Agenda

Below you'll find the Agenda for Cyber Week 2018.

Octomber 30 - 31

08:30 - 09:00

Imaginarium Room, 1st floor


Registration


09:00 – 10:30

Scenario 1: Ransomware and Destructive Attacks


The impact of ransomware, destructive malware and related attack is growing global, with new actors taking part in leveraging crippling assault. This seminar will provide a focus on ransomware and its multifaceted implications across technical, policy, compliance and financial responses. Case studies and lesson learned – sessions will discuss the changing threat landscape, innovative research, response and recovery, and how to combat ransomware.

Bitdefender, Cisco
Mr. Catalin Cosoi, PhD , Senior Director, Investigation and Forensics Unit
Mr. Andrei Ioniță, Business Development Manager, Bitdefender

10:30 – 11:00

Coffee Break & Networking


11:00–12:30

Imaginarium Room, 1st floor


Scenario 2: Malware analysis. Is Malware the New Wealons of Mass Destruction?


Is malware a weapon: Ukraine power outages, Wanna Cry. Cyber attack are becoming more frequent. Explore if the latest attacks demonstrate a change in how malware is being used. Case studies. Lesson learned and how those lessons can prepare you for the future.

Mr. Catalin Cosoi, PhD , Senior Director, Investigation and Forensics Unit
Mr. Andrei Ioniță, Business Development Manager, Bitdefender

12:30–13:30

Lunch & Networking


11:00–12:30

Front End Room, 2nd floor


Scenario 3 : CISCO Workshop Vitalii Porokhnenko


CCNP, CCDP, CCNP W, СCSP
CWSP, CWDP, CWAP, CWNA

12:30–13:30

Lunch & Networking


Parallel Sessions


13:30–15:00

Imaginarium Room, 1st floor


Scenario 3: Mr. Almerindo Graziano, Silensec


Threat intelligence using YARA rules.

15:00–15:30

Coffee Break, Networking


13:30–15:00

Front End Room, 2nd floor


Workshop : Modern Security Mobility Management (sharing secure the information) FAMOC


1. Introduction to EMM and FAMOC.
2. Management of Android devoces with Android Enerprise.
3. Management of iOS and MacOS.
4. Government secure workplace introduction.
5. Custom approach to secure mobility projects.

FancyFon.
Mr. Merek Jedrzejczyk
Mr. Michal Koziel

15:00–15:30

Coffee Break, Networking


Parallel Sessions


15:30–17:00

Imaginarium Room, 1st floor


Scenario 4: Crisis Management Simulation


Klaid Mägi - Executive Vice President - CybExer Technologies

15:30–17:00

Front End Room, 2nd floor


Workshop: High Assurance Data Protection over hybrid networks

Mr. Eugen Rusen, Technical Sales Director EMEA, Certes Networks

08:30-09:00

Registration




09:00-09:30

Imaginarium Room, 1st floor


Scenario 5: Ransomware Analysis


Mr. Daniel Göttler, Information security consultant,CyberServices.

10:30–11:00

Coffe break & Networking


08:30-09:00

Registration




09:00–9:30

Front End Room, 2nd floor


Workshop: Microsoft 365 Intelligent Security


Technical demo of one of the most interesting labs from the course based on the virtual machine setup - how vulnerable host can be exploited and how this attack can be analyzed by cybersecurity specialist. Participants watch action.

Alexey Markuts Microsoft cloud certified professional, MUK

10:30–11:00

Coffee Break, Networking


11:00–12:30

Imaginarium Room, 1st floor


Scenario 6: Cloud 2018: Enterprise Grade Security


Mr. Michael KONDRASHIN, Technical Director, Trend Micro CIS Georgia Mongolia

12:30–13:30

Lunch, Networking


11:00–12:30

Front End Room, 2nd floor


Workshop: Veeam Backup:


- Veam back-up and replication
- Veeam Backup for Microsoft Office 365
Yevgeniy Zossimov, Technical Engineer, VEEAM

12:30–13:30

Lunch, Networking


13:30–15:00

Imaginarium Room, 1st floor


Scenario 7: Online credit card skimming


Mr. Marwan Ben Rached, Technical Officer Cybersecurity, ITU

15:00–15:30

Coffee Break, Networking


13:30–15:00

Front End Room, 2nd floor


Workshop: Bitdefender - Securing Infrastructure Platform:


- Physical and virtual workstation;
- Physical and virtual servers;
- Mail Server: Exchange & Linux;
- Mobile;
- Sand Boxing;
- Full Disc Encryption & Patch Management.

Mr. Maxim Cojocari, Senior Security Engineer, RSD
Mr. Maxim Costasco, Security Engineer, RSD.

15:00–15:30

Coffee Break, Networking


15:30–17:00

Cyber Drill Scenario 8


Mr. Francesco Binaschi, ‎Cyber Security Analyst , Deloitte

15:30–17:00

CCNA Cyber Ops: Anatomy of an Attack


Mr. Eugene MOROZOV, Technical Manager Europe Central, Russia, CIS, Nordics and Baltics, CISCO