ICSS 2015 Feb. 4, 2015 to Feb. 5, 2015, Leuven,belgium

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening speeches Pieter Aula , Koenraad Debackere , Koeni Geens , Frédéric Van Leeuw N/A
European Cybercrime Centre Paul Gillen N/A
The Fight Against Cybercrime Michèle Coninsx N/A
Panel 1: Cyber Security Strategies Marc Henauer , Christoph Raab , Paul Timmers , Jamie Patrick Shea , Wolfgang Rohrig A view on existing strategies at national, EU and international level and the challenges of ...
‘Profiling and mapping of online child predators’ Stefan Bogaerts N/A
‘Supporting Computer Forensic Investigators Exposed to Distressing Material Online’ Nicola Fortune N/A
‘View on available tools for online investigators’ Riccardo Satta N/A
Panel 2: Cyber Security Readiness at country/EU level Christian van Heurck , Gorazd Bozic , John Salomon , Steve Purser Structures to create at EU and national levels (CERTs, ISACs, monitoring capacities), cyber attack exercises, ...
Workshop 2: TOR – The Dark Web Mark Van Staalduinen , Christian Karam Research on the Dark Web
Panel 3: Cyber Security Readiness at Company/Organisation Level Marc Vael , Maurice Cashman , Wim Bartsoen , Roberto Tavano , Gerrit Mets N/A
‘European Cybercrime Training and Education Group (E.C.T.E.G.)’ Yves Vandermeer N/A
‘NATO Cyber Training’ Ian J West N/A
INTERPOL Global Complex for Innovation Christian Karam , Juan Hardoy N/A
Keynote Bruce Schneier N/A
“Mapping the patterns and performance of policing cooperation networks in the fight against cybercrime: a social network analysis” Benoit Dupont N/A
“A glimpse into the future of malware and how to protect yourself against it” Ronald Prins N/A
Panel 1: Cyber Forensic Readiness at Company/Organisation level Jaya Baloo , Ulrich Seldeslachts , Alain Desausoi , Luc Beirens How to ensure that your organisation is prepared when a problem occurs (monitoring, striking back, ...
Workshop 1: Cases presentation Lodewijk van Zwieten , Alexandra Comolli Presentation in detail of a selection of cybercrime cases, and the steps followed to come ...
“Infect, Scrape & Exfiltrate” Rik Ferguson N/A
Panel 2: Hit by a Cyberattack: Lessons Learned Ann Mennens , Fabrice Clément , Robert Clement , Miguel De Bruycker , Geert Schoorens Different steps of dealing with the attack, Do’s and Don’ts, communication, evidence preservation,…
Workshop 2: The Challenge of Attribution Koen Hermans , Rainer Franosch Identifying perpetrators of attacks – The Blackshades case Joint presentation