|
SCS PRO (OPERA)
Track 1
 
|
SCS EXPO (CONCERTO II)
Track 2

|
SESSIONS (CONCERTO I)
Track 3

|
EXPO ELEVATOR PITCH
Track 4

|
8:30 – 9:00 – Opening session
KEYNOTE

9:00 – 9:45
Tracking Hacked Websites – free entrance
John MATHERLY / Shodan.io

9:45 – 10:30
Information infrastructure resilience to network attacks – free entrance
Robert KOŚLA / Microsoft |
10:30 – 11:00 – Coffee break 
|
11:00 – 11:40
Presence and impact of trolling in Latvian Internet media
Beata BIAŁY / NATO Strategic Communications Centre of Excellence
 |
11:00 – 11:40
The Hitchhiker’s guide to the ENISA CERT Training Materials
Paweł WEŻGOWIEC / ComCERT
Dawid OSOJCA / ComCERT
  |
11:00 – 13:00
ICS security as a national security priority – closed session |
11:00 – 11:20
|
11:40 – 12:20
How to lose a war having a super weapon? Human factor in information security
Marek GRAJEK

|
11:40 – 12:20
Unfortunately, it happened… Responding to incidents affecting the security of the organization by CERTs
Ireneusz TARNOWSKI / WCSS
 |
ICS security as a national security priority – closed session |
11:40 – 12:00
Complex security management in your company – SOC services
Tomasz ŁUŻAK / EXATEL SA

|
12:20 – 13:00
Legal traps of (not) ordered security tests
Piotr KONIECZNY
/ Niebezpiecznik.pl
 |
12:20 – 13:00
Penetration test in practice – what to expect?
Adam WÓDZ / Cybercom
 |
ICS security as a national security priority – closed session |
12:20 – 12:40
Endpoint Security 10 (ENS10) – new, integrated platform for securing IT assets
Michał PRZYGODA / Intel Security

12:40 – 13:00
Blackholing
Ł ukasz BROMIRSKI / POC |
13:00 – 13:40
Early detection and APT analysis with RSA NetWitness Suite – phishing and WebShell cases
Helmut WAHRMANN / RSA
 |
13:00 – 13:40
DGT RMP Platform – contemporary achievements of Polish engineers in the field of acquisition and deep analysis of the data
Marcin ADLER / DGT |
|
13:00 – 13:20
The main areas of disinformation in the Polish Internet and social media
Kamil BASAJ
13:20 – 13:40Methodology of support for creating SOC concept and setting up CERT/SOCTomasz CHLEBOWSKI / ComCERT |
13:40 – 14:40 – OBIAD 
|
14:40 – 15:20
From design of new attacks by detecting anomalies to the artificial pancreas
Krzysztof SZCZYPIORSKI / Warsaw University of Technology, Cryptomage SA
 |
14.40 – 15.20
Chats with Bayrob botnet
Jarosław SPORYSZ / EXATEL SA |
14.40 – 16.40
Cloud computing technology influence on cybersecurity
Piotr BONINSKI / Microsoft

|
|
15:20 – 16:00
(Cyber)Threats analysis based on graph and network theory
Rafał KASPRZYK / WAT

|
15:20 -16:00
Elliptic curve cryptography in TLS
– does it meet the expectations?
– case study
Hanna TUŁOWIECKA
 |
Cloud computing technology influence on cybersecurity
Piotr BONINSKI / Microsoft

|
15:20 -16:00
Security incident reporting
Wojciech WIEWIÓROWSKI / Deputy European Data Protection Supervisor
 |
17:20
Closing remarks – prize drawing
Conference will be accompanied by workshops that will be held on 13 and 16 September
– WORKSHOP I
MISP (Malware Information Sharing Platform & Threat Sharing). In english – CIRCL.LU – 13.09.2016, Tuesday.
– WORKSHOP III
In polish – ComCERT, CERT GAMES series – 16.09.2016, Friday.
More info about workshops