|
SCS PRO (OPERA)
Track 1
![Great_Britain](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/Great_Britain.png) ![Poland](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/Poland.png)
|
SCS EXPO (CONCERTO II)
Track 2
![Poland](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/Poland.png)
|
SESSIONS (CONCERTO I)
Track 3
![Poland](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/Poland.png)
|
EXPO ELEVATOR PITCH
Track 4
![Poland](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/Poland.png)
|
8:30 – 9:00 – Opening session
KEYNOTE
![JohnMatherlySCS](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/JohnMatherlySCS-300x300.jpg)
9:00 – 9:45
Tracking Hacked Websites – free entrance
John MATHERLY / Shodan.io
![Kosla](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/Kosla.jpg)
9:45 – 10:30
Information infrastructure resilience to network attacks – free entrance
Robert KOŚLA / Microsoft |
10:30 – 11:00 – Coffee break ![kawa](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/kawa.jpg)
|
11:00 – 11:40
Presence and impact of trolling in Latvian Internet media
Beata BIAŁY / NATO Strategic Communications Centre of Excellence
![B.Biały](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/B.Biały.png) |
11:00 – 11:40
The Hitchhiker’s guide to the ENISA CERT Training Materials
Paweł WEŻGOWIEC / ComCERT
Dawid OSOJCA / ComCERT
![pawelwezgowieccb](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/pawelwezgowieccb.jpg) ![DawidOsojcacb](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/DawidOsojcacb-150x150.jpg) |
11:00 – 13:00
ICS security as a national security priority – closed session |
11:00 – 11:20
|
11:40 – 12:20
How to lose a war having a super weapon? Human factor in information security
Marek GRAJEK
![MarekGrajek](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/MarekGrajek.png)
|
11:40 – 12:20
Unfortunately, it happened… Responding to incidents affecting the security of the organization by CERTs
Ireneusz TARNOWSKI / WCSS
![i.tarnowski](https://www.securitycasestudy.pl/wp-content/uploads/2016/08/i.tarnowski-300x300.jpg) |
ICS security as a national security priority – closed session |
11:40 – 12:00
Complex security management in your company – SOC services
Tomasz ŁUŻAK / EXATEL SA
![tomaszluzakcb](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/tomaszluzakcb-150x150.jpg)
|
12:20 – 13:00
Legal traps of (not) ordered security tests
Piotr KONIECZNY
/ Niebezpiecznik.pl
![PiotrKonieczny](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/PiotrKonieczny.jpg) |
12:20 – 13:00
Penetration test in practice – what to expect?
Adam WÓDZ / Cybercom
![Adam.Wodz](https://www.securitycasestudy.pl/wp-content/uploads/2016/08/Adam.Wodz_-300x300.jpg) |
ICS security as a national security priority – closed session |
12:20 – 12:40
Endpoint Security 10 (ENS10) – new, integrated platform for securing IT assets
Michał PRZYGODA / Intel Security
![michalprzygodacb](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/michalprzygodacb-150x150.jpg)
12:40 – 13:00
Blackholing
Ł ukasz BROMIRSKI / POC |
13:00 – 13:40
Early detection and APT analysis with RSA NetWitness Suite – phishing and WebShell cases
Helmut WAHRMANN / RSA
![Helmut.Wahrmann](https://www.securitycasestudy.pl/wp-content/uploads/2016/08/Helmut.Wahrmann.png) |
13:00 – 13:40
DGT RMP Platform – contemporary achievements of Polish engineers in the field of acquisition and deep analysis of the data
Marcin ADLER / DGT![photo_MA_cb](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/photo_MA_cb-150x150.jpg) |
|
13:00 – 13:20
The main areas of disinformation in the Polish Internet and social media
Kamil BASAJ
13:20 – 13:40Methodology of support for creating SOC concept and setting up CERT/SOCTomasz CHLEBOWSKI / ComCERT![TomaszChlebowski](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/TomaszChlebowski-150x150.jpg) |
13:40 – 14:40 – OBIAD ![talerz](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/talerz.png)
|
14:40 – 15:20
From design of new attacks by detecting anomalies to the artificial pancreas
Krzysztof SZCZYPIORSKI / Warsaw University of Technology, Cryptomage SA
![Szczypiorski](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/Szczypiorski.jpg) |
14.40 – 15.20
Chats with Bayrob botnet
Jarosław SPORYSZ / EXATEL SA |
14.40 – 16.40
Cloud computing technology influence on cybersecurity
Piotr BONINSKI / Microsoft
![Piotr-Boninski](https://www.securitycasestudy.pl/wp-content/uploads/2016/09/Piotr-Boninski-150x150.png)
|
|
15:20 – 16:00
(Cyber)Threats analysis based on graph and network theory
Rafał KASPRZYK / WAT
![RafalKasprzyk](https://www.securitycasestudy.pl/wp-content/uploads/2016/04/RafalKasprzyk.jpg)
|
15:20 -16:00
Elliptic curve cryptography in TLS
– does it meet the expectations?
– case study
Hanna TUŁOWIECKA
![H.Tulowiecka](https://www.securitycasestudy.pl/wp-content/uploads/2016/08/H.Tulowiecka.jpg) |
Cloud computing technology influence on cybersecurity
Piotr BONINSKI / Microsoft
![Piotr-Boninski](https://www.securitycasestudy.pl/wp-content/uploads/2016/09/Piotr-Boninski-150x150.png)
|
15:20 -16:00
Security incident reporting
Wojciech WIEWIÓROWSKI / Deputy European Data Protection Supervisor
![WWiewiorowski](https://www.securitycasestudy.pl/wp-content/uploads/2015/04/WWiewiorowski.jpg) |
17:20
Closing remarks – prize drawing
Conference will be accompanied by workshops that will be held on 13 and 16 September
– WORKSHOP I
MISP (Malware Information Sharing Platform & Threat Sharing). In english – CIRCL.LU – 13.09.2016, Tuesday.
– WORKSHOP III
In polish – ComCERT, CERT GAMES series – 16.09.2016, Friday.
More info about workshops