VB2017: WHOIS and EICAR Small Talks added

Posted by   Martijn Grooten on   Sep 12, 2017

In addition to the nine 'last-minute' papers that were announced and added to the VB2017 programme yesterday, we have also added two more 'Small Talks'.

The 'Small Talks' take place in a smaller room (hence the name) and last longer than regular VB2017 talks, thus giving a more informal atmosphere to allow for discussion and debate among peers – the kind of thing that is, for many, one of the prime reasons for attending a conference. Already on the programme are Small Talks on the testing of security products, on ENISA's lessons from the WannaCry outbreak, and on how security vendors should deal with HTTPS traffic.

In one of the newly added Small Talks, Neil Schwartzman (CAUCE) will discuss the EU's General Data Protection Regulation (GDPR). Beyond the many webinars and press releases about the impact of the GDPR, there is real regulation with real impact, which most security experts agree is a good thing.

The GDPR also has implications for WHOIS, the protocol that stores information on the owners of domains and IP addresses and that is vital for the work of many in the anti-abuse space. It is these implications that Neil, a veteran of the anti-spam community, will discuss: how will the GDPR affect WHOIS? What will future WHOIS records look like? Is there anything to be done?

If you are a regular user of WHOIS in your security research, make sure you attend Neil's Small Talk, so that you're prepared for this side of the GDPR too.

Given our common goals, Virus Bulletin has long cooperated with EICAR, and we are pleased that in the second of the Small Talks to be announced today, we will host Sachar Paulus, Rainer Fahs and Marcel Eberling for a discussion on the organization's trustworthiness strategy and minimum standard.

Anyone who follows the security news will know that the trustworthiness of security products is sometimes questioned. And although the arguments aren't always rational, transparency and verifiability could improve this trustworthiness.

It is this that the organization is working on, and the three speakers will share details of EICAR's Trustworthiness Strategy, as well as of the proposed minimum standard for software vendors to demonstrate the trustworthiness of their solutions – thus making this an important session for vendors and testers alike.

There is still time to register for VB2017, so don't hesitate to book your ticket now to join us in Madrid, 4-6 October 2017!

VB2017-325w.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2018 paper: Office bugs on the rise

At VB2018 Sophos researcher Gábor Szappanos provided a detailed overview of Office exploit builders, and looked in particular at the widely exploited CVE-2017-0199. Today we publish his paper and release the video of his presentation.

VB2018 video: The Big Bang Theory by APT-C-23

Today, we release the video of the VB2018 presentation by Check Point researcher Aseel Kayal, who connected the various dots relating to campaigns by the APT-C-23 threat group.

VB2019 London - join us for the most international threat intelligence conference!

VB calls on organisations and individuals involved in threat intelligence from around the world to participate in next year's Virus Bulletin conference.

VB2018 paper: Tracking Mirai variants

Today, we publish the VB2018 paper by Qihoo 360 researchers Ya Liu and Hui Wang, on extracting data from variants of the Mirai botnet to classify and track variants.

VB2018 paper: Hide'n'Seek: an adaptive peer-to-peer IoT botnet

2018 has seen an increase in the variety of botnets living on the Internet of Things - such as Hide'N'Seek, which is notable for its use of peer-to-peer for command-and-control communication. Today, we publish the VB2018 paper by Bitdefender…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.