ConCollector
our blog
|
more on thinkst
Search:
Everything
Browse:
Speakers
Conferences
Topics
Contributors
Analytics
Folklore
About
Login
SuitsandSpooks 2014
Sept. 12, 2014 to Sept. 12, 2014, london,uk
Event Page
Tell us about missing data
Title
Speakers
Summary
Topic Types
APT for Hire: SU Bin and Espionage-as-a-Service
Jeffrey Carr
N/A
The World As We Knew It For Law Enforcement Is Dead In Cyberspace
Troels Oerting
A global Internet where criminals can operate anonymously has overthrown traditional law enforcement paradigms. MLATS ...
Discussion on Threat Research Pressures and Complexities
Boldi Bencsáth
I'll discuss what CrySyS Lab is seeing in the way of increasingly complex targeted attacks ...
Are Governments Relying Too Heavily On The Private Sector For Cyber Security Intelligence?
Eugene Kaspersky
,
Troels Oerting
,
Chris Coleman
,
Rodrigo Bijou
N/A
Unveil the Deep Web: Using AI to Minimize Financial Risk and Maximize Awareness
Andrej Bobich
Abstract: The term “Deep Web” has become eponymous, often utilized with little awareness of its ...
The Issue of Trust in Information Sharing Post-Snowden
Freddy Dezeure
N/A
Ukraine in a Year of Revolution and War: What's Next?
Brian Mefford
N/A
The Changing Faces of the Cyber Underworld
Eugene Kaspersky
N/A
The Tools of the NSA Playset
Joe Fitzpatrick
Abstract: The purported NSA ANT catalog, along with other revelations in the past year, have ...
The Snake Campaign
Adrian Nish
Abstract: One of the most infamous incidents in the history of cyber-attacks is that which ...
False Flag Operations - Turla
Costin Raiu
N/A
Cyber Warfare Operations and Questions of International Law
Jan Stinissen
N/A
The Enterprise Cyber Immune System: A Probability Approach to Security
Jim Penrose
In this new era of advanced cyber threats, organizations are faced with the challenge of ...