Agenda

 

Registration 0830-0900

Briefings 0900-1700

Drinks 1700-1800

 

WElcome

John Hultquist, CYBERWARCON

KeyNote - INFOSEC 1930

Thomas Rid, Johns Hopkins University

Bears in the Lines: Russian Critical Infrastructure Espionage in the Face of U.S. Electric Grid Resilience

Chris Sistrunk and Alex Orleans, FireEye

“False Leaks”: A Network Lens on Cyber-enabled Information Operations

Camille François, Graphika

An Analysis of Micro and Macro Cyber Attacks in the Ongoing War in Yemen

Allan Liska, Winnona DeSombre, CW Walker, and Greg Lesnewich, Recorded Future

Are US Cyber Deterrence Operations Suppressing or Inciting Attacks?

Jason Healey and Neil Jenkins, Columbia University and Cyber Threat Alliance

DISINFORMATION OR DEBATE? FINDING SIGNAL AMID POLITICAL NOISE

Olga Belogolova and Madelyn Wilson, Facebook

LIGHTNING TALK - TEMP.Veles: On the trail of TRITON

Nathan Brubaker and Mike Matonis, FireEye

LIGHTNING TALK - Houthi Information Operations

Dan O’Keefe, Johns Hopkins University

lightning talk - BARELY Whispering

Kurt Baumgartner, Kaspersky

LIGHTNING TALK - Outsourcing Cyberwar

Cristiana Brafman Kittner and Kimberly Goody, FireEye

LIGHTNING TaLK - Iran’s Decade of Soft War: Dissidents, Trolls, and Khamenei

Simin Kargar, Harvard University

LIGHTNING TaLK - Behind the Next Destructive Attack

Adam Meyers, Crowdstrike

Unrestricted Warfare on Campus: Chinese Information Operations and American Higher Education

Lauren Cooper, Carnegie Mellon University

Revisiting Known Perps: Behavioral Profiling for Continuous Monitoring of Threat Actors

Juan Andrés Guerrero-Saade, Chronicle

Influencer Vaccine: Identifying Information Operations Infrastructure Using Cyber Threat Intelligence

Kyle Ehmke, ThreatConnect

GreyEnergy: Beyond BlackEnergy and NotPetya

Robert Lipovsky and Anton Cherepanov, ESET

Closing Remarks

Toni Gidwani and Jennifer Weedon, ThreatConnect and Facebook

 

November 28, 2018

Hilton Arlington

Arlington, Virginia