Registration 0830-0900
Briefings 0900-1700
Drinks 1700-1800
WElcome
John Hultquist, CYBERWARCON
KeyNote - INFOSEC 1930
Thomas Rid, Johns Hopkins University
Bears in the Lines: Russian Critical Infrastructure Espionage in the Face of U.S. Electric Grid Resilience
Chris Sistrunk and Alex Orleans, FireEye
“False Leaks”: A Network Lens on Cyber-enabled Information Operations
Camille François, Graphika
An Analysis of Micro and Macro Cyber Attacks in the Ongoing War in Yemen
Allan Liska, Winnona DeSombre, CW Walker, and Greg Lesnewich, Recorded Future
Are US Cyber Deterrence Operations Suppressing or Inciting Attacks?
Jason Healey and Neil Jenkins, Columbia University and Cyber Threat Alliance
DISINFORMATION OR DEBATE? FINDING SIGNAL AMID POLITICAL NOISE
Olga Belogolova and Madelyn Wilson, Facebook
LIGHTNING TALK - TEMP.Veles: On the trail of TRITON
Nathan Brubaker and Mike Matonis, FireEye
LIGHTNING TALK - Houthi Information Operations
Dan O’Keefe, Johns Hopkins University
lightning talk - BARELY Whispering
Kurt Baumgartner, Kaspersky
LIGHTNING TALK - Outsourcing Cyberwar
Cristiana Brafman Kittner and Kimberly Goody, FireEye
LIGHTNING TaLK - Iran’s Decade of Soft War: Dissidents, Trolls, and Khamenei
Simin Kargar, Harvard University
LIGHTNING TaLK - Behind the Next Destructive Attack
Adam Meyers, Crowdstrike
Unrestricted Warfare on Campus: Chinese Information Operations and American Higher Education
Lauren Cooper, Carnegie Mellon University
Revisiting Known Perps: Behavioral Profiling for Continuous Monitoring of Threat Actors
Juan Andrés Guerrero-Saade, Chronicle
Influencer Vaccine: Identifying Information Operations Infrastructure Using Cyber Threat Intelligence
Kyle Ehmke, ThreatConnect
GreyEnergy: Beyond BlackEnergy and NotPetya
Robert Lipovsky and Anton Cherepanov, ESET
Closing Remarks
Toni Gidwani and Jennifer Weedon, ThreatConnect and Facebook