☰

Pieteikšanās konferencei "Kiberšahs 2019"

2019.gada 2.-3.oktobrī CERT.LV un ISACA Latvijas nodaļa sadarbībā ar LMT un dots. rīko starptautisku kiberdrošības jautājumiem veltītu konferenci "Kiberšahs 2019".

Datums un vieta: 2019. gada 2.-3. oktobris Radisson Blu Hotel Latvija, Elizabetes iela 55, Rīga.

Mērķauditorija: Valsts un pašvaldību iestāžu atbildīgās personas par IT drošību, IT drošības speciālisti, informācijas sistēmu auditori, IT drošības entuziasti, pētnieki un citi interesenti.

Darba valoda: Pamata darba valoda - angļu. Paralēlsesijas notiks latviešu un angļu valodā.

Pieteikšanās: līdz 19.septembrim, aizpildot elektronisko reģistrācijas formu. Dalība pasākumā ir bez maksas.
Pasākuma dalībnieki saņems dalības apliecinājumu.

Ņemot vērā pasākuma ierobežoto vietu skaitu, dalība konferencē un darbnīcās tiks apstiprināta, priekšroku dodot valsts un pašvaldību iestāžu darbiniekiem un ISACA Latvija biedriem.

Pasākumu būs iespējams vērot arī tiešsaistē. Apliecinājumi par tiešsaistes vērošanu netiks izsniegti.

REĢISTRĒTIES

  Workshops
08:00 - 09:00 Registration for Workshops
  Room1
(Alfa)
Room2
(Sigma1)
Room3
(Epsilon)
Room4
(Gamma)
Room5
(Ksi)
Lobby
  9:00 - 10:00 9:00 - 13:00

9:00 - 12:30

9:00 - 10:00
(Group I)
2nd - 3rd Oct.
every 20 min
2nd - 3rd Oct.
  Exercise Mercury
and Exercise Neptune: Social engineering in action
- Kieren N. Lowell, Head of TalTech CERT
Īsa pamācība laušanā jeb tīmekļa lietotņu izplatītākie drošības apdraudējumi - Rūdolfs Augustovskis, CEH, OSCP, IT drošības risinājumu konsultants, dots. Cyber Deception: Applying active defense measures to hunt
attackers with MazeRunner
- Dekel Braunstein, Cymmetria
Evaluating the human factor of cybersecurity through active engagement using a Dynamic e-learning Risk Assessment Platform (DelRAP) - Cybexer Technologies PWC escape room (multiple sessions)
20 min each
[up to 4 people groups]
CTF (Capture the flag) challenge
10:15 - 10:45

Coffee Break 30 min

  10:45 - 13:05     10:45 - 11:45
(Group II)
   
  Profiling and People based skills for Social Engineering Physical Engagements - Jenny Radcliffe, *The People Hacker*, Founder & Director of Social Engineering (continues) (continues) Evaluating the human factor of cybersecurity through active engagement using a Dynamic e-learning Risk Assessment Platform (DelRAP) - Cybexer Technologies continued throughout the conference

continued throughout the conference

 

  Conference DAY1
13:00 - 14:00 Registration
  Plenary session (Omega)
14:00 - 14:15 Opening speeches: H.E. President of Latvia Egils Levits
14:15 - 14:30 Opening speeches: Minister of Defence of the Republic of Latvia Artis Pabriks
14:30 - 14:40 Conference welcome:
Baiba Kaškina, CERT.LV General Manager, Sintija Deruma,
CISM, President of ISACA Latvia Chapter
14:40 - 15:30 Unicorns, Bigfoot, Threat Intelligence, Information Sharing and Other Myths - Patrick C. Miller,
Managing Partner, Archer International
15:30 - 16:00

Coffee Break 30 min

  New technologies, new challenges (Omega) Now you see me, now you don't: Monitoring and defence (Alfa) Eyes wide open: Cyber awareness and human evolution (Beta)
16:00 - 16:30 5G – Cybersecurity (RE)evolution - Egons Bušs, Security Director, LMT Core Infrastructure Protection from Distributed Denial-of-Service (DDoS) Attacks - Uldis Libietis, Chief Information Security Officer, Tet Security awareness & escape rooms – behind the scenes of “Hack The Hacker" - Karlsson Mathias, Security Engineer, SWITCH
16:35 - 17:05 The 10 Immutable Security Facts for 2019 - Carl Herberger, Vice President, Radware Who’s bad? Can Anomaly Detection Figure it Out? - Petr Chmelar, Chief Technology Officer, GREYCORTEX  How can students develop real Cybersecurity skills? - Jelena Revzina, IT Security Engineer, iPro
17:10 - 17:40 Secure Online Identification of Natural Persons - Dr. Ulf Löckmann, Federal Office for Information Security (BSI) Advanced Neural Network-Based Technique for Android Smartphone Applications Classification - Dr. Roman Graf, OSCP, Austrian Institute of Technology GmbH STRIKE (Short-Term Real Intrusion and Hacking Exercise) - Edgars Šacs, Board Member, PricewaterhouseCoopers Information Technologies Services
17:45 End of Day 1
17:45 - 20:00 Social event, Main Lobby (dinner welcome speech)

 

  Conference DAY2
08:00 - 09:00 Registration
  Plenary session (Omega)
09:00 - 09:10 Day 2 opening remarks
09:10 - 10:00 Social engineering - Jenny Radcliffe, *The People Hacker*, Founder & Director of Social Engineering
10:00 - 10:30 TBC
10:30 - 10:50

Coffee Break 20 min

  Legal, policy, strategy (Omega) All your base are belong to us: Attacks on cyber infrastructure (Alfa) Dispersing the shadow of the dark side: Misuse of cyber space (Beta)
10:50 - 11:20 Knowledge as a Weapon: Oversight and Review of Cyber Espionage and Cyber Weapons Development - Ann Valjataga, NATO CCD CoE Web application and cloud security: Learning through mistakes - Timo Lohenoja, System Engineer, FORTINET European Cybercrime Centre (EC3): tackling cybercrime in the 21st century - Alvaro Azofra-Martinez, Cyber Intelligence, European Cybercrime Centre (EC3), Europol (no live stream)
11:25 - 11:55 You own your computer, I own you - Gregory Carpenter, Knowledge Bridge International How cybersecure are municipalities in Latvia? Research results - Kaspars Iesalnieks, Head of IT Advisory, KPMG Baltics Ursnif campaign with the macro-enabled documents - Ladislav Bačo, Malware and Forensics Analyst, CSIRT.SK
12:00 - 12:30 Par ko publiski nestāsta - uzbrukumu sekas Latvijā - Kaspars Līcis, IT drošības risinājumu grupas vadītājs, dots. All the Animals are sad in the Zoo - Mg. sc. comp. Kirils Solovjovs, Lead Researcher, Possible Security Reputation, finance and capability are at stake: the dark side of cybersecurity - Anna Vladimirova-Krjukova, COBALT, ISACA and IAPP member
12:30 - 13:30

Lunch break 1h

  These are not the droids you are looking for - Nation state actors, deception and response (Omega) Towards singularity: Advances in technology and science (Alfa) Buckle your seatbelt Dorothy - Open source Intelligence and techniques (Beta)
13:30 - 14:00 Adversary deception cases - Dekel Braunstein, Cymmetria Machine code instrumentation for block runtime statistical analysis and prediction - Eduards Vāvere, Senior Software Developer, Accenture Latvia Exercise Mercury and Exercise Neptune: Social engineering in action - Kieren N. Lovell, Head of TalTech CERT
14:05 - 14:35 When Data Eats SCADA - Patrick C. Miller, Managing Partner, Archer International TBC Stop chasing security - Robert MacMillan, Head of Cyber Security, Virgin Mobile in the United Arab Emirates
14:40 - 15:10 Your internet is down? It's cyberwarfare, stupid - Shira Shamban, Head of Cloud Security Research, Check Point WireGuard: Svaiga vēsma IP tīkla tunelēšanas protokolu saimē - Ivars Šūba, Latvijas Banka Unconscious Human Behaviour and Social Engineering: Bridging a Gap between Psychology and Information Security - Mischa Coster, Chief Psychology Officer, Grey Matters
15:10 - 15:30

Coffee Break 20 min

  Plenary session (Omega)
15:30 - 15:50 Welcome to the 5G era! Will your Tesla still helping to hack Pentagon’s servers? - Ingmārs Pūķis, Vice President, Member of the Board, LMT
15:50 - 16:30 Hidden Face of the Darknet - Carl Herberger, Vice President, Radware
  Announcement of the CTF winners
16:50 - 17:00 Conference closing remarks
  End of Day 2

 

Konference daļēji tiek līdzfinansēta no Eiropas Savienības CEF projekta “Improving Cyber Security Capacities in Latvia” (INEA/CEF/ICT/A2017/1528784).