Increasing Packet visibility with Scapy and Python

Ian Redden Scapy is a Python library that enables the user to send, sniff and dissect packets on a network.  When Scapy is combined with Python, it creates a powerful tool to increase visibility into packets beyond what both open source and commercial tools provide the analyst.  This presentation will discuss the benefits of

Read more

Quit Thinking in Colors

Russell Nolen Quit Thinking In Colors is based upon the concept that over the past decade we have completely missed the concept of offense in enterprise security. The old way of thinking – in terms of red, blue, and purple teams – must be thrown out and a new way of thinking ushered in. We 

Read more

Civil Nuclear Power – The Cyber Security Perspective

Guido Gluschke The threat from cyber-attacks is increasingly perceived as a problem of national and international security as cyber-attacks grow in number and sophistication and as perpetrators are no longer only private hackers or organized criminals, but also nation states. Likewise, attacks once confined to standard computer systems, or

Read more

Artificial Intelligence versus Malware

Keith Rayle Due to the wide range of readily-available resources for creating malicious payloads, such as coders for hire and Software as a Service, malware is an exponentially growing issue. Threat actors are able to rapidly assemble and deploy high volumes and varieties of malicious code to unsuspecting users. Current malware management

Read more

How to Succeed at Multinational Cyber Engagements

Christopher Spirito Providing support to US partner nations and international agencies such as the UN and IAEA on developing cybersecurity capabilities and establishing multinational relationships requires addressing a special set of challenges. The central set of challenges that drive the success of these capacity building projects include:

Read more

Outsmarting Email Hackers Using AI and Machine Learning

Albert Kramer Email hacking is a commonly used malicious tactic in our increasingly connected world. Cybercriminals compromise email accounts to enter the IT premises of an organization and carry out attacks ranging from fraud and spying to information and identity theft. Without effective security measures to stop email hacks, potential

Read more