Why Cybercrime Security Forum

Succeed

Speakers will provide real answers on how government and business owners can protect themselves against the rising tide of cybercriminals.

Learn

Opportunity to participate in the broadest range of learning opportunities across Information Security by the leading Industry experts; they will share the latest threats, resolutions, technical breakthroughs & protection mechanisms.

Connect

Connect with other IT security professionals and IT Security partners who'll help you reach decisions concerning the protection of your organization's information security.

CYBERCRIME SECURITY FORUM 2014

Agenda

Registration & Name badge pick up

Registration & Name badge pick up

Introductions and Welcome

Introductions and Welcome

Through a Mirror Darkly: A Journey to the Dark Side of Metadata

In the world of Cyberspace exists a secret currency of information that is being traded without your knowledge. In his latest thought provoking session, join Andy Malone as he takes you on a journey into the heart of metadata. To understand what is it and how it works. You’ll be amazed at how information can be peeled away to reveal your deepest secrets. Most importantly we will learn how to protect yourself and your data from potential misuse. By adopting simple best practices you’ll ensure that your secrets truly remain secure.

Refreshment Break

The Dark Side of PowerShell - Defending the Enterprise from the Latest Attack Platform

For the malicious guys, PowerShell provides tremendous capability since it can run dynamic code downloaded from another system (or the internet) and execute it in memory without ever touching disk. These features make PowerShell a preferred method for gaining and maintaining access to systems since they can move around using PowerShell without being seen. Now PowerShell loves the Blue Team - the improvements in WMF 5.x can make PowerShell the worst tool of choice for a hacker!

The Reds, The Blues and the Purples!

An update on the world of Red Teaming and why working together with the Blues makes so much sense.

Lunch

Just how secure is your password?

For years, we have been told that our passwords should be of a certain length, have the correct entropy, contain mixtures of upper-case, lower-case, numbers, punctuation marks and more. You may abide by all the rules, but are the rules correct and just how might your password be compromised? Social engineering or technical trickery ranges from the primitive to erudite Come to this session and you will definitely rethink your password strategies. John Craddock will take you through the attack paths, mitigations and methods of staying safe.

Refreshment Break

Going Underground: Discovering, Exploiting & Defending against Covert Channels in Modern Computing

There’s a hidden world that you never knew existed. In this fascinating deep dive, join Andy Malone as he takes you inside the murky world of covert channels. Beyond the well known ports, hackers and bad guys lurk waiting to deploy viruses, Trojans or worse. Also discover how to access hidden channels within modern file systems and how hackers exploit them. Join Andy Malone in this fascinating session to discover what lies beneath. Packed with demos, trick and tips to ensure that your network is properly monitored and secured.

Q&A

Registration & Coffee

Registration & Name badge pick up

For Your Ear’s Only: Voice Recognition Security Secrets Unleashed!

Voice recognition is hot and appears to be everywhere. From Cortana in Windows 10 devices to TV’s, smartphones and even web browsers. But just how this amazing technology works remains a mystery for many. Join Andy Malone as he uncovers the secrets behind voice recognition technology and how it’s changing our world. Whilst this fascinating technology may be a godsend for many, it’s also uncovered some alarming security flaws and IT and as such Security professionals need to fully understand this amazing technology. Join Andy Malone as he investigates the rise of Voice recognition and asks if it’s a technological wonder or a security nightmare. Packed with topical debate, demos and tips and tricks, this is a 75min security session you won’t forget.

Refreshment Break

In a world beyond passwords

Come to this session and discover how federated identity can eliminate the need for passwords and provide Single-Sign-On (SSO) for access to all web resources. You will learn: how to build federated identity solutions, how to manage different devices and the requirements for authentication and authorization. Although the proposed solution will be primarily built around Microsoft technologies and cloud services, the concepts apply to any platform solution. You also learn about the risks and mitigations.

Preventing, detecting & responding to cyber-attacks

A significant cyber-attack can shake your customer base, partner relations, executive staff, profits and revenue. Attacks have cost executives their jobs, resulted in major revenue losses and damaged brand reputations. In a world where attacks have become commonplace, what steps can be taken to help protect your organization and minimize damage? Microsoft has unique visibility into today’s threat landscape that can help you protect your organization. Through operating hyper-scale cloud services (Azure, Office 365, etc.) and a multi-platform global enterprise, Microsoft has decades of experience and unique end-to-end visibility into today’s evolving attacker tools and techniques. Our expertise in the areas of development, operations, response, recovery, policy and combatting cybercrime delivers industry-leading technical cybersecurity solutions that help to protect millions of customers around the world.

Lunch

Advanced Persistent Threats: is democratization underway?

The number of Advanced Persistent Threats keep increasing as they become more and more diverse… They are no longer perpetrated by State sponsored groups only but now also by cybercriminal organizations like Carbanak, Metel, or GCMAN. In such context what are their possible evolutions and modus operandi? Which critical information systems are more targeted in an organization? Automatization, AI, behavioral analysis….what are the solutions to block the APT style attacks, and how to implement them so as to be able to react quickly on this type of threats ?

Refreshment Break

Banking Trojan & Mobile Device: Mobile Forensics and Malware Analysis Combined

It is a fact that in the last few years we are seeing the development of a culture of Smartphone Dependence. With instant access to text messages, emails, social media, e-shops, business applications & other banking transaction and practically everything else we could want, our obsession with smartphones is starting to resemble an addiction. Consequently, smartphones are turning to be the ultimate target for cyber criminals. Why? Simply because we all use our smartphones to perform different activities with ease, in small screens, being naïve to acknowledge the dangers around it. During this session, participants will have the opportunity to learn about a recent case of a Malware Infection on a Smartphone along with the examination and analysis followed. The primary focus of this presentation is related to the steps performed to acquire, collect and analyse phone artefacts and how this lead to a Malware analysis & investigation.

Opening Pandora’s Box to Social Networks & How to Exploit Them

Social networks have changed our society almost beyond recognition. In just over 10 years’ tools like Facebook, Twitter and Linked In have transformed the way we communicate, interact and do business. But with the billions of users have come some disturbing trends. Bullying, trolling, malware, user misuse, identity theft and many more. In his latest session, join Andy Malone as he takes you on a journey to the murky side of social networking. A Place where criminals, thieves, paedophiles and potential terrorists lurk.

Speakers

Andy Malone

Ari Davies

Christos Makedonas

Daniel Grabski

George Dobrea

John Craddock

Registration

Professionals

400 / month Valid till 07/04/2017
(VAT 19% not included)
Full-access to all Sessions
Full access to Expo Hall
Conference lunch Coffee/Snacks
Not Available

Academic *

350 / month Valid till 07/04/2017
(VAT 19% not included)
Full-access to all Sessions
Full access to Expo Hall
Conference lunch Coffee/Snacks
Not Available

Professionals

500 / month
(VAT 19% not included)
Full access to all Sessions
Full access to Expo Hall
Conference lunch Coffee/Snacks

Academic *

450
(VAT 19% not included)
Full-access to all Sessions
Full access to Expo Hall
Conference lunch Coffee/Snacks

* Academic Faculty and staff can register for the academic pass. Limited passes available. Terms and conditions apply please contact us for more information.

Venue

K-Cineplex Nicosia Mall

Verginas 3, Strovolos, 2025 NICOSIA CY

get directıons

sponsors Participants from key companies located in Cyprus, Europe & the Middle East will arrive ready to learn, ready to discuss & prepared to make decisions concerning the development of their InfoSec enterprise. Will your company be the Sponsor they pick to progress with – will your product be the next instalment in their business?



Become a Sponsor

Contact
Computrain Technical Institute
Ifigenias 63 Block A Office 201 2003 Strovolos
TEL: +357 22 44 14 92 FAX: +357 22 44 14 93
Email: info@computrainlearning.com