Eddie Garcia (Cloudera)
Average rating: ***..
(3.67, 3 ratings)
The use of big data and machine learning to detect and predict security threats is a growing trend, with interest from financial institutions, telecommunications providers, healthcare companies, and governments alike. But is this technology all hype or real? Eddie Garcia explores how companies use Hadoop-based solutions to protect their organizations. Read more.