Cybersecurity conference CyberChess 2019
CERT.LV and ISACA Latvia chapter in collaboration with LMT and dots. organized an international cybersecurity conference CyberChess 2019.
Venue: Radisson Blu Hotel Latvija, Elizabetes Street 55, Riga.
Language: Main conference language was English, some presentations in parallel sessions were in Latvian.
Facebook picture gallery
Workshops 2nd Oct. | ||||||
08:00 - 09:00 | Registration for Workshops | |||||
Room1 (Alfa) |
Room2 (Sigma1) |
Room3 (Epsilon) |
Room4 (Gamma) |
Room5 (Ksi) |
Lobby | |
9:00 - 10:00 | 9:00 - 13:00 |
9:00 - 12:30 |
9:00 - 10:00 (Group I) |
2nd - 3rd Oct. every 1h |
2nd Oct. 10:00 - 3rd Oct. 15:00 |
|
Exercise Mercury and Exercise Neptune: Social engineering in action - Kieren N. Lowell, Head of TalTech CERT |
Īsa pamācība laušanā jeb tīmekļa lietotņu izplatītākie drošības apdraudējumi - Rūdolfs Augustovskis, CEH, OSCP, IT drošības risinājumu konsultants, dots. | Cyber Deception: Applying active defense measures to hunt attackers with MazeRunner - Dekel Braunstein, Cymmetria |
Evaluating the human factor of cybersecurity through active engagement using a Dynamic e-learning Risk Assessment Platform (DelRAP) - Cybexer Technologies |
PwC Escape room (multiple sessions) |
CyberChess CTF (Capture the flag) challenge |
|
10:15 - 10:45 |
Coffee Break 30 min |
|||||
10:45 - 13:05 | 10:45 - 11:45 (Group II) |
|||||
Profiling and People based skills for Social Engineering Physical Engagements - Jenny Radcliffe, *The People Hacker*, Founder & Director of Social Engineering | (continues) | (continues) | Evaluating the human factor of cybersecurity through active engagement using a Dynamic e-learning Risk Assessment Platform (DelRAP) - Cybexer Technologies | continued throughout the conference |
continued throughout the conference |
Conference DAY1 (2nd Oct.) | ||||||
13:00 - 14:00 | Registration | |||||
Plenary session (Omega) | ||||||
14:00 - 14:15 | Opening speeches: H.E. President of Latvia Egils Levits (VIDEO) | |||||
14:15 - 14:30 | Opening speeches: Minister of Defence of the Republic of Latvia Artis Pabriks (VIDEO) | |||||
14:30 - 14:40 |
Conference welcome: |
|||||
14:40 - 15:30 | "Unicorns, Bigfoot, Threat Intelligence, Information Sharing and Other Myths" (PDF) - Patrick C. Miller, Managing Partner, Archer International (VIDEO) |
|||||
15:30 - 16:00 |
Coffee Break 30 min |
|||||
New technologies, new challenges (Omega) | Now you see me, now you don't: Monitoring and defence (Alfa) | Eyes wide open: Cyber awareness and human evolution (Beta) | ||||
16:00 - 16:30 | 5G – Cybersecurity (RE)evolution (PDF) - Egons Bušs, Security Director, LMT (VIDEO) |
Core Infrastructure Protection from Distributed Denial-of-Service (DDoS) Attacks (PDF) - Uldis Libietis, Chief Information Security Officer, Tet (VIDEO) |
Security awareness & escape rooms – behind the scenes of “Hack The Hacker" (PDF) - Karlsson Mathias, Security Engineer, SWITCH (VIDEO) |
|||
16:35 - 17:05 | The 10 Immutable Security Facts for 2019 (PDF) - Carl Herberger, Vice President, Radware (VIDEO) |
Hunting the Bad Guys: Approaches to Threat Detection (PDF) - Peter Glock, Cymmetria (VIDEO) |
How can students develop real Cybersecurity skills? (PDF) - |
|||
17:10 - 17:40 | Secure Online Identification of Natural Persons - Dr. Ulf Löckmann, Federal Office for Information Security (BSI) (no live stream) |
Advanced Neural Network-Based Technique for Android Smartphone Applications Classification (PDF) - Dr. Roman Graf, OSCP, Austrian Institute of Technology GmbH (VIDEO) |
STRIKE (Short-Term Real Intrusion and Hacking Exercise) (PDF) - Edgars Šacs, Board Member, PricewaterhouseCoopers Information Technologies Services (VIDEO) |
|||
17:45 | End of Day 1 | |||||
17:45 - 20:00 | Social event, Main Lobby (dinner welcome speech) |
Conference DAY2 (3rd Oct.) | ||||||
08:00 - 09:00 | Registration | |||||
Plenary session (Omega) | ||||||
09:00 - 09:10 | Day 2 opening remarks | |||||
09:10 - 10:00 | Adventures in Social Engineering - Jenny Radcliffe, *The People Hacker*, Founder & Director of Social Engineering (no live stream) | |||||
10:00 - 10:30 | Your internet is down? It's cyberwarfare, stupid - Shira Shamban, Head of Cloud Security Research, Check Point (VIDEO) | |||||
10:30 - 10:50 |
Coffee Break 20 min |
|||||
Legal, policy, strategy (Omega) | All your base are belong to us: Attacks on cyber infrastructure (Alfa) | Dispersing the shadow of the dark side: Misuse of cyber space (Beta) | ||||
10:50 - 11:20 | Knowledge as a Weapon: Oversight and Review of Cyber Espionage and Cyber Weapons Development - Ann Valjataga, NATO CCD CoE (no live stream) |
Web application and cloud security: Learning through mistakes (PDF) - Timo Lohenoja, System Engineer, FORTINET (VIDEO) |
||||
11:25 - 11:55 | European Cybercrime Centre (EC3): tackling cybercrime in the 21st century - Alvaro Azofra-Martinez, Cyber Intelligence, European Cybercrime Centre (EC3), Europol (no live stream) |
Cik kiberdrošas ir Latvijas pašvaldības? Pētījuma rezultāti (PDF) - Kaspars Iesalnieks, IT konsultāciju vadītājs, KPMG Baltics (VIDEO) |
Ursnif campaign with the macro-enabled documents (PDF) - Ladislav Bačo, Lifars (VIDEO) |
|||
12:00 - 12:30 | Par ko publiski nestāsta - uzbrukumu sekas Latvijā (PDF) - Kaspars Līcis, IT drošības risinājumu grupas vadītājs, dots. (VIDEO) |
All the Animals are sad in the Zoo (PDF) - Mg. sc. comp. Kirils Solovjovs, Lead Researcher, Possible Security (VIDEO) |
Reputation, finance and capability are at stake: the dark side of cybersecurity (PDF) - Anna Vladimirova-Krjukova, COBALT, ISACA and IAPP member (VIDEO) |
|||
12:30 - 13:30 |
Lunch break 1h |
|||||
These are not the droids you are looking for - Nation state actors, deception and response (Omega) | Towards singularity: Advances in technology and science (Alfa) | Buckle your seatbelt Dorothy - Open source Intelligence and techniques (Beta) | ||||
13:30 - 14:00 | Adversary deception cases - Dekel Braunstein, Cymmetria (VIDEO) | Machine code instrumentation for block runtime statistical analysis and prediction (PDF) - Eduards Vāvere (VIDEO) |
Exercise Mercury and Exercise Neptune: Social engineering in action (link) - Kieren N. Lovell, Head of TalTech CERT (VIDEO) |
|||
14:05 - 14:35 | When Data Eats SCADA (PDF) - Patrick C. Miller, Managing Partner, Archer International (VIDEO) |
Everybody DoH now! -
|
Stop chasing security (PDF) - Robert MacMillan, Head of Cyber Security, Virgin Mobile in the United Arab Emirates (VIDEO) |
|||
14:40 - 15:10 | Everyone is hackable. How long will it take you to notice? - Shira Shamban, Head of Cloud Security Research, Check Point (VIDEO) |
WireGuard: Svaiga vēsma IP tīkla tunelēšanas protokolu saimē (PDF) - Ivars Šūba, Latvijas Banka (VIDEO) | Unconscious Human Behaviour and Social Engineering: Bridging a Gap between Psychology and Information Security (PDF) - Mischa Coster, Chief Psychology Officer, Grey Matters (VIDEO) |
|||
15:10 - 15:30 |
Coffee Break 20 min |
|||||
Plenary session (Omega) | ||||||
15:30 - 15:50 | 5G launch. Myths and demyths (PDF) - Aigars Benders, Technical Director, LMT (VIDEO) | |||||
15:50 - 16:30 | Hidden Face of the Darknet (PDF) - Carl Herberger, Vice President, Radware (VIDEO) | |||||
Announcement of the CTF winners (VIDEO) | ||||||
16:50 - 17:00 | Conference closing remarks | |||||
End of Day 2 |
The conference is co-financed by European Union within CEF project “Improving Cyber Security Capacities in Latvia” (INEA/CEF/ICT/A2017/1528784).