Inicio

Contenido Inicio

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Ruth Sala Ordoñez
  • Topic: Technological research and case law
  • Content of the workshop: The ease of access to the Internet has fostered the growing use of the Internet as a facilitating instrument of searches by investigators for any data that helps to find out the crime and the identity of the criminals. The workshop places special emphasis on all the roles that admit the use of the supposed identity for the investigation, the suspicions derived from obtaining the evidences of the virtual environment and its possible qualification as legal or illegal. 
    • Results of the previous questionnaire.
    • Normative, legal and doctrinal study of the undercover agent and the undercover online agent. 
      • Principles of action, limits to its activity, probative value of the results obtained with its activity.
    • The intelligence report obtained in open sources OSINT. 
      • Concept and fundamentals.
      • The subject responsible for the OSINT intelligence report (Judicial Police Agent; the individual investigator; the expert).
      • The supposed identity: consequences of the incorporation into the judicial process of the evidence obtained under the presumed identity. 
      • The probative value of the OSINT report.

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Pablo Ballarin Usieto
  • Topic: Risk management in adopting emerging technologies
  • Content of the workshop:
    • Introduction
    • Cybersecurity risks in emerging technologies
      • Concepts
      • Particularities of IOT/IA architectures and their vulnerabilities
      • Attack vectors and types of attacks on AI/IOT platforms
      • Theoretical risk analysis of an IA/IOT platform
      • Baseline for securitisation of an IA/IOT platform
      • Real-life example of a risk analysis of a Brain-Computer Interface product.
      • Class exercises: identifying risks in given scenarios and defining protection baselines.
    • Ethical risks in emerging technologies
      • Ethical principles in emerging technologies
      • User and societal impact
      • Applications that do not follow these principles
      • What is trusted AI?
      • Example guidelines: EU Ethical Design Guidance, Montreal Ethical AI Declaration, Beijing AI Principles
      • Aligning AI with ethical principles
      • Real-life example of an assessment of the ethical principles of an AI
      • Exercises: Identifying issues in given scenarios, and finding possible approaches to solutions
         

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • speaker: Estevenson Solano
  • Topic: Cybersecurity gobernance
  • Content of the workshop:
    • Governance, Risk and Compliance (GRC)
    • Controls Management
    • Laboratory 1
    • Regulations, Standards and Frameworks
    • Organisational Security Policies
    • Laboratory 2
    • Privacy and Sensitive Data
    • Integrative Laboratory 

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Eloy Velasco Núñez
  • Topic: International law applicable to cyberspace.
  • Content of the workshop:
    • Regulatory scope of cybersecurity in the European Union: present and future.
    • Practical compliance: criminal prevention and avoidance or reduction of risks in the use of technology. Mr. Eloy Velasco. High Court judge.
    • Technological enterprise and technologized enterprise: towards a horizon of normality post-COVID-19.
       

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Javier Marcos de Prado
  • Topic: Digital Forensics and Incident Response (DFIR).
  • Content of the workshop:
    • Introduction to the need to deploy detection infrastructure, in both corporate and production environments, using practical examples. 
    • List of the steps necessary for the automation and deployment of osquery as an agent within a distributed and scalable network.
    • Showcase of the centralised server or TLS endpoint (osctrl), and the configuration and use of its different components for threat detection, incident response and fleet management.

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Pablo San Emeterio
  • Topic: security advisories and vulnerability identification.
  • Content of the workshop:
    • Introduction X86 Architecture.
    • Introduction disassemblies.
    • Searching for vulnerabilities in the code.
    • Vulnerability verification.
    • Exploitation of the vulnerability.
    • Bypassing protections.
       

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Lorenzo Martínez Rodríguez
  • Topic: Digital Forensics and Incident Response (DFIR).
  • Content of the workshop:
    • Security incidents.
    • Live response vs. post-mortem.
    • Types of forensic artefacts: user, system and file system.
    • Triage with Wintriage!
    • Artifact analysis in Windows: Registry, Trash, Navigation and MFT.
       

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Jose Luis Navarro Adam
  • Topic: security advisories and vulnerability identification
  • Index:
    • Description of the workshop and objective to be achieved
    • Deployment of the infrastructure and segmentation of perimeter zones on virtual machines
    • Perimeter Firewall configuration 
    • Deployment and configuration of the SIEM server
    • Installation and configuration of the detection and response scripts 
    • Wargames
    • Questions

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speakers: Iván Portillo Morales and Gonzalo Espinosa Lázaro
  • Topic: cyber threat intelligence.
  • Content of the workshop:
    • The threat to be addressed (Hacktivism).
    • Development of the case study:
      • Phase 1: Direction and Planning.
      • Phase 2: Procurement.
      • Phase 3: Analysis and Elaboration.
      • Phase 4: Dissemination
    • Conclusions and summing up.

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Carlos Seisdedos
  • Topic: Open Source INTelligence (OSINT).
  • Content of the workshop:
    • Intelligence.
    • Securing the working environment.
    • Website research.
    • Investigation of natural persons.
    • Investigation of legal persons.
    • Gathering information on social networks.
    • Social network analysis.
    • Presentation of results.
    • Final online test.