Hotels and Map- the other guys
28-Feb | Time | Person | Length | Topic |
10:00 | Gadi | 0:10 | Gadi | |
10:10 | Fred Cohen | 0:25 | Distributed Coordination Attacks - past, present, and future | |
10:35 | Dave Piscitello ICANN | 0:10 | Fast Flux and DNS policy brief | |
10:45 | Julia Wolf FireEye | 0:20 | Informatic-based Malware Analysis | |
11:05 | Panel | 0:45 | Paul Vixie, Mark Seiden, Gadi Evron, Marcus Sachs | |
11:50 | Patrick Peterson IronPort/Cisco | 0:20 | Inside the My Canadian Pharmacy spam gang | |
12:10 | Sun Clausewitz | 0:20 | Whole Internet Visualizations for Security Research - IPv4 and IPv6 | |
12:30 | Jim Binkley PSU | 0:15 | PSU's Experience with Ourmon and Botnet Detection | |
12:45 | Dan Hubbard WebSense | 0:20 | What's in a name? Lexi-reputation:Scoring the likelihood of machine versus man domain and host name generation in order to determine maliciousness. | |
13:05 | Lunch | 1:00 | ||
14:05 | Rick Wesson Support Intelligence | 0:20 | Abuse Vectors mapped on Space Filling Curves | |
14:25 | Daniel Schwalbe University Washington | 0:20 | Gig-speed packet captures - Drinking from the network fire-hose | |
14:45 | Righard Zwienenberg Norman | 0:15 | TBA - The Best Advice | |
15:00 | Pat Cain APWG | 0:15 | XML IODEF:Less filling, same great taste | |
15:15 | Panel | 0:45 | Steve Crocker, Avi Freedman, Gadi Evron, Dan Hubbard, Righard Zwienenberg | |
16:00 | Oliver Friedrichs Symantec | 0:20 | Cybercrime and the Electoral System | |
16:20 | Dave Dittrich University Washington | 0:20 | Nugache | |
16:40 | Nicholas Bourbaki | 0:15 | The 7 percent solution: "free" tools for winbox cleanup and consumer education | |
16:55 | Juraj Malcho ESET | 0:20 | The life of a drive-by exploit chain | |
17:15 | Panel | 0:45 | Mark Seiden, Barry Greene, Matt Jonkman, Mike Johnson | |
18:00 | John O'Leary | 0:15 | Psychological Analysis of Social Engineering Attacks | |
18:15 | Ross Stapleton-Gray Packet Clearing House | 0:15 | INOC-DBA R&D Initiatives | |
18:30 | Ziv Mador Microsoft | 0:25 | Fighting the Storm: Data from the MSRT | |
18:55 | Dismissal | Sorry, no boxing. We have replaced it with paint ball. Come shoot at Gadi. Listen to him scream. Party following | ||
29-Feb | Time | Person | Length | Topic |
9:30 | Levi Gundert Cymru | 0:30 | A Case study or two | |
10:00 | DoD | 0:15 | DoD briefing | |
10:15 | Sean Zadig | 0:15 | NASA briefing | |
10:30 | Panel | 0:30 | Levi Gundert, LEO, DoD | |
11:00 | Michael Hammer AG Interactive | 0:15 | Strong SPF Assertions, DKIM Signing and Phishing Mitigation | |
11:15 | Paul Vixie | 0:15 | ISC Security Information Exchange | |
11:30 | Richard Perlotto ShadowServer | 0:15 | TheSoapbox Presentation | |
11:45 | Adrien de Beaupre Bell Canada Security | 0:15 | Security Incident Management Capability Maturity Model | |
12:00 | Panel | 0:30 | Richard Perlotto, Adrien de Beaupre, | |
12:30 | Lunch | 1:00 | Lunch | |
13:30 | Spamhaus | 0:20 | Hot or Not | |
13:50 | Fengmin Gong FireEye | 0:20 | Extracting Accurate Botnet Intelligence Using A VM-Based Approach | |
14:10 | Paul Sop Prolexic | 0:20 | HTTP DDoS Attack Evolution | |
14:30 | David Moore CAIDA | 0:15 | Strange Things Found in an Open Resolver Survey | |
14:45 | Adam O'Donnell Cloudmark | 0:15 | When Malware Attacks (anything but Windows)!(?) | |
15:00 | Panel | 0:30 | Gadi |