Cybersecurity as a professional career
Talk about the opportunities offered by cybersecurity as a professional career.
- Sara Garcia. INCIBE
- Santiago Escobar. Polytechnic University of Valencia.
- Alejandro Blasco Iborra. Official College of Computer Engineers of the Valencian Community.
- Ramón Onrubia. APICV.
- Emilio Soria. University of València.
From sexting to sextorsion and grooming around
Yolanda Corral. Freelance
Sexting, sextorsion, grooming ... more and more present issues on which to focus and throw information. A didactic and practical approach will address what is and what is the sexting and the possible consequences of this consensual practice of exchanging images of an intimate nature that can result in the commission of a crime for dissemination of content without permission, a sextorsion or also in a case of grooming.
Teaching cybersecurity to minors
Juan García Álvarez de Toledo. Talento Corporativo.
Speaking with kids about cybersecurity: tips and strategies.
I want to work in cybersecurity ... and now what?
At the moment when someone decides that their professional future will be related to cybersecurity, a huge range of training possibilities opens up that do not always include passing through the university. It is also important to know what qualities are essential to have or in what areas you have to train specifically depending on the branch to which we want to dedicate ourselves (forensic analysis, Ethical Hacking, Response to incidents, etc.) as well as what personal characteristics you have to have a professional to be well valued in the field of cybersecurity (ethics, ability to share knowledge, etc.). We will also talk about what profiles companies are looking for today in terms of cybersecurity professionals, most demanded work camps and a real approach to market salaries ending with a vision of the profession in the near future.
When a Pentester meets Machine Learning
José Selvi. NCC Group
In this talk we will see how a penetration tester began using Machine Learning techniques to solve certain problems he faced. We will cover two examples of defensive situation such as false positive reduction in Intrusion Detection Systems by using a One-Class classifier, and a random forest approach to detect hostnames used my malware, in particular, generated by a DGA. For each of these examples, we will cover the path from the first approach we took to the final solution, describing all the mistakes and lessons learned.
Threat Hunting and attack simulations
Lórien Doménech Ruiz (Indra) y Carlos Caballero García (Prosegur Ciberseguridad)
An introduction to Threat Hunting will be made, referring to good practices, methodologies and framworks that are used on a daily basis by "threat hunters".
Hardware hacking in embedded systems: from preservation to security
Tomás García-Merás Capote. atSistemas
We’ll discuss different ways for cracking the security hardware devices found on embedded systems, like MCUs or PICs.
From crimeware ransomware to targeted ransomware - Let's evolution the ecosystem
Marc Rivero López. McAfee
In recent incidents in the sector it has been observed that ransomware was the cause of the attack and common elements (TTP) have been extracted with which they have attributed (sometimes incorrectly) the attribution of some of these families.
In the talk, we will talk about how ransomware in the crimeware ecosystem has decreased and how the company-centered approach has grown. It will also detail the operation of these families, in addition to unique characteristics that were not observed before.