CCCC 2019 Programme
08:00-09:00
Registration and Breakfast
09:00-09:05
Welcome and Practical Information
Daniel Shepherd
Agile Response Technologies
09:05-09:15
Welcome Address
Lars Frelle-Petersen
DI Digital
09:15-09:45
Cybersecurity in 2019: Improving your Posture
Dimple Ahluwalia
IBM
09:45-10:15
Jayson E. Street
SphereNY
10:15-10:45
Machine Learning/AI – Myth vs Reality?
Rik Ferguson
Trend Micro
10:45-11:05
Coffee Break
Morning Tracks
APTs
(Ambition 17+19)
(Ambition 17+19)
Mobile Threats
(Ambition 13+15)
Cybersecurity – Past, Present and Future
(Salen)
11:05-11:45
Imitation Is the Sincerest Form of Flattery (M)
Kris McConkey
PwC
Android Banking Threats: Simple vs Sophisticated (M)
Lukas Stefanko
ESET
Oops! It Happened Again! (L)
Righard Zwienenberg, ESET
Eddy Willems, G Data Software
11:45-12:25
DNSpionage Campaign Targets Middle East (M)
Paul Rascagnères
Cisco Talos
SIM Swapping & Phone Hijacking: Attacks & Consequences (NT)
Per Thorsheim
Nordic Choice Hotels
Cybersecurity as an Environmental Variable (L)
Jeppe P. Bjerre
FORCE Technology
12:25-13:30
Lunch
Afternoon Tracks
Financial Fraud
(Ambition 13+15)
Threat Hunting
(Salen)
Redteaming & Attack Prevention
(Ambition 17+19)
13:30-14:10
Inside MageCart Credit Card Breaches & Criminal Ecosystem (M)
Vitali Kremez
Independent Researcher
Five Most Significant Challenges in Threat Hunting (M)
Ian Qvist
Agile Response Technologies
Playing with LDAP as C2 and Payload Delivery (M)
Leszek Mis
Defensive Security
14:10-14:50
The Mysterious Case of the Ukrainian Bagsu (M/H)
Peter Kruse, Benoit Ancel
CSIS Seurity Group
Utilizing YARA to Find Evolving Malware (M/H)
Jay Rosenberg
Kaspersky Lab
Yes, We Can Get into Your Company. Now what? (L)
Tom Van de Wiele
F-Secure
14:50-15:10
Coffee Break
15:10-15:40
Datatilsynet (The Danish Data Protection Agency)
15:40-16:10
CSIT – A Disruptive Model for Open Innovation
Philip Mills
Centre for Secure Information Technology (CSIT), Queens University Belfast
16:10-16:40
How Easy It Is to Steal Money from Almost Any Company…
Jan Kaastrup, CSIS Security Group
Chris Parker, Royal Bank of Scotland
16:40-17:30
Networking Session
Track sessions – indication of technical level of the talk in presentation titles:
(NT) Non-Technical
(L) Low
(M) Medium
(M/H) Medium to high
(H) High