Inicio

Contenido Inicio

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • speaker: Estevenson Solano
  • Topic: Cybersecurity gobernance
  • Content of the workshop:
    • Governance, Risk and Compliance (GRC)
    • Controls Management
    • Laboratory 1
    • Regulations, Standards and Frameworks
    • Organisational Security Policies
    • Laboratory 2
    • Privacy and Sensitive Data
    • Integrative Laboratory 

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Eloy Velasco Núñez
  • Topic: International law applicable to cyberspace.
  • Content of the workshop:
    • Regulatory scope of cybersecurity in the European Union: present and future.
    • Practical compliance: criminal prevention and avoidance or reduction of risks in the use of technology. Mr. Eloy Velasco. High Court judge.
    • Technological enterprise and technologized enterprise: towards a horizon of normality post-COVID-19.
       

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Javier Marcos de Prado
  • Topic: Digital Forensics and Incident Response (DFIR).
  • Content of the workshop:
    • Introduction to the need to deploy detection infrastructure, in both corporate and production environments, using practical examples. 
    • List of the steps necessary for the automation and deployment of osquery as an agent within a distributed and scalable network.
    • Showcase of the centralised server or TLS endpoint (osctrl), and the configuration and use of its different components for threat detection, incident response and fleet management.

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Pablo San Emeterio
  • Topic: security advisories and vulnerability identification.
  • Content of the workshop:
    • Introduction X86 Architecture.
    • Introduction disassemblies.
    • Searching for vulnerabilities in the code.
    • Vulnerability verification.
    • Exploitation of the vulnerability.
    • Bypassing protections.
       

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Lorenzo Martínez Rodríguez
  • Topic: Digital Forensics and Incident Response (DFIR).
  • Content of the workshop:
    • Security incidents.
    • Live response vs. post-mortem.
    • Types of forensic artefacts: user, system and file system.
    • Triage with Wintriage!
    • Artifact analysis in Windows: Registry, Trash, Navigation and MFT.
       

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Jose Luis Navarro Adam
  • Topic: security advisories and vulnerability identification
  • Index:
    • Description of the workshop and objective to be achieved
    • Deployment of the infrastructure and segmentation of perimeter zones on virtual machines
    • Perimeter Firewall configuration 
    • Deployment and configuration of the SIEM server
    • Installation and configuration of the detection and response scripts 
    • Wargames
    • Questions

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speakers: Iván Portillo Morales and Gonzalo Espinosa Lázaro
  • Topic: cyber threat intelligence.
  • Content of the workshop:
    • The threat to be addressed (Hacktivism).
    • Development of the case study:
      • Phase 1: Direction and Planning.
      • Phase 2: Procurement.
      • Phase 3: Analysis and Elaboration.
      • Phase 4: Dissemination
    • Conclusions and summing up.

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Carlos Seisdedos
  • Topic: Open Source INTelligence (OSINT).
  • Content of the workshop:
    • Intelligence.
    • Securing the working environment.
    • Website research.
    • Investigation of natural persons.
    • Investigation of legal persons.
    • Gathering information on social networks.
    • Social network analysis.
    • Presentation of results.
    • Final online test.
       

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Ricardo J. Rodríguez
  • Topic: Digital Forensics and Incident Response (DFIR).
  • Content of the workshop:
    • Introduction (memory forensics, process forensics, malware, incident response).
    • Preliminary concepts (structure of a process on Windows and Linux).
    • Phases of malware analysis vs. phases of forensic analysis.
    • Collecting information of interest through Volatility.
    • Detecting indicators of compromise.
    • Development of own analysis tools.
    • Design of evidence analysis workflows.
       

Webinar
3h
PLACE OF CELEBRATION
Webinar
DURATION
3h
DESCRIPTION
  • Speaker: Carlos Cilleruelo
  • Topic: cryptocurrencies and bank fraud.
  • Content of the workshop:
    • Context of the use of cryptocurrencies. Not everything is Bitcoin, explaining that there are multiple types, each with its own characteristics. 
    • What crimes are associated with cryptocurrencies? What cryptocurrencies are used in crime?
    • Use of cryptocurrencies in dark markets. Operation of markets for the sale of drugs or weapons on darknets. 
    • Ransomware and its combination of cryptocurrencies. 
    • Tax evasion using cryptocurrencies. Use of ATMs to launder cryptocurrencies. 
    • Other types of laundering using online gambling platforms or debit cards.
    • Where are cryptocurrencies stored? Introduction to forensic analysis of wallets and communication exchanges. 
    • Cryptocurrency analysis tools. What tools are there to analyse cryptocurrency transactions? 
    • Crime analysis using Graphsense (Practical part of the workshop).
    • Current and future issues in the analysis of cryptocurrencies centred on anonymity.