We are calling for presentations on security intelligence. The focus for 2019 are case studies of successful attacks, capabilities of adversaries, and metrics of threat analysis. The IT environment has evolved. The Internet of Things is spreading. Access technology has pushed more devices, organisations, and individuals online. Most software now lives in a world filled with ubiquitous networking, complex trust-relationships, and the increased flow of information between all kinds of platforms, services, layers, and parties.
We are especially interested in analysing aspects of combined operations where social engineering, disinformation, attacks on digital infrastructure, and abuse of data are chained together. Ubiquitous networking, complex trust-relationships, use of social media, and the steady flow of information from the inside to the outside is the perfect stage for these advanced threats. During the past years a number of attacks have been tied to a geopolitical context. Cybercrime
plays a role next to nation state agendas. The incidents landing on the doorstep of security operations centres may be a result of both worlds. It is increasingly difficult to clearly distinguish between both areas given the technological capabilities of the adversaries. Attribution is hard, but it is impossible without an in-depth analysis of all available (and retrievable) information.
Ask for CfP details by email: https://deepsec.net/contact.html