Skip to main content

CCCC 2019 Programme

08:00-09:00

Registration and Breakfast


09:00-09:05

Welcome and Practical Information
Daniel Shepherd
Agile Response Technologies


09:05-09:15

Welcome Address
Lars Frelle-Petersen
DI Digital


09:15-09:45

Cybersecurity in 2019: Improving your Posture
Dimple Ahluwalia
IBM


09:45-10:15

I PWN Thee, I PWN Thee not!
Jayson E. Street
SphereNY

10:15-10:45

Machine Learning/AI – Myth vs Reality?
Rik Ferguson
Trend Micro


10:45-11:05

Coffee Break

Morning Tracks

APTs
(Ambition 17+19)

Mobile Threats
(Ambition 13+15)

Cybersecurity – Past, Present and Future
(Salen)

11:05-11:45

Imitation Is the Sincerest Form of Flattery (M)
Kris McConkey
PwC

Android Banking Threats: Simple vs Sophisticated (M)
Lukas Stefanko
ESET

Oops! It Happened Again! (L)
Righard Zwienenberg, ESET
Eddy Willems, G Data Software


11:45-12:25

DNSpionage Campaign Targets Middle East (M)
Paul Rascagnères
Cisco Talos

SIM Swapping & Phone Hijacking: Attacks & Consequences (NT)
Per Thorsheim
Nordic Choice Hotels

Cybersecurity as an Environmental Variable (L)
Jeppe P. Bjerre
FORCE Technology


12:25-13:30

Lunch

Afternoon Tracks

Financial Fraud
(Ambition 13+15)

Threat Hunting
(Salen)

Redteaming & Attack Prevention
(Ambition 17+19)

13:30-14:10

Inside MageCart Credit Card Breaches & Criminal Ecosystem (M)
Vitali Kremez
Independent Researcher

Five Most Significant Challenges in Threat Hunting (M)
Ian Qvist
Agile Response Technologies

Playing with LDAP as C2 and Payload Delivery (M)
Leszek Mis
Defensive Security


14:10-14:50

The Mysterious Case of the Ukrainian Bagsu (M/H)
Peter Kruse, Benoit Ancel
CSIS Seurity Group

Utilizing YARA to Find Evolving Malware (M/H)
Jay Rosenberg
Kaspersky Lab

Yes, We Can Get into Your Company. Now what?  (L)
Tom Van de Wiele
F-Secure


14:50-15:10

Coffee Break


15:10-15:40

GDPR — One Year After
Cristina Gulisano
Datatilsynet (The Danish Data Protection Agency)

15:40-16:10

CSIT – A Disruptive Model for Open Innovation
Philip Mills
Centre for Secure Information Technology (CSIT), Queens University Belfast


16:10-16:40

How Easy It Is to Steal Money from Almost Any Company… 
Jan Kaastrup, CSIS Security Group
Chris Parker, Royal Bank of Scotland


16:40-17:30

Networking Session



Track sessions – indication of technical level of the talk in presentation titles:
(NT) Non-Technical
(L) Low
(M) Medium
(M/H) Medium to high
(H) High

 

        CSIS Security Group A/S, Vestergade 2B, 4th floor, 1456 Copenhagen