Lectures
Meetings
Hands-on Track 1
Hands-on Track 2
Lectures | Meetings | |
---|---|---|
08:00 – 09:00 | Registration and Reception | |
09:00 – 09:15 | Introduction Gorazd Bozic (SI-CERT) | |
10:00 – 10:30 | Coffee Break | |
10:30 – 11:15 | LU Andras Iklody (CIRCL, LU) | |
11:15 – 12:00 | AT Automated Incident Handling with IntelMQ Sebastian Wagner (CERT.AT, AT) | |
12:00 – 12:45 | EE Heiki Pikker (CERT-EE, EE) | |
12:45 – 13:45 | Lunch | |
13:45 – 14:30 | PL IoC Feeds: Past, Present and Future Pawel Pawlinski (CERT.PL – CERT Polska / NASK, PL) | |
14:30 – 15:15 | CH Jakob Dhondt (SWITCH, CH) | |
15:15 – 15:30 | Coffee Break | |
15:30 – 16:15 | PL Honeypots-as-a-Service: Working Together to Deploy Honeypot Sensors on a Large Scale Piotr Kijewski (The Shadowserver Foundation, PL) | |
16:15 – 17:00 | GR Andrea Dufkova (ENISA, GR) | |
17:00 – 17:15 | Day One Conference Summary & Instructions for the Social Event | Western Balkans Side Meeting: Capacity Building Initiatives and Issues Gorazd Bozic (SI-CERT) 17:00 – 18:00 |
20:00 – 00:00 |
Hands-on Track 1 | Hands-on Track 2 | |
---|---|---|
08:00 – 09:00 | Registration | |
09:00 – 10:30 | LU Andras Iklody (CIRCL, LU); Sami Mokaddem ( CIRCL) | FI hACME – A Social Engineering Workshop Victor Sant’Anna (Nixu, FI) |
10:30 – 11:00 | Coffee Break | |
11:00 – 12:30 | LU Andras Iklody (CIRCL, LU); Sami Mokaddem ( CIRCL) | US Digital Investigation Process PRAVARA Lawrence (Larry) Rogers (Software Engineering Institute, US) |
12:30 – 13:30 | Lunch | |
13:30 – 15:00 | LU Andras Iklody (CIRCL, LU); Sami Mokaddem ( CIRCL) | US Digital Investigation Process PRAVARA Lawrence (Larry) Rogers (Software Engineering Institute, US) |
15:00 – 15:30 | Coffee Break | |
15:30 – 17:00 | LU Andras Iklody (CIRCL, LU); Sami Mokaddem ( CIRCL) | US Digital Investigation Process PRAVARA Lawrence (Larry) Rogers (Software Engineering Institute, US) |
17:00 – 17:30 | Closing Ceremony |
Andras IklodyAndras Iklody (CIRCL, LU)
Andras Iklody works at the Luxembourgian Computer Security Incident Response Team (CSIRT) CIRCL as a software developer and has been developing the MISP core since early 2013. He is a firm believer that there are no problems that cannot be tackled by building the right tool.
November 13, 2019 10:30-11:15
Sebastian Wagner (CERT.AT, AT)
Sebastian Wagner joined CERT.at, the Austrian national CERT, in 2015 as software developer and security analyst. Since joining CERT.at, Sebastian has been working in the field of automated incident handling and developing & maintaining IntelMQ.
In 2014, several CERTs joined their resources to start an open source solution for automated incident handling with the goals of simplicity, adaptability and extensibility. The outcome of their efforts is the IntelMQ software which is subsequently being used by a great number of CERTs worldwide. This talk outlines the concepts and the architecture of the tool, and describes the capabilities, use-cases and related tools.
November 13, 2019 11:15-12:00
Heiki Pikker (CERT-EE, EE)
Heiki Pikker is a Senior Information Security Expert at CERT-EE. He has been working with systems and networks for over 20 years and has extensive knowledge on how to build both secure and unsecure services. Working as a Senior Information Security Expert, he specializes more on threat hunting, both on network and client side. If you don't know him yet, you have probably heard of the Cuckoo public sandbox that runs somewhere in Estonia, or you may have heard about additional ClamAV signatures he provides or RBL services he runs. If not, then maybe it’s time to meet Heiki.
Cuckoo is not only a bird, but also a sandbox that CERT-EE provides publicly and free of charge. Nowadays, malware is spread every day and different anti-virus vendors offer slightly different protections. Therefore, verifying suspicious files is more crucial than ever. Hence, CERT-EE offers their Cuckoo sandbox free of charge to everyone that wishes to check their suspicious files for malware. You can check Cuckoo out at: https://cuckoo.cert.ee CERT-EE believes that providing free services will help companies and the security community a lot. However, the public Cuckoo sandbox is only a tip of the iceberg as compared to what CERT-EE does. This presentation will give some insight on “what” and “how” CERT-EE operates, as well as shed light on some plans that CERT-EE has.
November 13, 2019 12:00-12:45
Lawrence (Larry) Rogers (Software Engineering Institute, US)
Lawrence (Larry) Rogers is a Senior Member of Technical Staff at CERT Division of the Software Engineering Institute, a Federally Funded Research and Development Center hosted at Carnegie Mellon University. At CERT, he has worked with U.S. Federal Law Enforcement Agencies on “gap” areas of digital investigations and forensics. He also manages the CERT Linux Forensics Tool Repository, a collection of public domain software tools packages for Fedora and CentOS/RedHat Enterprise Linux.
Larry was also the principle architect of the Survivability and Information Assurance and several writings on the topic of Home Computer Security. All of his published writings are available here. Larry has been at CERT for over 24 years.
Before working at CERT, Larry worked in the Computer Science department and the Computing Center at Princeton University. He also consulted with companies in the Princeton, NJ area.
Larry holds a Master’s degree in Computer Engineering from Case Western Reserve University and a Bachelor’s degree in Systems Analysis from the Miami University.
The Software Engineering Institute will provide training from its Investigating Digital Assets Course, centered upon CERT Division’s digital investigation process PRAVARA (Prepare, Respond, Acquire/Verify, Analyze, Report, Archive). This course walks through the digital investigation process from start to end, addresses the tools and selection criteria used throughout the process, and the procedures required for an effective digital investigation process. Additional focus will be afforded to the response and analysis steps, including the basics of email, network and malware analysis. The presentation will also include a Q&A segment whereby attendees are encouraged to ask questions particular to their situations and environments.
Please note that the materials will be electronically distributed on a thumb drive. To follow along with the presentations, it is recommended that attendees bring a laptop or other suitable device.
November 14, 2019 11:00-12:30, November 14, 2019 13:30-15:00, November 14, 2019 15:30-17:00
Jakob Dhondt (SWITCH, CH)
Jakob Dhondt is a security engineer at SWITCH, working on different topics that are security or DNS related or in the ideal case both. Next to DNS RPZ Jakob is collecting and analysing DNS data from various sources mainly in order to fight abuse. Before working at SWITCH Jakob has finished a master degree in computer science at the KULeuven in Belgium where his main areas of interest were also security related.
SWITCH has started the DNS Firewall service in 2014. Since its beginning, the service has been revamped multiple times on a technical layer as well as from a service point of view. This presentation covers an overview of our current technical setup, the different components that belong to the service, the types of threat data we use and examples of cooperation between SWITCH and its partners.
November 13, 2019 14:30-15:15
Andrea DufkovaAndrea Dufkova (ENISA, GR)
Andrea Dufkova is an Expert for Computer Security and Incident Response at ENISA. Since 2008 she has worked in the area of CERT-relations under the Operational security unit at ENISA. Before joining the agency she was a member of military CERT, the emergency response team for the Czech military network.
The European Union Agency for Cybersecurity (ENISA) has been working to make Europe cyber secure since 2004. The Agency works closely together with Member States and private sector to deliver advice and solutions as well as improving their capabilities. This support includes inter alia:
November 13, 2019 16:15-17:00
Victor Sant’Anna (Nixu, FI)
Victor Sant’Anna is a Senior Security Consultant working currently with PSIRT coaching and Digital Identity. Victor has worked in the Information Security industry for the past 19 years in various roles usually revolving PSIRT activities, Vulnerability management and Identity and Access Management. Human interactions and especially social engineering have always been a subject of interest.
As a social engineering role-playing game to raise social engineering awareness, this workshop will introduce some of the methods for social engineering attacks and prevention. The game can be used by security experts to better support/train their own organizations.
Social engineering basic concepts, methods and techniques will be explained during the game. The players will play as attackers and victims, identifying the valuable publicly available social clues that can be exploited while engaging in social attack scenarios. A lessons-learned section, wrap-up and discussions will follow to ensure assimilation by the participants.
No previous experience needed. No computers will be used during this session. Pen, paper & some imagination required.
November 14, 2019 09:00-10:30
Piotr KijewskiPiotr Kijewski (The Shadowserver Foundation, PL)
Piotr is a member of The Shadowserver Foundation, a non-profit with a mission of making the Internet a more secure environment. He has a strong CSIRT background, previously working in incident response at a national level for 14 years in the CERT Polska (CERT.PL) team. He managed the team for nearly 7 years up until 2016, building up its various security data gathering and analysis projects as well as managing its anti-malware operations, including numerous botnet disruptions. Piotr is also a member of The Honeynet Project (where he also served as a Director) - a well-known and respected non-profit that is committed to the development of honeypot technologies and threat analysis.
The talk will cover Shadowserver experiences with building and maintaining large-scale honeypot sensor networks, including the recently completed Horizon 2020 SISSDEN Project (https://sissden.eu). We will highlight recent developments and our vision for creating a honeypots-as-a-service framework for trusted parties in the national CSIRT, TI industry and LE communities, with a goal of making honeypot sensors easily deployable and sustainable for network defenders.
November 13, 2019 15:30-16:15
Pawel Pawlinski (CERT Polska / NASK, PL)
Paweł Pawliński is a principal specialist at CERT.PL. His past job experience includes data analysis, threat tracking and automation. In his current role, Paweł leads a team developing threat monitoring and data sharing systems.
The talk will outline different sources of technical indicators available for CSIRTs/SOCs and how useful they can be in fighting badness within (your) networks. We will look into the evolution of the IoC "market" and discuss whether evaluation of their quality is possible in practice.
November 13, 2019 13:45-14:30
Andras IklodySami MokaddemAndras Iklody (CIRCL, LU), Sami Mokaddem ( CIRCL)
Andras Iklody is a software developer working for CIRCL and has been the main developer of the MISP core since the beginning of 2013. He is a firm believer that there are no problems that cannot be tackled by building the right tool. He did the overall development governance in the MISP core project especially to ensure external contributions are inline with the overall objective of the MISP core functionalities.
Sami Mokaddem (male) is a civil engineer graduated from the Université catholique de Louvain (UCL). He is the lead developer of the situational awareness tool called misp-dashboard used for the MISP threat intelligence platform.
In a continuous effort since 2016, CIRCL frequently gives training sessions about MISP (Malware Information Sharing Platform & Threat Sharing). The purpose is to reach out to security analysts using MISP as a threat intelligence platform along with users using it as an information-sharing platform. This is an opportunity for the users to meet the developers and exchange about potential improvements or use-cases using MISP as a threat-intelligence platform.
The MISP training will demonstrate how the platform functions; explain how to share, comment and contribute data, and describe the future developments. This part of the training focuses on the analyst aspect along with the management of your own MISP instance especially how to connect to other MISP communities.
Prerequisites: As this is a technical workshop, attendees can bring their own laptop to the course.
Who benefits most from this training:
Everyone interested in the concepts, administration, maintenance, usage and API usage of MISP.
Requirements:
More information about MISP: https://www.circl.lu/services/misp-malware-information-sharing-platform/
About the MISP project: https://www.misp-project.org - https://twitter.com/MISPProject
More information on MISP training: https://www.circl.lu/services/misp-training-materials/
November 14, 2019 09:00-10:30, November 14, 2019 11:00-12:30, November 14, 2019 13:30-15:00, November 14, 2019 15:30-17:00
Gorazd Bozic
Panel includes reps. from: DCAF, ENISA, FIRST, CMU SEI
Moderator: Gorazd Božič, SI-CERT
November 13, 2019 17:00-18:00