Oslo 2016 FIRST TC & Training
Oslo 2016 FIRST TC & Training
Oslo 2016 FIRST TC & Training | |
---|---|
09:00 – 10:00 | Registration and morning coffee |
10:00 – 10:10 | Introduction of day one Margrete Raaum, KraftCERT |
10:10 – 10:40 | Security Monitoring at Telenor Henrik Strøm, head of Telenor CERT |
10:40 – 10:50 | Break |
10:50 – 11:20 | Planning your CSIRT Capability Frode Hommedal, head of IR and analytics at Telenor CERT |
11:20 – 11:30 | Break |
11:30 – 12:00 | The Incident Responder and the Half Year APT Martin Eian, Senior Security Analyst, Mnemonic |
12:00 – 13:00 | Lunch |
13:00 – 13:30 | Why we built a stream processing framework Kjell Tore Fossbakk, security analyst, HelseCERT |
13:30 – 13:40 | Break |
13:40 – 14:10 | Increasing Value and Efficiency of Security Analysis Erik Alexander Løkken, head of MSS at Mnemonic |
14:10 – 14:20 | Break |
14:20 – 14:50 | Indexing Enterprise Metadata — Speeding up incident response using Splunk Pål Sandbeck Mathisen, security consultant at SopraSteria |
14:50 – 15:00 | Closing remarks for day one Margrete Raaum, head of KraftCERT |
15:00 – 17:00 | No programming |
17:00 – 19:00 | Dinner Not sponsored. Precise location in Oslo city center will be disclosed at opening and closing remarks. |
19:00 – 00:00 | Continued socializing Sponsored Happy Hour by ThreatConnect |
Oslo 2016 FIRST TC & Training | |
---|---|
09:00 – 10:00 | Morning coffee |
10:00 – 10:10 | Introduction of day two Margrete Raaum, KraftCERT |
10:10 – 10:40 | Does a BEAR Leak in the Woods? Toni Gidwani, head of Research Operations at ThreatConnect |
10:40 – 10:50 | Break |
10:50 – 11:20 | Jarno Niemelä, Lead Researcher at F-Secure; Frode Hommedal, Head of IR and Analytics at Telenor CERT |
11:20 – 11:30 | Break |
11:30 – 12:00 | Detect, Correlate, Orchestrate — Intelligent SOC Operations Georgios Psykakkos, head of First Response at CERT-EU |
12:00 – 13:00 | Lunch |
13:00 – 13:30 | Windows OpSec — Where are attackers hiding? Jarno Niemelä, Lead Researcher at F-Secure |
13:30 – 13:40 | Break |
13:40 – 14:10 | Windows OpSec — Where are attackers hiding? Jarno Niemelä, Lead Researcher at F-Secure |
14:10 – 14:20 | Break |
14:20 – 14:50 | The Cyber Threat Intelligence Matrix Frode Hommedal, head of IR and analytics at Telenor CERT |
14:50 – 15:00 | Closing remarks for day two Margrete Raaum, head of KraftCERT |
Georgios Psykakkos, head of First Response at CERT-EU
CERT-EU is the European's Institutions, Agencies and Bodies Computer Emergency Response Team. It is being active since 2011 and continuously expands operationally. Serving its purpose, CERT-EU has cooperated with EU constituents and established common practices to defend against cyber attacks. Therefore, CERT-EU has developed an internal Cyber Threat Intelligence (CTI) database that is being fed with hundreds of IoCs daily. EU-Constituents collect logs from their network services and devices such as Proxy and Email servers. The logs from these sources are stored locally in Splunk appliances and are normalised for later process. All logged events are centrally processed in CERT-EU using filters from CTI. The main categories giving input to Splunk can be summarised in web traffic, e-mail, security appliances, hosts and antivirus software. The First Response Team monitors the alert dashboards of Splunk and is capable of assessing indications of intrusion remotely.
Georgios Psykakos
Georgios Psykakos has joined the European Institutions in 2015 and is currently working for CERT-EU, leading its first response group. He started his career on the banking sector as IT Security Officer. Since 2009, he has been providing his country's National Authorities with cyber-security expertise in the fields of incident handling, forensic investigation and policy making. He holds an MSc in Computer Security with a specialisation in Intrusion Detection Systems. He is experienced in security intelligence and counter-intelligence and a devoted researcher of aviation.
November 23, 2016 11:30-12:00
Toni Gidwani, head of Research Operations at ThreatConnect
November 23, 2016 10:10-10:40
Erik Alexander Løkken, head of MSS at Mnemonic
As an MSSP we analyse thousands of events every day. To be able to do this we use a wide variety of methods and technology. In this presentation I will show you why we apply data enrichment as one of those methods and how we do it in our event processing and analysis process.
Erik Alexander Løkken
Erik Alexander Løkken has been working within the field of incident response, forensics and security analysis the last 15 years. He currently runs the MSSP department in mnemonic and has been actively involved in evolving and developing the MSSP services for mnemonic since 2001. He has been actively involved in the security community and presented at multiple security conferences.
November 22, 2016 13:40-14:10
Pål Sandbeck Mathisen, security consultant at SopraSteria
In this talk Pål will describe how he has helped Telenor collect and index interesting enterprise metadata with Splunk to speed up, and in some cases make possible, efficient incident response.
November 22, 2016 14:20-14:50
Frode Hommedal, head of IR and analytics at Telenor CERT
November 22, 2016 10:50-11:20
Henrik Strøm, head of Telenor CERT
November 22, 2016 10:10-10:40
Frode Hommedal, head of IR and analytics at Telenor CERT
When you are responding to severe intrusions, it has been gospel for the past years to observe, learn and plan before your start cleaning up. This is very sound advice, and probably the only way you can successfully evict a determined and mission driven adversary from your networks. But when is the right time? When do you actually know enough to evict, and more importantly, resist immediate re-entry? Enter the Cyber Threat Intelligence Matrix.
Frode Hommedal
Frode Hommedal is a senior incident responder and CSIRT leader. He is currently head of incident response and security analytics at Telenor CERT, and part of the team that is establishing the global CERT/SOC capability of Telenor. He previously worked seven years for the Norwegian national CSIRT, NorCERT, and he has extensive experience with countering digital espionage. One of Frode’s goals is to contribute to the infosec curriculum, hoping it will help more CSIRTs to find, face and fight the ever growing number of advanced threats.
November 23, 2016 14:20-14:50
Martin Eian, Senior Security Analyst, Mnemonic
During a prolonged incident response contract with a customer, Mnemonic was able to study an APT actor closely over a time span of six months. During this talk you will be given the result of an analysis of over 12.000 commands issued by the attacker, with some surprising insights into adversary operator behavior.
Martin Eian
Dr. Martin Eian works as a Senior Security Analyst in mnemonic's Threat Intelligence group, and he is the Project Manager for the research project "Semi-Automated Cyber Threat Intelligence". He has more than 15 years of work experience in IT security, IT operations, and information security research roles. In addition to his position at mnemonic, he is an Adjunct Associate Professor at the Department of Telematics, NTNU. He is also a member of the Europol EC3 Advisory Group on Internet Security. He holds a PhD in Telematics/Information Security from the Norwegian University of Science and Technology (NTNU).
November 22, 2016 11:30-12:00
Jarno Niemelä, Lead Researcher at F-Secure; Frode Hommedal, Head of IR and Analytics at Telenor CERT
November 23, 2016 10:50-11:20
Kjell Tore Fossbakk, security analyst, HelseCERT
Kjell Tore will tell us why HelseCERT built a stream processing framework for security events. He will share what they have tested and tried, and the experiences they gained, before deciding to create their own stream processing framework instead of using one of the many frameworks out there.
Kjell Tore Fossbakk
Kjell Tore has built and integrated systems for more than 11 years. He used to work for the Norwegian Armed Forces and holds a MSc in information security.
November 22, 2016 13:00-13:30
Jarno Niemelä, Lead Researcher at F-Secure
Windows, like any modern IT environment, is a complex thing, and attackers can hide in a multitude of places. During this talk, Jarno will walk you through several places attackers are hiding, and give you practical examples of how you can detect them. Alternative title: You can exec, but you can't hide!
Jarno Niemilä
Jarno is responsible for automatic malware processing and detection systems at F-Secure. Keen on data science and on analyzing behavioral patterns, he also teaches corporate info security at university. He speaks often at cybersecurity events.
November 23, 2016 13:00-13:30, November 23, 2016 13:40-14:10