FirstConferenceKualaLumpur 2018 June 24, 2018 to June 29, 2018, Kuala Lumpur, Malaysia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: The Evolution of the Cyber Threat, Our Response and the Role of Diplomacy Christopher Painter N/A
The Road to (IR) Nirvana Rob Lowe This presentation examines Red Hat Information Security team’s alligator fighting over the last 7 years, ...
A Brief History of p0wn4ge: 18 Years and 4506 Incidents Aashish Sharma , Jay Karma We present both a broad reflection and detailed analysis of security incidents at Lawrence Berkeley ...
Social Mining of Threat Actor Activities Fyodor Yarochkin Part of responsibility of a Security Incident Response Teams is to be provide situational awareness ...
Learning from chaos, cloud and scale: Netflix SIRT Swathi Joshi , Alex Maestretti The Netflix Security Intelligence and Response Team (SIRT) has grown out of the unique Netflix ...
New Types of Attacks: The Evolution of Ransomware as a Service Susan Ballestero Rosales The last year I had the opportunity to present at FIRST about ransomware, however I ...
The Benefits of an Early Warning System in the Brazilian Academic Network Edilson Lima , Rildo Souza Preliminary studies conducted by University of San Paulo(USP) during the last two years confirm that ...
Security Response Survival Skills Ben Ridgway Jarred awake by your ringing phone, bloodshot eyes groggily focus on a clock reading 3:00 ...
Mind Hunter - Adversary Inception Levi Gundert , Daniel Hatheway After a successful breach, information security practitioners may be inclined to say “What difference does ...
Exploit Kit Hunting with Cuckoo Sandbox Jurriaan Bremer , Andres Elliku Cuckoo Sandbox is the leading open source automated malware analysis system, used by tens of ...
Cyber Weather - Situational Awareness Product For Our Non-technical Constituents Tomi Kinnari Problem: How to present cyber situational awareness in an understandable way to our non-technical and ...
Real-time Log Analysis Tool with STIX 2.0 Mariko Fujimoto , Takuho Mitsunaga Many organizations have experienced damages of targeted attacks. In detection of targeted attacks inside network, ...
The Analysis of DDoS Attack Resources in China Jian Xu , Han-bing Yan , Hao Zhou , Tian Zhu DDoS is one of the most serious threats within cyber space, which is very easy ...
Incident Management - The Art of Herding Cats Paul Clayton BT’s security team is constantly evolving to meet the threat landscape, and the needs of ...
Proactive Cyber Defense through Attack Modeling and Threat Intelligence Hamed Khiabani This talk will provide a look at intelligence-driven defensive operations. The Cyber Kill Chain as ...
Malware Reweaponization - A Case Study Karlis Podins The authors demonstrate a working proof-of-concept of reweaponization by replacing payload in an up-to-date, real ...
Keynote: How to Avoid Having a Really Bad Day Rob Mcmillan Many organizations struggle with the effective performance of security incident response. It’s always been that ...
An Internet of Governments: How Policymakers Became Interested in “Cyber” Maarten Van Horenbeeck , Klee Aiken Gradually, the internet has become a bigger part of how we socialize, do business, and ...
Coordinating Vulnerability Disclosure with Multiple Vendors Laurie Cert , Us) Coordinated Vulnerability Disclosure (CVD) is an ongoing challenge. We are discussing CVD in vendor forums ...
Taking the Attacker Eviction Red Pill Frode Hommedal Evicting a so called Advanced Attacker from your network is really hard. It is hard ...
Motivating to Successful Collaboration with Results Lasse Laukka At NCSC-FI we are used to work with relatively low budget, not so many people ...
Removing the Pain From the Repetitive Processing of Vulnerability Reports Using a Vulnerability Ontology Takayuki Uchiyama , Masaki Kubo , Masanobu Katagi JPCERT/CC has been coordinating and disclosing software vulnerabilities since 2004 when the vulnerability handling framework ...
Discovering Evasive Code in Malicious Websites with High- and Low-interaction Honeyclients Yuta Takata Threats of malicious websites are continuously evolving. These websites are exponentially increasing to achieve attacker's ...
Improving Threat Intelligence Platform and Information Sharing by Measuring Real-Time Collaboration in TIP like MISP Raphaël Vinot Information sharing about threats among the community has been demonstrated to be essential in incident ...
Mature PSIRTs Need Mature Tools Beverly Finch Beverly Finch is an Executive Program Manager leading Lenovo's PSIRT from its inception just over ...
Building and Maintaining Large-scale Honeypot Sensor Networks Piotr Kijewski The rise of IoT related attacks as demonstrated so effectively by Mirai and its variants ...
Outside the Box - Training Through Surprise Frode Hommedal Exercising can be fun, especially if you make it realistic and challenging. We ran a ...
“Moving to The Left”: Getting Ahead of Vulnerabilities by Focusing on Weaknesses Jim Duncan If I have learned anything from nearly thirty years of CSIRT experience, it is that ...
Deep Dive: Case Study Responding to Intrusions into the US Electric Sector Mark Bristow , Jermaine Roebuck Mark Bristow is the Deputy Division Director for Hunt and Incident Response Team (HIRT) at ...
Internet Cartography using BGP and the Implications to Data Sovereignty Fyodor Yarochkin We see the world in terms of geographical blocks and break these down further into ...
A holistic approach to ensure product security Christer Stenhäll In a company as big as Ericsson with a multitude of products, solutions and services ...
Threat Hunting Techniques at Scale Dhia Mahjoub , Thomas Mathew Threat hunting is an important process in every security operation, whether it is meant to ...
Keynote: Jury-Rigging Democracy: The Crazy, Sad Saga of Election Security in the U.S. Kim Zetter When Congress passed the Help America Vote Act in 2002 in the wake of the ...
Civil Society Under Attack - Trends and Tactics Daniel Bedoya , Szeming Tan From persistent and tailored attacks against independent media to clever impersonation mechanisms to discredit political ...
Patchwork : From One Malicious Document to Complete TTPs of a Medium Skilled Threat Actor Jaromir Horejsi , Daniel Lunghi Patchwork seems to be a capable threat group likely based in Southern Asia. The modus ...
Why is CTI Automation harder than it needs to be.. and what can security teams do about it. Allan Thomson Threat Intelligence is well known as an important part of CERT and Incident Responders toolkit.However, ...
Preparing the Village - Lessons Learned in Cross-Industry Vulnerability Disclosure Phillip Misner On Monday, October 16, 2017, the world awoke to news of a protocol vulnerability in ...
Behind the Scenes of Recent Botnet Takedown Operations David Watson David Watson has been a member of the Shadowserver Foundation since 2008, is one of ...
Securing your in-ear fitness coach: Challenges in hardening next generation wearables Sunil Kumar , Sumanth Naropanth Wearable platforms today enable rich, next-generation experiences such as secure payments, specialized sports tracking and ...
Free BugBounty as a CERT Emilien Le Jamtel As a CERT, handling a bug bounty program for your constituents may be challenging. In ...
Banks and Russian Speaking Adversaries Alexander Kalinin The last year of threat landscape has shifted, significantly. New players, tools, tactics and targets. ...
Detect & Respond to IoT Botnets as an ISP Christoph Giese The Internet of Things (IoT) is an increasing number of (smart) devices of various types, ...
Scaling Up Security to the Whole Country Martijn Heide Until 2 years ago, there was only 1 CERT team for the entire country of ...
Crawl, Walk, Run: Living the PSIRT Framework Mark Stanislav With its June, 2017 draft release, the PSIRT Framework from FIRST established a new era ...
Things Attack: Peek into an 18-month IoT Honeypot Tan Kean Siong Internet of Things attacks are on the rise. In this session, we love to share ...
Keynote: Lessons Learned From a Man-in-the-Middle Attack Erik De Jong , Frank Groenewegen It’s become a widely accepted mantra that experiencing a cyber breach is a question of ...
Don't Ignore GDPR; It Matters Now! Thomas Fischer GDPR is in effect since May 25, 2018, any organization handling EU residents’ personal data ...
Malvertising: an Italian Tale Andrea Minigozzi , Antonio Rossi When a small advertisement becomes a big risk: follow our Incident Responders deep investigating a ...
What’s in a Name? The Need for Global Identifiers of Badness. Richard Struse A recurring theme in the threat analysis community is the need for more “context” surrounding ...
What was in that Data? Gant Redmon In May of next year, the EU’s General Data Protection Regulation (GDPR) will go into ...
A little tour in the world of password stealers Paul Jung PassWord Stealer (PWS) are around since more than a decade now. They are legions. Some ...
The Andromeda Botnet Takedown Benedict Addis On 29 November 2017, a public-private team worked to take down Andromeda aka Gamarue, one ...
Security and Privacy Incident Response at Ericsson Thomas Grenman I will set the stage of this presentation by giving a brief introduction on how ...
Panel: Q&A on Privacy Andrew Cormack , Thomas Fischer , Gant Redmon N/A
Determining the Fit and Impact of CTI Indicators on your Monitoring Pipeline (TIQ-Test 2.0) Alex Pinto Implementing an appropriate data processing pipeline to make good use of your indicators of compromise ...
TLP to IEP Evolution: What, Why & How Tom Millar FIRST has issued two important standards for helping CSIRTs and their constituents share and re-share ...
Managing Risks Through Taxonomies Serge Droz Communicating the value of Security practices and incident response capabilities is challenging. After all, Security ...
Practical Integration of Threat Intelligence and CSIRT Processes to Accelerate Efficiency and Timely Response of Incidents: Malaysia CERT Case Study Sharifah Kassim , Syazwan Hafizzudin Shuhaimi Past Incident Response procedures may not be comprehensive enough to address complex and sophisticated incidents. ...
Multi-dimensional Malware Similarity will let you Catch Up with Malware Developers Koji Yamada , Kunihiko Yoshimura , Ryusuke Masuoka , Toshitaka Satomi The speaker will talk about the importance of multi-dimensional similarity between malware pieces and how ...
Keynote: 30 years on...why are we still needed more than ever? Paul Jackson This presentation takes a look back over the past 30 years of cybercrime and cyber ...
Collaborative National-level Incident Response Model to Address Large-Scale Data Breach Attack in Malaysia Sharifah Kassim , Farah Ramlee , Kilausuria Abdullah In October 2017, Malaysia was hit by the news that 46 millions of Malaysians’ personal ...
Creating NIS Compliant Country in a Non-regulated Environment, Case Study Croatia Jurica Cular Jurica Čular graduated at Faculty of electronics and computer science, Zagreb, Croatia as Master of ...
Professionalizing the Field of Cybersecurity Incident Response Tom Millar For 30 years, CSIRT work and cybersecurity have been practiced by a diverse community of ...
Attacker Antics: Illustrations of Ingenuity Vincent Wong , Bartosz Inglot The arms race between the vendors creating security defenses and the hackers trying to defeat ...
Bridging Cultures: Collaboration of the US/Global and Japanese Financial Communities Natsuko Inui As part of FS-ISAC’s global team, Natsuko works with colleagues in the Asia Pacific region ...
Exposing Crypto Phishing BulletProof Hosting Artsiom Holub , Austin Mcbride With the price of Bitcoin ascending to new heights in 2017, the rocketing valuation of ...
Emotet Malware Neil Fox AV solutions are constantly fighting a battle with malware authors to ensure that they detect ...