2021 Agenda

Agenda

0815-0900

Registration

0900-0905

Welcome

0905-0935

KEYNOTE

Chris Krebs

0935-1005

Hack and Leak for hire: India’s cyber mercenary marketplace

Chris Bing, Raphael Satter

1005-1035

The Whole Truth and Nothing but the Truth: Intrusion Truth and the Tradecraft of Chinese Cyber Threat Activity Tracking

Mei Danowski

1035-1050

CoffEE BREAK

1050-1120

The Iranian Evolution: Observed Changes in Iranian Computer Network Operations

James Elliott, Simeon Kakpovi, Ned Moran

1120-1150

Planes, Ships, and Satellites: Cyber in Warfare

Daniel Moore

1150-1220

GHOSTWRITER

Ben Read, Gabby Roncone

1220-1330

LUNCH provided by RISKIQ and RECORDED FUTURE

1330-1440

LIGHTNING ROUND

Cyberattacks: Is the Juice Worth the Squeeze?

Dmitri Alperovitch

Influence Operations: What is known and what isn’t?

Alicia Wanless

Disruptions in Afghanistan Internet Infrastructure After Taliban Takeover

Allan Liska, Supriya Mazumdar, Nicole Perlroth

Disrupting Cyber Adversaries: Facebook’s Approach to Deterrence

David Agranovich, Mike Dvilyanski

Questioning Election Security

Shane Huntley

Surfacing from the Underbrush: Machete Pivots to Intrusion-Enabled Information Operations

Blake Djavaherian

Their Own Little War: Iran Adopts Disruptive Ransomware

Alex Orleans, Katie Blankenship

1440-1510

Chinese IO Commercial Firm Attribution

Zeshan Aziz

1510-1525

Snack Break Provided by Google

1525-1555

Strategic web compromises in the Middle East with a pinch of Candiru

Matthieu Faou

1555-1625

Attributing Digital Covert Action: The Curious Case of WikiSaudiLeaks

Simin Kargar

1625-1655

The Last Remaining Cover for Action

Juan Andres Guerrero-Saade

1655-1700

CLOSING REMARKS

1700-1900

Reception sponsored by aesir

 

All Times EST