VB2019 Programme

 

Wednesday 2 October, 2019

Red room

Green room

Small talks

08:30 - 10:00   Wednesday 2 October
E   A   R   L   Y           M   O   R   N   I   N   G           R   E   F   R   E   S   H   M   E   N   T   S
10:30 - 10:50   Wednesday 2 October
VB2019 opening address
Martijn Grooten (Virus Bulletin)

(takes place in the Green room)
10:50 - 11:30   Wednesday 2 October
Keynote address: Tales from the NCSC: the daily battle to defend a country in cyberspace
Speaker TBA (National Cyber Security Centre, UK)

(takes place in the Green room)
11:30 - 12:00   Wednesday 2 October
A vine climbing over the Great Firewall: a long-term attack against China
Lion Gu (Qi An Xin Threat Intelligence Center)
Bowen Pan (Qi An Xin Threat Intelligence Center)
11:30 - 12:00   Wednesday 2 October
An inside look at a cybercriminal investigation
Speaker TBA (NHTCU)
12:00 - 12:30   Wednesday 2 October
APT cases exploiting vulnerabilities in region-specific software
Shusei Tomonaga (JPCERT/CC)
Tomoaki Tani (JPCERT/CC)
Hiroshi Soeda (JPCERT/CC)
Wataru Takahashi (JPCERT/CC)
12:00 - 12:30   Wednesday 2 October
Inside Magecart: the history behind the covert card-skimming assault on the e-commerce industry
Yonathan Klijnsma (RiskIQ)
12:30 - 14:00   Wednesday 2 October
L   U   N   C   H
14:00 - 14:30   Wednesday 2 October
Absolutely routed!! Why routers are the new bullseye in cyber attacks
Anurag Shandilya (K7 Computing)
14:00 - 14:30   Wednesday 2 October
Domestic Kitten: an Iranian surveillance program
Aseel Kayal (Check Point)
Lotem Finkelstein (Check Point)
14:30 - 15:00   Wednesday 2 October
Problem child: common patterns in malicious parent-child relationships
Bobby Filar (Endgame)
14:30 - 15:00   Wednesday 2 October
DNS on fire
Warren Mercer (Cisco Talos)
Paul Rascagneres (Cisco Talos)
15:00 - 15:30   Wednesday 2 October
TBA
Speaker TBA (TBA)
15:00 - 15:30   Wednesday 2 October
A study of Machete cyber espionage operations in Latin America
Veronica Valeros (Czech Technical University in Prague)
Maria Rigaki (Czech Technical University in Prague)
Kamila Babayeva (Czech Technical University in Prague)
Sebastian Garcia (Czech Technical University in Prague)
15:30 - 16:00   Wednesday 2 October
T   E   A   /   C   O   F   F   E   E
16:00 - 16:30   Wednesday 2 October
Never before had Stierlitz been so close to failure
Sergei Shevchenko (Sophos)
16:00 - 16:30   Wednesday 2 October
Operation Soft Cell - a worldwide campaign against telecommunication providers
Amit Serper (Cybereason)
Mor Levi (Cybereason)
Assaf Dahan (Cybereason)
16:30 - 17:00   Wednesday 2 October
Static analysis methods for detection of Microsoft Office exploits
Chintan Shah (McAfee)
16:30 - 17:00   Wednesday 2 October
Abusing third-party cloud services in targeted attacks
Daniel Lunghi (Trend Micro)
Jaromir Horejsi (Trend Micro)
17:00 - 17:30   Wednesday 2 October
The push for increased surveillance from fiction and its impact on privacy
Miriam Cihodariu (Heimdal Security)
Andrei Bogdan Brad (Code4Romania)
17:00 - 17:30   Wednesday 2 October
Fantastic information and where to find it: a guidebook to open-source OT reconnaissance
Daniel Kapellmann Zafra (FireEye)

 

Thursday 3 October, 2019

Red room

Green room

Small talks

08:00 - 09:00   Thursday 3 October
E   A   R   L   Y           M   O   R   N   I   N   G           R   E   F   R   E   S   H   M   E   N   T   S
09:00 - 09:30   Thursday 3 October
Shinigami's revenge: the long tail of Ryuk malware
Gabriela Nicolao (Deloitte)
Luciano Martins (Deloitte)
09:00 - 09:30   Thursday 3 October
Last-minute paper (TBA)
Speaker TBA (TBA)
09:30 - 10:00   Thursday 3 October
Defeating APT10 compiler-level obfuscations
Takahiro Haruyama (Carbon Black)
09:30 - 10:00   Thursday 3 October
Last-minute paper (TBA)
Speaker TBA (TBA)
10:00 - 10:30   Thursday 3 October
TBA
Speaker TBA (TBA)
10:00 - 10:30   Thursday 3 October
Last-minute paper (TBA)
Speaker TBA (TBA)
10:30 - 11:00   Thursday 3 October
T   E   A   /   C   O   F   F   E   E
11:00 - 11:30   Thursday 3 October
Catch me if you can: detection of injection exploitation by validating query and API integrity
Abhishek Singh (Prismo Systems)
Ramesh Mani (Prismo Systems)
11:00 - 11:30   Thursday 3 October
Last-minute paper (TBA)
Speaker TBA (TBA)
11:30 - 12:00   Thursday 3 October
Let's translate firewall/endpoints for you: XAI on security products
Tongbo Luo (JD.com)
Jimmy Su (JD.com)
Kailiang Ying (Syracuse University)
Xinyu Ma (Flappypig Team)
Zhaoyan Xu (Palo Alto Networks)
11:30 - 12:00   Thursday 3 October
Last-minute paper (TBA)
Speaker TBA (TBA)
12:00 - 12:30   Thursday 3 October
Webcam interception and protection in kernel mode in Windows (partner presentation)
Michael Maltsev (Reason Cybersecurity)
12:00 - 12:30   Thursday 3 October
Last-minute paper (TBA)
Speaker TBA (TBA)
12:30 - 14:00   Thursday 3 October
L   U   N   C   H
14:00 - 14:30   Thursday 3 October
Last-minute paper (TBA)
Speaker TBA (TBA)
14:00 - 14:30   Thursday 3 October
The art of the cashout: the evolution of attacks on payment systems
Saher Naumaan (BAE Systems Applied Intelligence)
Irving Méreau (SWIFT)
14:30 - 15:00   Thursday 3 October
Last-minute paper (TBA)
Speaker TBA (TBA)
14:30 - 15:00   Thursday 3 October
Exploring Emotet, an elaborate everyday enigma
Luca Nagy (Sophos)
15:00 - 15:30   Thursday 3 October
Last-minute paper (TBA)
Speaker TBA (TBA)
15:00 - 15:30   Thursday 3 October
TBA
Speaker TBA (TBA)
15:30 - 16:00   Thursday 3 October
T   E   A   /   C   O   F   F   E   E
16:00 - 16:30   Thursday 3 October
The cake is a lie! Uncovering the secret world of malware-like cheats in video games
Santiago Martin Pontiroli (Kaspersky Lab)
16:00 - 16:30   Thursday 3 October
Cyber espionage in the Middle East: unravelling OSX.WindShift
Patrick Wardle (Digita Security)
16:00 - 16:30   Thursday 3 October
For reserve paper
Reserve speaker (TBA)
16:30 - 17:00   Thursday 3 October
Oops! It happened again!
Righard Zwienenberg (ESET)
Eddy Willems (G DATA)
16:30 - 17:00   Thursday 3 October
Medical IoT for diabetes and cybercrime
Axelle Apvrille (Fortinet)
Aamir Lakhani (Fortinet)
16:30 - 17:00   Thursday 3 October
For reserve paper
Reserve speaker (TBA)

 

Friday 4 October, 2019

Red room

Green room

Small talks

08:30 - 09:30   Friday 4 October
E   A   R   L   Y           M   O   R   N   I   N   G           R   E   F   R   E   S   H   M   E   N   T   S
09:30 - 10:00   Friday 4 October
2,000 reactions to a malware attack - accidental study
Adam Haertle (BadCyber.com / ZaufanaTrzeciaStrona.pl)
09:30 - 10:00   Friday 4 October
Play fuzzing machine - hunting iOS and macOS kernel vulnerabilities automatically and smartly
Lilang Wu (Trend Micro)
Moony Li (Trend Micro)
09:30 - 10:30   Friday 4 October
RetroMal: analysing malware on the earliest computing platforms
Andrew Brandt (Sophos)
10:00 - 10:30   Friday 4 October
TBA
Speaker TBA (TBA)
10:00 - 10:30   Friday 4 October
Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers
Michael Raggi (Proofpoint)
Ghareeb Saad (Anomali)
 
10:30 - 11:00   Friday 4 October
T   E   A   /   C   O   F   F   E   E
11:00 - 11:30   Friday 4 October
I'm not going to die during this conference call: reflections on availability and burnout
Jamie Tomasello (Duo Security)
11:00 - 11:30   Friday 4 October
Rich headers: leveraging the mysterious artifact of the PE format
Peter Kalnai (ESET)
Michal Poslusny (ESET)
11:00 - 12:30   Friday 4 October
Call the shots! Let’s fight crime together
Speaker TBA (NHTCU)
11:30 - 12:00   Friday 4 October
Why companies need to focus on a problem they do not know they have
Richard Matti (NetClean)
11:30 - 12:00   Friday 4 October
Geost botnet. The discovery story of a new Android banking trojan from an OpSec error
Sebastian Garcia (Czech Technical University in Prague)
Maria Jose Erquiaga (UNCUYO University)
Anna Shirokova (Avast)
 
12:00 - 12:30   Friday 4 October
Joining forces: transforming the Industry through diversity and data
Kathleen Whitbey (Palo Alto Networks)
Heather King (Cyber Threat Alliance)
Jeannette Jarvis (Fortinet)
Michelle Martinez (Rapid7)
12:00 - 12:30   Friday 4 October
Asterisk: a targeted VOIPspionage campaign
Lotem Finkelstein (Check Point)
Oded Awaskar (Check Point)
 
12:30 - 14:00   Friday 4 October
L   U   N   C   H
14:00 - 14:30   Friday 4 October
Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation state adversary
Alex Hinchliffe (Unit 42, Palo Alto Networks)
14:00 - 14:30   Friday 4 October
We need to talk - opening a discussion about ethics in infosec
Ivan Kwiatkowski (Kaspersky Lab)
14:00 - 14:30   Friday 4 October
For reserve paper
Reserve speaker (TBA)
14:30 - 15:00   Friday 4 October
Different ways to cook a Crab...
John Fokker (McAfee)
Alexandre Mundo (McAfee)
14:30 - 15:00   Friday 4 October
King of the hill: nation-state counterintelligence for victim deconfliction
Juan Andres Guerrero-Saade (Chronicle)
14:30 - 15:00   Friday 4 October
For reserve paper
Reserve speaker (TBA)
15:00 - 15:30   Friday 4 October
T   E   A   /   C   O   F   F   E   E
15:30 - 16:10   Friday 4 October
Keynote address: TBA
Haroon Meer (Thinkst)
Adrian Sanabria (Thinkst)

(takes place in the Green room)
16:10 - 16:30   Friday 4 October
Conference closing session
Martijn Grooten (Virus Bulletin)

(takes place in the Green room)

Reserve papers

Note: Should no need arise for the reserve papers to replace papers in the main programme, they will be presented in the Small Talks stream on Thursday 3 and Friday 4 October.

Register

Register.jpg

  • Early Bird rate up to and including 30 June 2019: $1705.50 (+VAT)
  • After 30 June 2019: $1895.00 (+VAT)

(Note: In order to comply with UK VAT laws we are obliged to charge 20% VAT on all conference tickets)

Discounts

  • Educational institutions, non-profits and charities: $947.50 (+VAT)
  • Free VB2019 press passes for technology journalists (limited)

Qualify for a discount? Contact us for assistance.

 

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.