Incident Response

Title Speakers Conference Tags
Hacking Cisco Phones Ang Cui , Michael Costello Chaos Communication Congress-29 - Hamburg, Germany Incident Response Attack VOIP Cisco Embedded
TARGETED INTRUSION REMEDIATION: LESSONS FROM THE FRONT LINES Jim Aldridge Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Incident Response
2010 Data Breach Investigation Report Kenny Lee OWASP China-2010 - China Security Intrusion Detection Incident Response Computer Forensics
Cert Abusehelper Workshop Christian Van heurck BruCON-2010 - Brussels, Belgium Security Incident Response Community
The Security Innovation Network - Cluster Of Clusters Ls Ec BruCON-2010 - Brussels, Belgium Security Intrusion Detection Incident Response
Creating A Cert At Warp Speed Brian Honan BruCON-2010 - Brussels, Belgium Security Intrusion Detection Incident Response
Cyber [Crime|War] - Connecting The Dots Ian Amit BruCON-2010 - Brussels, Belgium Security Deep Knowledge Intrusion Detection Incident Response Privacy
Global Cybersecurity Agenda (Gca) With A Focus On The Deployment Of Solutions Through Impact (Global Response Centre) Alexander Ntoko CyberSec -2010 - Brussels, Belgium Security Infrastructure Incident Response Cyberwar Development
Cert Polska – Working As A National Level Computer Security Incident Response Team (Csirt) Piotr Kijewski CyberSec -2010 - Brussels, Belgium Security Others Deep Knowledge Incident Response Computer Forensics
Connecting The Prime Minister To Routers Hillar Aarelaid CyberSec -2010 - Brussels, Belgium Security Computer Forensics Routing Intrusion Detection Incident Response Forensics
Resilience And Contingency Planning Peter Sommer CyberSec -2010 - Brussels, Belgium Security Computer Forensics Intrusion Detection Incident Response Cyberwar
Counter Intelligence As Defense: Integrating Predictive And Proactive Attack Knowledge As A Wall Of Defense Fred Donovan OWASP Dublin-2010 - Ireland Security Intrusion Detection Incident Response
Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities And Countermeasures Sahin Albayrak , Seyit Ahmet Camtepe , Rainer Bye CollSec-2010 - Washington DC, USA Security Infrastructure Intrusion Detection Incident Response Intrusion Prevention
Security-Assessment.Com - Oh F#!K : What To Do When You Get Pwned Paul Craig OWASP New Zealand-2010 - New Zealand Security Incident Response Computer Forensics Analysis Forensics
Detecting And Protecting Your Users From 100% Of All Malware - How? Vadim Pogulievsky , Bradley Anstis OWASP Appsec-2010 - Stocholm, Sweden Security Intrusion Detection Incident Response Malware
Cyber Security From Article 4 And 5 Perspective Ulf Häussler CCDCOE-2010 - Estonia Security Intrusion Detection Incident Response Legal
Situation Management In Cyber Conflicts Gabriel Jakobson CCDCOE-2010 - Estonia Security Intrusion Detection Incident Response Cyberwar
Cyber Deterrence And International Institutions Ryan Kaminski CCDCOE-2010 - Estonia Security Intrusion Detection Incident Response Intrusion Prevention
Cyber Attacks And The Resilience Of Internet Infrastructure Rytis Rainys CCDCOE-2010 - Estonia Security Infrastructure Intrusion Detection Incident Response Cyberwar
Making The Most Out Of Post-Exploitation Paul Asadoorian SANS Pen Test Summit-2010 - Baltimore, USA Incident Response Exploitation
We’Ve Been Hacked! What Went Wrong And Why Mark Goudie Ruxcon-2010 - Melbourne, Austrailia Security Intrusion Detection Incident Response
Community-Oriented Computer Security Incident Response Teams (C-Csirts) David Ellefsen ZaCon-1 - Johannesburg, South Africa Security Intrusion Detection Incident Response Community
Improving Application Security After An Incident Cory Scott OWASP Appsec-2009 - Washington DC, USA Security Intrusion Detection Incident Response
Polymorphic Attacks: Evasion Techniques And Detection Approaches Michalis Polychronakis EC2ND-2008 - Heraklion, Greece Security Intrusion Detection Incident Response Computer Forensics
Incident Management - Tasks And Organization Volker Kozok TROOPERS-2008 - Munich, German Incident Response
Vrda: Vulnerability Response Decision Assistance Hal Burch , Art Manion , Yurie Ito EC2ND-2007 - Heraklion, Greece Incident Response Exploitation
A Novel Approach For Anomaly Detection Over High-Speed Networks Osman Salem , Sandrine Vaton , Annie Gravey EC2ND-2007 - Heraklion, Greece Android Intrusion Detection Incident Response
Defending Against Next Generation Attacks Through Network/Endpoint Collaboration And Interaction Spiros Antonatos , Michael E. Locasto , Stelios Sidiroglou , Angelos D. Keromytis , Evangelos P. Markatos EC2ND-2007 - Heraklion, Greece Intrusion Detection Incident Response Network Penetration