Program
Time | Agenda | ||
---|---|---|---|
08:00-09:00 | Registration and Breakfast | ||
09:00-09:05 | Welcome | ||
09:05-09:45 | State of Public/Private Partnership in Combating Cybercrime Richard Boscovich Microsoft Corp, Digital Crimes Unit |
||
09:45-10:20 | How Website Insecurity Can Ruin Your Business Peter Kruse CSIS Security Group |
||
10:20-10:40 | Coffee Break | ||
Morning Tracks | General | Technical | Technical+ |
10:40-11:20 | DKCERT – An Academic Computer Security Incident Response Team in the Global CERT- and CSIRT-Network Henrik Larsen DKCERT |
Can Encryption Save the World? Peter Landrock Cryptomathic |
Waterfall Computing – Creating Value in the Absence of Big Data Paul Vixie Farsight Security |
11:20-12:00 | PUA – Potentially Unwanted Advice Righard Zwienenberg ESET |
ATM Jackpotting in the Wild Thomas Siebert & Marc Ester G DATA |
Operation Potato Express: Analysis of a Cyberespionage Toolkit Robert Lipovsky & Anton Cherepanov ESET |
12:00-13:10 | Lunch | ||
Afternoon Tracks | Best Practices | Internet of Things | APTs |
13:10-13:50 | Practical Experiences in Outsourcing Kurt Sejr TDC Group |
How I Hacked my Home David Jacoby KasperskyLab |
The Attack of the Killer Tomatoes Gabor Szappanos Sophos |
13:50-14:30 | Don’t Be an Ostrich – Be a Chipmunk Manuel Vigilius ISS World Services |
Physical [In]Security: It’s not ALL about Cyber Inbar Raz PerimeterX |
The Stuxnet-O-Meter: Measuring Complexities Marion Marschalek Cyphort Inc |
14:30-14:50 | Coffee Break | ||
14:50-15:30 | Information Security - Current Challenges and Perspectives Adam Lebech DI ITEK |
||
15:30-15:50 | Cloud Data Storage Security and Threats: Introduction to the panel debate Jan Kaastrup CSIS Security Group |
||
15:50-16:40 | Panel Debate Topic: Cloud Data Storage Security and Threats |
||
16:40-17:30 | Networking Session |
Changes to the program may occur.