flocon 2018 Jan. 7, 2018 to Jan. 10, 2018, los angeles,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Morning Track I: How to be an Analyst Angela Horneman , Don Mckeon This two session training covers basic skills necessary to be an effective cyber analyst. Analytic ...
Morning Track II: Suricata Training Eric Leblond , Peter Manev Suricata, the world’s leading IDS/IPS engine, provides the most versatile network security tool available today. ...
Morning Track III: Bro Training Liam Randall Bro is a stateful, protocol-aware, open source, high-speed network monitor with applications such as a ...
Afternoon Track I: How to be an Analyst Angela Horneman , Don Mckeon This two session training covers basic skills necessary to be an effective cyber analyst. Analytic ...
Afternoon Track II: Threat Hunting w/Suricata Jack Mott , Jason Williams In "Threat Hunting with Suricata" we will teach various methods and techniques to aid in ...
Afternoon Track III: Bro Training Liam Randall Bro is a stateful, protocol-aware, open source, high-speed network monitor with applications such as a ...
Introduction Rachel Kartch FloCon 2018 Rachel Kartch will kick off the conference with an introduction.
Lessons Learned in Growing a Big Data Capability for Network Defense Steve Wagner The advent of big data and data science presents tremendous opportunities for cyber operations and ...
Creating & Sharing Value with Network Activity and Threat Correlation Jamison Day We examine the key impediments to effective information sharing and explore how network activity and ...
Keynote #1: Colonel Edward F. Buck Jr, NETCOM Edward Jr Deputy Commanding Officer Colonel Edward J. Buck, Jr. of NETCOM will provide a Keynote AddressDeputy ...
Panel Discussion: "Current Trends: Cybersecurity Data Analysis and Fusion" Bobbie Stempfley , Steve Henderson , Howard S. Marshall We can all pretty much agree that security devices on our networks are producing large ...
Anomaly Detection in Cyber Networks Using Graph-node Role-dynamics and NetFlow Bayesian Normalcy Modeling Anthony Palladino Advanced Persistent Threats (APTs), i.e., “low and slow” cyber-attacks, are difficult to detect using standard ...
When Threat Hunting Fails: Identifying Malvertising Domains Using Lexical Clustering Dhia Mahjoub , David Rodriguez , Matthew Foley From Java drive-bys to Adobe Flash exploits, low and mid-tier ad networks have traditionally been ...
May the data stay with you! - Network Data Exfiltration Techniques Leszek Miś Data exfiltration is a process of transmitting data from pwned or infected networks back to ...
Network Volatility Analysis for Threat Detection Brian Sacash Network usage patterns can vary throughout the day but abrupt and unexpected changes in behavior ...
InSight2: An Interactive Web-Based Platform for Modeling and Analysis of Large-Scale Argus Network Flow Data Angel Kodituwakku Network monitoring systems are paramount to the proactive detection and mitigation of problems in computer ...
DNS Analysis at Internet Peering Points Fred Stringer Summary: This talk describes cyber analysis of DNS traffic at the Internet peering points using ...
Detecting Malicious IPs and Domain Names by Fusing Threat Feeds and Passive DNS through Graph Inference Eric Harley , Emily Heath How can we tell which domain names will soon be used for delivering bad traffic ...
KEYNOTE: Trust, but Verify Marcel Berg Marcel van den Berg will highlight recent and historic examples of botnets, and examine how ...
Lunch Table Talk - "How to be a Savvy Machine Learning Consumer" Eliezer Kanal Over the past few years, the number of network protection technologies that purport to include ...
How to Hunt for Lateral Movement on Your Network Ryan Nolette , Adam Fuchs Once inside your network, most cyber-attacks go sideways. They progressively move deeper into the network, ...
Identification of Malicious SSL Networks by Subgraph Anomaly Detection Dhia Mahjoub , Thomas Mathew Sophisticated attackers use SSL to secure communications to command-and-control domains or provide their clients with ...
Tactical Threat Map: Methodology for Tracking and Documenting Cyber Campaigns Casey Kahsen The Tactical Threat Map (TTM) is a collective behavioral profile of Determined Human Actors (DHA) ...
Identifying Anomalies in Bipartite Network Data Mohammed Eslami Graph analysis can capture relationships between IPs and can be used to identify and rank ...
EternalBlue and You: Detecting & Trending SMB Vulnerabilities and Exploitation Activity Kevin Breeden The Server Message Block (SMB) protocol had a big year in 2017. While a fairly ...
The Future of Cybersecurity Needs Eyes and AIs on the Inside Jason Kichen This presentation will address why and how enterprises need to shift focus from the edges ...
Eliminating Barriers to Automated Tensor Analysis for Large-scale Flows James Ezick ENSIGN is a high-performance tensor decomposition suite that enables the unsupervised discovery of deep patterns ...
Lunch Table Talk - "A Model of Analytic Development: Structure and Application" Timothy J. Shimeall This presentation walks through a three-part model of analytic development and applies it to a ...
Multi-Dimensional Network Anomaly Detection with Machine Learning Randy Caldejon , Andrew Fast With the growth in the amount of network traffic and the increased sophistication of network-based ...
Automated Detection and Analysis of IoT Network Traffic Through Distributed Open Source Sensors and Citizen Scientists Joe Mcmanus The Internet of Things (IoT) is revolutionizing how we think of computing. Between home automation ...
CyGraph: Big-Data Graph Analysis and Visualization for Cybersecurity and Mission Resilience Steven Noel Because of complex interdependencies among networked systems, risks associated with individual hosts, vulnerabilities, and events ...
Conference Close Sam Salinas N/A