VB2006 conference programme

ICAL

Wednesday 11 October

Corporate stream Technical stream
08:00 Registration
10:00 Tea and coffee
10:30 - 11:00 Opening address
11:00 - 11:40 Case: Virus X
Mikko Hyppönen, F-Secure
11:40 - 12:20 Data exfiltration techniques: how attackers steal your sensitive data
Rob Murawski, CERT Coordination Center
Lunch
14:00 - 14:40 The myth of user education

Stefan Görling, Royal Institute of Technology, Stockholm
  Using expert systems for automated analysis systems: advantages and techniques

Ryan Hicks, iCSA Labs
14:40 - 15:20 User education: teaching techniques and learning styles for damage limitation

Peter Cooper, Sophos
  Real-time multilanguage threat descriptions using an intelligent template system

Oliver Auerbach, Cosmin Ancuta, Robert Harja, Avira
Tea and coffee
15:40 - 16:20 Rootkits: risks, issues and prevention

Martin Overton, IBM Global Services
  AIM for bot coordination

Lysa Myers, McAfee AVERT
16:20 - 17:00 Behavioural modelling of social engineering based malicious software

Matthew Braverman, Microsoft
  Malware in the UbiComp world

Morton Swimmer, IBM Research GmbH
17:00 - 19:00 Sponsor presentations
19.30 Welcome drinks reception

Thursday 12 October

Corporate stream Technical stream
Breakfast
09:00 - 09:40 I know what you did last logon: keystroke logging, spyware and privacy

Jeff Williams, Microsoft
  Full potential of dynamic binary translation for AV emulation engine

Jim Wu, Internet Security Systems
09:40 - 10:20 The (correct) detection of light grey software

Roel Schouwenberg, Kaspersky Lab
  Anti-rootkit safeguards and methods of their bypassing

Aleksander Czarnowski, AVET
Tea and coffee
10:40 - 11:20 Targeted trojan attacks and industrial espionage

Alex Shipp, MessageLabs
  Botnet tracking techniques and tools

Jose Nazario, Jeremy Linden, Arbor Networks
11:20 - 12:00 The challenge of detecting and removing installed threats

Jason Bruce, SophosLabs
  Network-centric behavioural malware prevention: spyware and beyond?

Richard Ford, Gerald Marin, William Allen, Jason Michalske, Florida Institute of Technology
12:00 - 12:40 Dirty money on the wires: the business models of cyber criminals

Guillaume Lovet, Fortinet
  Scanning on the wire

Dr Igor Muttik, McAfee AVERT
Lunch
14:00 - 14:40 The game goes on: an analysis of modern spam techniques

Rob Thomas, Dmitry Samosseiko, SophosLabs
  Spam - recognition by methods independent from text content

Ralf Iffert, Internet Security Systems
14:40 - 15:20 Containing spam - the local challenge

Jay Goldin, Amir Lev, Commtouch Software
  Unattended spam filtering using machine learning: implementation, deployment and lessons

John Graham-Cumming,
Tea and coffee
15:40 - 16:20 Spy-phishing - a new breed of blended threats

Jamz Yaneza, Trend Micro
  Ichthyological anatomy, or a study of phish

Michael Morgan, IBM CERT A/NZ
16:20 - 17:00 Phishing trojan creation toolkits: an analysis of the technical capabilities and the criminal organizations behind them

Dmitri Alperovitch, CipherTrust Inc.
  Exploiting spammers' tactics of obfuscations for better corporate level spam filtering

Vipul Sharma, Steve Lewis, Proofpoint Inc.
17:00 - 17:40 Panel discussion: Anti-Spyware Coalition - working together to combat spyware
Chaired by Richard Baldry, Sophos
17:40 - 18:40 Sponsor presentations
19:30 Pre-dinner drinks followed by gala dinner & cabaret

Friday 13 October

Corporate stream Technical stream
Breakfast
09:40 - 10:20 Applying collaborative anti-spam techniques to anti-virus

Adam J. O'Donnell, Vipul Ved Prakash, Cloudmark Inc.
  Evolving shell code

Masaki Suenega, Symantec Security Response
Tea and coffee
10:40 - 11:20 The inspector: automating the forensic investigation of infected computers

John Morris, Eric Kedrosky, Nortel
  Analysis and replication of Unix malware

Patrick L. Knight, Authentium
11:20 - 12:00 Can strong authentication sort out phishing and fraud?

Paul Ducklin, Sophos
  Loathing Lupper in Linux

Jakub Kaminski, CA
12:00 - 12:40 Early fraud detection using a hybrid of messaging reputation and web activity

Phyllis Schneck, CipherTrust Inc.
  Macintosh OSX binary malware

Marius van Oers, McAfee AVERT
Lunch
14:00 - 14:40 Everything I needed to know about computer security I learned from my dog and a country-western song

Sarah Gordon, Symantec
  SymbOS malware classification problems

Dr Vesselin Bontchev, FRISK Software International
14:40 - 15:20 Microsoft Antivirus - extortion, expedience or the extinction of the AV industry?

Randy Abrams, ESET
  A deep look into Symbian threats

Robert X. Wang, Symantec
Tea and coffee
15:40 - 16:20 The Common Malware Enumeration Initiative

Desiree Beck, Julie Connolly, The MITRE Corporation
  Me code write good - the l33t skillz of the virus writer

John Canavan, Symantec
16:20 - 17:00 Panel discussion: Fighting cybercrime: one size does NOT fit all!
'The Internet Strike Force', led by David Perry, Trend Micro
17:00 - 17:15 Conference closing session

Quick Links

Poll
Should software vendors extend support for their products on Windows XP beyond the end-of-life of the operating system?
Yes - it keeps their users secure
No - it encourages users to continue to use a less secure OS
I don't know
Leave a comment
View 23 comments

SMI Oil and Gas Cyber Security 2014

Jobs
In Virus Bulletin's jobs pages among others:

Virus Bulletin currently has 231,303 registered users.