SuitsAndSpooks 2015 Feb. 4, 2015 to Feb. 5, 2015, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Address Jeffrey Carr , Mike Lennon Michael Lennon is the founding publisher and Managing Editor of SecurityWeek. For more than 10 ...
WORKSHOP: Connecting More Dots: Breakfast Workshop with Carmen Medina Carmen Medina Carmen Medina spent her career at CIA making analysts better at their work. This 90 ...
PANEL: Restoring Trust One Handshake At A Time (Post-Snowden) Freddy Dezeure , Jeffrey B. Ritter , Dave Piscatello This panel of internationally-known experts will share their experiences in both the breakdown of trust ...
The war in Ukraine: It is not just physical. Cyber war, its methods and impact Ivan Ivanovich Leading Ukrainian forensics and cyber crime expert to share the war that not everyone is ...
Attacking a Network Defended with Continuous Monitoring Ron Gula As the world moves towards continuous network monitoring, where all of our systems are patched, ...
PANEL: An Inside Look At BAE Systems Global Threat Landscape Doug Bruns , Daniel Harrison , Sara Jones N/A
OMG Cyber! Why Hype Makes For Bad Policy Robert m. Lee Undefeatable APTs, advanced integrated cloud based zero-day proof shiny boxes, governments waging cyber war…OMG Cyber! ...
A Cyber War Taboo? The Evolution of Norms for Cyber Warfare Brian M. Mazanec This project examines how constraining norms for cyber warfare are developing and will develop in ...
Russia: How Cyber Operations are a New Form of “Active Measure” Paul M. Joyal Russia: How Cyber Operations are a New Form of “Active Measure”
Big Pinocchio Daniel Bilar A while ago I contacted my favorite living Constitutional lawyer and an under-the-radar AI researcher. ...
PANEL: The Art and Practice of Cyber Intelligence – Current State, Shortfalls, and the Way Ahead Cesar Lopez , Adam Zoller , Eric Jaw , Hilary Macmillan , Christopher Reilley , Brad Saul Despite the tremendous investments made in cyber and threat intelligence by government and commercial entities, ...
Poisoning the Well: Evolution of Psychological Warfare Juan Andrés Guerrero-saade How the PsyOps Industry is Diffusing the Democratizing Power of Social Networks Modern psychological warfare ...
Security Operations: Moving to a Narrative-Driven Model Josh Goldfarb The current security operations model is an alert-driven one. Alerts contain a snapshot of a ...
The Evolution of the Insider Threat: Thousands of Years in the Making Michael Crouse Today, 53% of organizations have experienced an insider cybercrime incident, up significantly from 41% in ...
WORKSHOP: Transitioning from Government to a Cyber Security Startup Rick Holland , Barbara Hunt , Alan Wade This 45 minute breakfast workshop will be taught by a panel of intelligence agency veterans ...
CERT-EU’s Continuing Encounters with KE3CHANG/VIXEN PANDA Freddy Dezeure Freddy Dezeure, the director of CERT-EU, will report on the ongoing activities of the threat ...
How Digital Technology is Impacting Law Enforcement in Urban Environments Zachary Tumin As criminals and criminal organizations take advantage of new digital technologies like social media and ...
PANEL: Cryptocurrencies – What are the Challenges that Banks Face? Wesley Bull , Judith Grabski , Brian Hoffman , Edward W. Marshall This panel will discuss some of the challenges that international banks must address with the ...
Iran’s Cyber Warfare Machine: Dissecting Operation Pistachio Harvest Anthony Bargar , Scott Fitzpatrick Iran’s cyber warfare capabilities stretch across a broad, deep and diverse ecosystem of assets. Some ...
PANEL: Securing the Supply Chain: Do You Know Where Your Code Came From? Michael Sulmeyer , Michael Hewitt , Steve Cooper , John Scott , Bill Shleton N/A
Linguistic Attribution: Identifying the Native Language of the Sony Hackers Shlomo Argamon N/A Fast track presentation on using linguistic attribution to identify the native language of the ...
WORKSHOP: China’s People’s Liberation Army Information Warfare Infrastructure Mark Stokes Attendees at this workshop will learn how the PLA is integrating Computer Network Operations into ...
Individualization of Warfare: The Rise of the Individual in 21st Century Conflict Roderick Jones N/A
PANEL: IOCs and Attribution Ryan Naraine , Kurt Baumgartner , Brian Bartholomew , John Hultquist N/A
The Global Targeting of Corporations Using Social Media and SDR's. Dale Wooden The Global Targeting of Corporations and their Employees Using Social Media and SDR's. One of ...
The End of Big Cyber: The Coming Collapse and the Emergence of Mature Cyber Security Adam Firestone Programmatically speaking, we are living through cybersecurity’s adolescence. That is to say, in response to ...
PANEL: Sony and the DPRK: A Question of Attribution Jeffrey Carr , Marc Rogers , Danny Yadron , Matthew Burton , Roel Schouwenberger , Kurt Stammberger United States authorities say they’re certain that North Korea is behind the attack on Sony, ...