Pieteikšanās konferencei "Kiberšahs 2019"
2019.gada 2.-3.oktobrī CERT.LV un ISACA Latvijas nodaļa sadarbībā ar LMT un dots. rīko starptautisku kiberdrošības jautājumiem veltītu konferenci "Kiberšahs 2019".
Datums un vieta: 2019. gada 2.-3. oktobris Radisson Blu Hotel Latvija, Elizabetes iela 55, Rīga.
Mērķauditorija: Valsts un pašvaldību iestāžu atbildīgās personas par IT drošību, IT drošības speciālisti, informācijas sistēmu auditori, IT drošības entuziasti, pētnieki un citi interesenti.
Darba valoda: Pamata darba valoda - angļu. Paralēlsesijas notiks latviešu un angļu valodā.
Pieteikšanās: līdz 19.septembrim, aizpildot elektronisko reģistrācijas formu. Dalība pasākumā ir bez maksas.
Pasākuma dalībnieki saņems dalības apliecinājumu.
Ņemot vērā pasākuma ierobežoto vietu skaitu, dalība konferencē un darbnīcās tiks apstiprināta, priekšroku dodot valsts un pašvaldību iestāžu darbiniekiem un ISACA Latvija biedriem.
Pasākumu būs iespējams vērot arī tiešsaistē. Apliecinājumi par tiešsaistes vērošanu netiks izsniegti.
Workshops 2nd Oct. | ||||||
08:00 - 09:00 | Registration for Workshops | |||||
Room1 (Alfa) |
Room2 (Sigma1) |
Room3 (Epsilon) |
Room4 (Gamma) |
Room5 (Ksi) |
Lobby | |
9:00 - 10:00 | 9:00 - 13:00 |
9:00 - 12:30 |
9:00 - 10:00 (Group I) |
2nd - 3rd Oct. every 1h |
2nd Oct. 10:00 - 3rd Oct. 15:00 |
|
Exercise Mercury and Exercise Neptune: Social engineering in action - Kieren N. Lowell, Head of TalTech CERT |
Īsa pamācība laušanā jeb tīmekļa lietotņu izplatītākie drošības apdraudējumi - Rūdolfs Augustovskis, CEH, OSCP, IT drošības risinājumu konsultants, dots. | Cyber Deception: Applying active defense measures to hunt attackers with MazeRunner - Dekel Braunstein, Cymmetria |
Evaluating the human factor of cybersecurity through active engagement using a Dynamic e-learning Risk Assessment Platform (DelRAP) - Cybexer Technologies |
PwC Escape room (multiple sessions) |
CyberChess CTF (Capture the flag) challenge |
|
10:15 - 10:45 |
Coffee Break 30 min |
|||||
10:45 - 13:05 | 10:45 - 11:45 (Group II) |
|||||
Profiling and People based skills for Social Engineering Physical Engagements - Jenny Radcliffe, *The People Hacker*, Founder & Director of Social Engineering | (continues) | (continues) | Evaluating the human factor of cybersecurity through active engagement using a Dynamic e-learning Risk Assessment Platform (DelRAP) - Cybexer Technologies | continued throughout the conference |
continued throughout the conference |
Conference DAY1 (2nd Oct.) | ||||||
13:00 - 14:00 | Registration | |||||
Plenary session (Omega) | ||||||
14:00 - 14:15 | Opening speeches: H.E. President of Latvia Egils Levits (VIDEO) | |||||
14:15 - 14:30 | Opening speeches: Minister of Defence of the Republic of Latvia Artis Pabriks (VIDEO) | |||||
14:30 - 14:40 | Conference welcome: Sintija Deruma, President of ISACA Latvia Chapter, Baiba Kaškina, CERT.LV General Manager |
|||||
14:40 - 15:30 | Unicorns, Bigfoot, Threat Intelligence, Information Sharing and Other Myths - Patrick C. Miller, Managing Partner, Archer International |
|||||
15:30 - 16:00 |
Coffee Break 30 min |
|||||
New technologies, new challenges (Omega) | Now you see me, now you don't: Monitoring and defence (Alfa) | Eyes wide open: Cyber awareness and human evolution (Beta) | ||||
16:00 - 16:30 | 5G – Cybersecurity (RE)evolution - Egons Bušs, Security Director, LMT | Core Infrastructure Protection from Distributed Denial-of-Service (DDoS) Attacks - Uldis Libietis, Chief Information Security Officer, Tet | Security awareness & escape rooms – behind the scenes of “Hack The Hacker" - Karlsson Mathias, Security Engineer, SWITCH | |||
16:35 - 17:05 | The 10 Immutable Security Facts for 2019 - Carl Herberger, Vice President, Radware | Hunting the Bad Guys: Approaches to Threat Detection - Peter Glock, Cymmetria | How can students develop real Cybersecurity skills? - Jelena Revzina, IT Security Engineer, iPro | |||
17:10 - 17:40 | Secure Online Identification of Natural Persons - Dr. Ulf Löckmann, Federal Office for Information Security (BSI) | Advanced Neural Network-Based Technique for Android Smartphone Applications Classification - Dr. Roman Graf, OSCP, Austrian Institute of Technology GmbH | STRIKE (Short-Term Real Intrusion and Hacking Exercise) - Edgars Šacs, Board Member, PricewaterhouseCoopers Information Technologies Services | |||
17:45 | End of Day 1 | |||||
17:45 - 20:00 | Social event, Main Lobby (dinner welcome speech) |
Conference DAY2 (3rd Oct.) | ||||||
08:00 - 09:00 | Registration | |||||
Plenary session (Omega) | ||||||
09:00 - 09:10 | Day 2 opening remarks | |||||
09:10 - 10:00 | Adventures in Social Engineering - Jenny Radcliffe, *The People Hacker*, Founder & Director of Social Engineering (no live stream) | |||||
10:00 - 10:30 | Your internet is down? It's cyberwarfare, stupid - Shira Shamban, Head of Cloud Security Research, Check Point | |||||
10:30 - 10:50 |
Coffee Break 20 min |
|||||
Legal, policy, strategy (Omega) | All your base are belong to us: Attacks on cyber infrastructure (Alfa) | Dispersing the shadow of the dark side: Misuse of cyber space (Beta) | ||||
10:50 - 11:20 | Knowledge as a Weapon: Oversight and Review of Cyber Espionage and Cyber Weapons Development - Ann Valjataga, NATO CCD CoE | Web application and cloud security: Learning through mistakes - Timo Lohenoja, System Engineer, FORTINET | ||||
11:25 - 11:55 | European Cybercrime Centre (EC3): tackling cybercrime in the 21st century - Alvaro Azofra-Martinez, Cyber Intelligence, European Cybercrime Centre (EC3), Europol (no live stream) | Cik kiberdrošas ir Latvijas pašvaldības? Pētījuma rezultāti - Kaspars Iesalnieks, IT konsultāciju vadītājs, KPMG Baltics | Ursnif campaign with the macro-enabled documents - Ladislav Bačo, Lifars | |||
12:00 - 12:30 | Par ko publiski nestāsta - uzbrukumu sekas Latvijā - Kaspars Līcis, IT drošības risinājumu grupas vadītājs, dots. | All the Animals are sad in the Zoo - Mg. sc. comp. Kirils Solovjovs, Lead Researcher, Possible Security | Reputation, finance and capability are at stake: the dark side of cybersecurity - Anna Vladimirova-Krjukova, COBALT, ISACA and IAPP member | |||
12:30 - 13:30 |
Lunch break 1h |
|||||
These are not the droids you are looking for - Nation state actors, deception and response (Omega) | Towards singularity: Advances in technology and science (Alfa) | Buckle your seatbelt Dorothy - Open source Intelligence and techniques (Beta) | ||||
13:30 - 14:00 | Adversary deception cases - Dekel Braunstein, Cymmetria | Machine code instrumentation for block runtime statistical analysis and prediction - Eduards Vāvere | Exercise Mercury and Exercise Neptune: Social engineering in action - Kieren N. Lovell, Head of TalTech CERT | |||
14:05 - 14:35 | When Data Eats SCADA - Patrick C. Miller, Managing Partner, Archer International |
Everybody DoH now! - Ivo Ķutts, CTO, NIC.LV
|
Stop chasing security - Robert MacMillan, Head of Cyber Security, Virgin Mobile in the United Arab Emirates | |||
14:40 - 15:10 | Everyone is hackable. How long will it take you to notice? - Shira Shamban, Head of Cloud Security Research, Check Point | WireGuard: Svaiga vēsma IP tīkla tunelēšanas protokolu saimē - Ivars Šūba, Latvijas Banka | Unconscious Human Behaviour and Social Engineering: Bridging a Gap between Psychology and Information Security - Mischa Coster, Chief Psychology Officer, Grey Matters | |||
15:10 - 15:30 |
Coffee Break 20 min |
|||||
Plenary session (Omega) | ||||||
15:30 - 15:50 | 5G launch. Myths and demyths - Aigars Benders, Technical Director, LMT | |||||
15:50 - 16:30 | Hidden Face of the Darknet - Carl Herberger, Vice President, Radware | |||||
Announcement of the CTF winners | ||||||
16:50 - 17:00 | Conference closing remarks | |||||
End of Day 2 |
Konference daļēji tiek līdzfinansēta no Eiropas Savienības CEF projekta “Improving Cyber Security Capacities in Latvia” (INEA/CEF/ICT/A2017/1528784).