Sched.com Conference Mobile Apps
FloCon 2018
has ended
Create Your Own Event
Menu
Schedule
Speakers
Sponsors
Attendees
Search
Log in
Sign up
FloCon 2018
Tucson, AZ – January 8-11, 2018
PLEASE NOTE THAT THE CURRENT SCHEDULE IS TENTATIVE. CHANGES TO THE SCHEDULE BELOW MAY OCCUR
Watch this space for details on the technical program for FloCon 2018. In the meantime, see the FloCon website at
www.cert.org/flocon
.
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Search
or browse by date + venue
General Session
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
All
SiLK
Popular
Popular Events
#1
Afternoon Track I: How to be an Analyst
#2
Morning Track I: How to be an Analyst
#3
Creating & Sharing Value with Network Activity and Threat Correlation
#4
Panel Discussion: "Current Trends: Cybersecurity Data Analysis and Fusion"
#5
May the data stay with you! - Network Data Exfiltration Techniques
#6
Off-Site Reception at the Biosphere
#7
Breakfast
#8
Network Volatility Analysis for Threat Detection
#9
The Future of Cybersecurity Needs Eyes and AIs on the Inside
#10
CyGraph: Big-Data Graph Analysis and Visualization for Cybersecurity and Mission Resilience
#11
Introduction
#12
Optimal Machine Learning Algorithms for Cyber Threat Detection
#13
Break
#14
Keynote #1: Colonel Edward F. Buck Jr, NETCOM
#15
Lunch
#16
Break
#17
Anomaly Detection in Cyber Networks Using Graph-node Role-dynamics and NetFlow Bayesian Normalcy Modeling
#18
DNS Analysis at Internet Peering Points
#19
Detecting Malicious IPs and Domain Names by Fusing Threat Feeds and Passive DNS through Graph Inference
#20
KEYNOTE: Trust, but Verify
#21
Multi-Dimensional Network Anomaly Detection with Machine Learning
#22
Welcome Reception
#23
Breakfast
#24
When Threat Hunting Fails: Identifying Malvertising Domains Using Lexical Clustering
#25
Break
#26
Lunch
#27
How to Hunt for Lateral Movement on Your Network
#28
Demo and Poster Session
#29
Lunch
#30
Sunday Networking Event
#31
InSight2: An Interactive Web-Based Platform for Modeling and Analysis of Large-Scale Argus Network Flow Data
#32
Identification of Malicious SSL Networks by Subgraph Anomaly Detection
#33
Identifying Anomalies in Bipartite Network Data
#34
Break
#35
Lunch Table Talk - "A Model of Analytic Development: Structure and Application"
#36
Automated Detection and Analysis of IoT Network Traffic Through Distributed Open Source Sensors and Citizen Scientists
#37
Conference Close
#38
Registration
#39
Registration
#40
Lessons Learned in Growing a Big Data Capability for Network Defense
#41
Lunch Table Talk - "How to be a Savvy Machine Learning Consumer"
#42
Tactical Threat Map: Methodology for Tracking and Documenting Cyber Campaigns
#43
Breakfast
#44
Eliminating Barriers to Automated Tensor Analysis for Large-scale Flows
#45
EternalBlue and You: Detecting & Trending SMB Vulnerabilities and Exploitation Activity
#46
Afternoon Track II: Threat Hunting w/Suricata
#47
Registration
#48
Morning Track II: Suricata Training
#49
Morning Track III: Bro Training
#50
Registration
Popular by Type
All Types
General Session
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
Popular by Day
All days
Sunday, Jan 7
Monday, Jan 8
Tuesday, Jan 9
Wednesday, Jan 10
Thursday, Jan 11
Recently Active Attendees
Michele Falce
Admin
Nancy Ott
AD
Aaron Detwiler
AT
Angela Tay
Shapor Naghibzadeh
Jon
Steve Smoot
More →