Program
Program
December 3 (Wed.)
December 3 (Wed.)
December 3 (Wed.)
09:50
-
10:00
09:50
-
10:00
09:50
-
10:00
Opening
Opening
Opening
10:00
|
10:35
10:00
|
10:35
10:00
-
10:35
10:50
|
11:25
10:50
|
11:25
10:50
-
11:25
APT
APT
APT
Unmasking MetaRAT: A New PlugX Variant in China-Linked APT Operation
Unmasking MetaRAT: A New PlugX Variant in China-Linked APT Operation
Unmasking MetaRAT: A New PlugX Variant in China-Linked APT Operation
Yoshihiro Ishikawa
LAC Co., Ltd.
Takuma Matsumoto
LAC Co., Ltd.
Yoshihiro Ishikawa
LAC Co., Ltd.
Takuma Matsumoto
LAC Co., Ltd.
Yoshihiro Ishikawa
LAC Co., Ltd.
Takuma Matsumoto
LAC Co., Ltd.
11:40
|
12:15
11:40
|
12:15
11:40
-
12:15
APT
APT
APT
Exploring Timeline and Threat Actor Behind Compromised Ivanti Devices
Exploring Timeline and Threat Actor Behind Compromised Ivanti Devices
Exploring Timeline and Threat Actor Behind Compromised Ivanti Devices
Fyodor Yarochkin
Trend Micro
Fyodor Yarochkin
Trend Micro
Fyodor Yarochkin
Trend Micro
12:15
-
13:25
12:15
-
13:25
12:15
-
13:25
Lunch Break
Lunch Break
Lunch Break
13:25
|
14:00
13:25
|
14:00
13:25
-
14:00
Incident Response
Incident Response
Incident Response
Incident Response at the Edge: Unmasking VPN Breaches
Incident Response at the Edge: Unmasking VPN Breaches
Incident Response at the Edge: Unmasking VPN Breaches
Greg Chen
TeamT5
Greg Chen
TeamT5
Greg Chen
TeamT5
Name
Company
Name
Company
14:15
|
14:50
14:15
|
14:50
14:15
-
14:50
APT
APT
APT
Exploiting Trust: When a Trusted Security Solution Becomes a DPRK Trojan Horse
Exploiting Trust: When a Trusted Security Solution Becomes a DPRK Trojan Horse
Exploiting Trust: When a Trusted Security Solution Becomes a DPRK Trojan Horse
Jeonggak Lyu
The Korea Financial Security Institute (FSI)
Gyuyeon Kim
The Korea Financial Security Institute (FSI)
Sungwook Jang
The Korea Financial Security Institute (FSI)
Jeonggak Lyu
The Korea Financial Security Institute (FSI)
Gyuyeon Kim
The Korea Financial Security Institute (FSI)
Sungwook Jang
The Korea Financial Security Institute (FSI)
Jeonggak Lyu
The Korea Financial Security Institute (FSI)
Gyuyeon Kim
The Korea Financial Security Institute (FSI)
Sungwook Jang
The Korea Financial Security Institute (FSI)
14:50
-
15:15
14:50
-
15:15
14:50
-
15:15
Tea Break
Tea Break
Tea Break
15:15
|
15:50
15:15
|
15:50
15:15
-
15:50
APT
APT
APT
CamoFei Meets the Tali
CamoFei Meets the Tali
CamoFei Meets the Tali
Julian-Ferdinand Vögele
Recorded Future
Still Hsu
TeamT5
Aleksandar Milenkoski
SentinelLabs
Julian-Ferdinand Vögele
Recorded Future
Still Hsu
TeamT5
Aleksandar Milenkoski
SentinelLabs
Julian-Ferdinand Vögele
Recorded Future
Still Hsu
TeamT5
Aleksandar Milenkoski
SentinelLabs
16:05
|
16:35
16:05
|
16:35
16:05
-
16:35
Information Warfare
Information Warfare
Information Warfare
Collaborative Manipulation: China-Russia Information Warfare Targeting Japan
Collaborative Manipulation: China-Russia Information Warfare Targeting Japan
Collaborative Manipulation: China-Russia Information Warfare Targeting Japan
Wataru Suyama
Constella Security Japan inc.
Wataru Suyama
Constella Security Japan inc.
Wataru Suyama
Constella Security Japan inc.
Name
Company
Name
Company
December 4 (Thur.)
December 4 (Thur.)
December 4 (Thur.)
10:00
|
10:35
10:00
|
10:35
10:00
-
10:35
Cybercrime
Cybercrime
Cybercrime
Data Scraping: the Threat Landscape and Best Practices
Data Scraping: the Threat Landscape and Best Practices
Data Scraping: the Threat Landscape and Best Practices
Oded Anderman
Meta Platforms Inc.
Oded Anderman
Meta Platforms Inc.
Oded Anderman
Meta Platforms Inc.
TeamT5
Company
Name
Company
10:50
|
11:25
10:50
|
11:25
10:50
-
11:25
Cybercrime
Cybercrime
Cybercrime
The Modern “Pump-and-Dump” Scheme Targeting the Securities Brokerage Industry
The Modern “Pump-and-Dump” Scheme Targeting the Securities Brokerage Industry
The Modern “Pump-and-Dump” Scheme Targeting the Securities Brokerage Industry
Michael Ching
DarkLab
Ruth Ng
DarkLab
Danni Evans
DarkLab
Michael Ching
DarkLab
Ruth Ng
DarkLab
Danni Evans
DarkLab
Michael Ching
DarkLab
Ruth Ng
DarkLab
Danni Evans
DarkLab
11:40
|
12:15
11:40
|
12:15
11:40
-
12:15
Incident Response
Incident Response
Incident Response
ShortFix: When Social Video Platforms Become Infostealer Delivery Channels
ShortFix: When Social Video Platforms Become Infostealer Delivery Channels
ShortFix: When Social Video Platforms Become Infostealer Delivery Channels
Satoshi Kamekawa
ITOCHU Cyber & Intelligence Inc.
Satoshi Kamekawa
ITOCHU Cyber & Intelligence Inc.
Satoshi Kamekawa
ITOCHU Cyber & Intelligence Inc.
Name
Company
Name
Company
12:15
-
13:25
12:15
-
13:25
12:15
-
13:25
Lunch Break
Lunch Break
Lunch Break
13:25
|
14:00
13:25
|
14:00
13:25
-
14:00
Cybercrime
Cybercrime
Cybercrime
Tracking Criminal Activity in I2P: Evidence and Lessons from Real-World Monitoring
Tracking Criminal Activity in I2P: Evidence and Lessons from Real-World Monitoring
Tracking Criminal Activity in I2P: Evidence and Lessons from Real-World Monitoring
Lorenzo Nicolodi
Microlab.red
Lorenzo Nicolodi
Microlab.red
Lorenzo Nicolodi
Microlab.red
Name
Company
Name
Company
14:15
|
14:50
14:15
|
14:50
14:15
-
14:50
Cybercrime
Cybercrime
Cybercrime
Scaling East: Russian-Speaking Cybercrime Operations, Infrastructure, and AI-Enabled Growth
Scaling East: Russian-Speaking Cybercrime Operations, Infrastructure, and AI-Enabled Growth
Scaling East: Russian-Speaking Cybercrime Operations, Infrastructure, and AI-Enabled Growth
Rachelle Goddin
Team Cymru
Rachelle Goddin
Team Cymru
Rachelle Goddin
Team Cymru
Name
Company
Name
Company
14:50
-
15:15
14:50
-
15:15
14:50
-
15:15
Tea Break
Tea Break
Tea Break
15:15
|
15:50
15:15
|
15:50
15:15
-
15:50
Cybercrime
Cybercrime
Cybercrime
Tracking Network Infrastructure behind Industrial-Scale scams
Tracking Network Infrastructure behind Industrial-Scale scams
Tracking Network Infrastructure behind Industrial-Scale scams
Swapneel Patnekar
Shreshta IT Technologies Pvt. Ltd.
Swapneel Patnekar
Shreshta IT Technologies Pvt. Ltd.
Swapneel Patnekar
Shreshta IT Technologies Pvt. Ltd.
Name
Company
Name
Company
16:05
|
16:40
16:05
|
16:40
16:05
-
16:40
Incident Response
Incident Response
Incident Response
Incident Case Studies and Keys to Rapid Response
Incident Case Studies and Keys to Rapid Response
Incident Case Studies and Keys to Rapid Response
Hajime Yanagishita
MACNICA, Inc.
Taro Imai
MACNICA, Inc.
Hajime Yanagishita
MACNICA, Inc.
Taro Imai
MACNICA, Inc.
Hajime Yanagishita
MACNICA, Inc.
Taro Imai
MACNICA, Inc.
Name
Company