Participation in the conference allows for 13 CPE points.
The agenda may change.
DAY 1 – 13 SEPTEMBER, WEDNESDAY
|
|||
8:00 – 8:50 – Registration |
|||
8:50 – 9:00 – Opening session |
|||
KEYNOTE How Was That Breach Detected? Jeff Hamm / FireEye KEYNOTE Cybersecurity, Keys, and Hollywood: The truth about the Internet’s phonebook and the “7 keyholders” Richard Lamb / ICANN KEYNOTE 10:30 – 11:10 Intelligence Driven Security a Myth or a Reality? Azeem Aleem / RSA |
DAY 2 – 14 SEPTEMBER, THURSDAY
11:00 – 11:40 The essence of IT Security monitoring Artur Barankiewicz / Orange Polska |
11:00 – 11:40
A march for disaster – a short history of failures in IT projects on the example of expertises from Cyber Security Centre at AGH University |
11:00 – 11:40
20 000 logs under the SIEM … and other extraordinary cyber trips Błażej Boczula / IT Security Specialist
|
11:00 – 11:20
Company’s cyber security under pernament control Karolina Ząbek, Wojciech Kubiak / CyberCom
|
11:40 – 12:10 – Coffee break |
|||
12:10 – 12:50
TeliaCompany case study. Incidents in the eyes of a large telecom Vladimir Bobor / TeliaCERT |
12:10 – 12:50
Computers without traces? – forensic analysis real-life case study |
12:10 – 12:50
How Complete Attack Surface Visibility & Analytics Can Improve Compliance & Business Risk Posture Edvinas Pranculis / Skybox |
12:10 – 12:50 Malware hunting in the wild – lessons learnt Marcin Marciniak / Inżynier systemów bezpieczeństwa, dziennikarz |
12:50 – 13:30
Tracking ad networks Raphael Vinot, Quinn Norton / CIRCL.LU |
12:50 – 13:30 Hackers profiling Maciej Gajewski |
12:50 – 13:30
How should we help entrepreneurs who have been cheated in the Internet? – prosecution of cyber crimes in the food sector |
12:50 – 13:30 Homo securitatis Filip Nowak |
13:30 – 14:10
Disinformation and manipulation – Active resources in the Internet Era Adam Haertle |
13:30 – 14:10
ED IoT – digital traces in IoT, real-life case studies |
13:30 – 14:10 A low-cost fake BTS based security evaluation testbed for devices using SIM cards Marcin Dudek / ComCERT.PL |
13:30 – 13:50 Gathering more information – Cyber Threat Intelligence (CTI) Mariusz Rybicki / Exatel |
14:10 – 14:50 – Lunch
How should we coordinate incident handling in Poland? Experiences based on WannaCry, Petya, Industroyer, Financial Supervisory Commission Attack |