0815-0900
Registration
0900-0905
Welcome
0905-0935
KEYNOTE
Chris Krebs
0935-1005
Hack and Leak for hire: India’s cyber mercenary marketplace
1005-1035
The Whole Truth and Nothing but the Truth: Intrusion Truth and the Tradecraft of Chinese Cyber Threat Activity Tracking
1035-1050
CoffEE BREAK
1050-1120
The Iranian Evolution: Observed Changes in Iranian Computer Network Operations
James Elliott, Simeon Kakpovi, Ned Moran
1120-1150
Planes, Ships, and Satellites: Cyber in Warfare
1150-1220
GHOSTWRITER
Ben Read, Gabby Roncone
1220-1330
LUNCH provided by RISKIQ and RECORDED FUTURE
1330-1440
LIGHTNING ROUND
Cyberattacks: Is the Juice Worth the Squeeze?
Dmitri Alperovitch
Influence Operations: What is known and what isn’t?
Disruptions in Afghanistan Internet Infrastructure After Taliban Takeover
Allan Liska, Supriya Mazumdar, Nicole Perlroth
Disrupting Cyber Adversaries: Facebook’s Approach to Deterrence
David Agranovich, Mike Dvilyanski
Questioning Election Security
Surfacing from the Underbrush: Machete Pivots to Intrusion-Enabled Information Operations
Their Own Little War: Iran Adopts Disruptive Ransomware
Alex Orleans, Katie Blankenship
1440-1510
Chinese IO Commercial Firm Attribution
1510-1525
Snack Break Provided by Google
1525-1555
Strategic web compromises in the Middle East with a pinch of Candiru
1555-1625
Attributing Digital Covert Action: The Curious Case of WikiSaudiLeaks
1625-1655
The Last Remaining Cover for Action
Juan Andres Guerrero-Saade
1655-1700
CLOSING REMARKS
1700-1900