CopenhagenCyberCrime 2019 May 29, 2019 to May 29, 2019, Copenhagen, Denmark

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cybersecurity in 2019: Improving your Posture Dimple Ahluwalia Dimple Ahluwalia will share her experience on how her team helps to secure IBM. She ...
I PWN thee, I PWN thee not! Jayson E. Street Attackers love it when defenses fail. Implementing defenses without properly understanding the risks and threats ...
Imitation Is the Sincerest Form of Flattery Kris Mcconkey Imitation is the sincerest form of flattery. Having seen the documented success of campaigns against ...
Android Banking Threats: Simple vs Sophisticated Lukas Stefanko With mobile devices increasingly entwined in our everyday lives, countless services, tools and products are ...
Oops! It Happened Again! Eddy Willems The problems malware causes for the ecosystem started 3 decades ago. Although some viruses are ...
DNSpionage Campaign Targets Middle East Paul Rascagneres Cisco Talos identified an espionage campaign that mainly targeted Middle East that we named "DNSpionage". ...
SIM Swapping & Phone Hijacking: Attacks & Consequences Per Thorsheim SIM swapping attacks are on the rise in the US and many other countries, with ...
Cybersecurity as an Environmental Variable Jeppe P. Bjerre Electronic products today have to live up to a long series of requirements that manufacturers ...
Inside MageCart Credit Card Breaches & Criminal Ecosystem Vitali Kremez Profiling the MageCart Behind the Front Page Credit Card Breaches and the Criminal Underworld that ...
Five Most Significant Challenges in Threat Hunting and How to Address Them Ian Qvist Threat hunting is generally described as a discipline that involves iteratively looking for threats that ...
Playing with LDAP as C2 and Payload Delivery Leszek Miś During the APT campaign or red teaming activities, there is a scenario where two endpoint ...
The Mysterious Case of the Ukrainian Bagsu Benoît Kruse Bagsu is a Trojan banker that has been around for approx. 4 years without getting ...
Utilizing YARA to Find Evolving Malware Jay Rosenberg YARA rules are often made specifically for a certain variant of a threat using strings ...
Yes, We Can Get into Your Company. Now What? Tom Wiele As attacks are becoming increasingly targeted and decrease in cost over time, many organizations are ...
GDPR – One Year After Cristina A. Gulisano The General Data Protection Regulation (GDPR) has been applied for a year now. What's the ...
CSIT – A Disruptive Model for Open Innovation Philip Mills The Centre for Secure Information Technologies (CSIT) is the UK’s Innovation and Knowledge Centre for ...
How Easy iI Is to Steal Money from Almost any Company… Chris Kaastrup Impersonation fraud (known as BEC fraud) is one of the fastest growing financial threats in ...