Sched.com Conference Mobile Apps
Botconf 2018
has ended
Create Your Own Event
Menu
Schedule
Speakers
Sponsors
Search
Log in
Botconf 2018
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Map
Speakers
Sponsors
Search
or browse by date + venue
Break
Keynote
Organisation
Presentation
All
Live broadcast
Reception
Registration
Short presentation
All
Live broadcast
Workshop
Popular
Popular Events
#1
Registration first day of the conference & coffee
#2
Opening
#3
In-depth Formbook Malware Analysis
#4
APT Attack against the Middle East: The Big Bang
#5
Code Cartographer’s Diary
#6
Chess with Pyotr
#7
Hunting and Detecting APTs using Sysmon and PowerShell Logging
#8
Everything Panda Banker
#9
Leaving no Stone Unturned – in Search of HTTP Malware Distinctive Features
#10
Tracking Actors through their Webinjects
#11
How Much Should You Pay for your own Botnet ?
#12
Internals of a Spam Distribution Botnet
#13
Stagecraft of Malicious Office Documents – A Look at Recent Campaigns
#14
Hunting for Silence
#15
Coffee break
#16
Let’s Go with a Go RAT!
#17
Collecting Malicious Particles from Neutrino Botnets
#18
Trickbot The Trick is On You!
#19
Automation, structured knowledge in Tactical Threat Intelligence
#20
Botception: Botnet distributes script with bot capabilities
#21
Lunch
#22
Cybercrime fighting in the Gendarmerie
#23
The Dark Side of the ForSSHe
#24
WASM Security Analysis Reverse Engineering
#25
Mirai: Beyond the Aftermath
#26
Lunch
#27
The Snake Keeps Reinventing Itself
#28
Swimming in the Cryptonote Pools
#29
Lunch
#30
Coffee break
#31
Judgement Day
#32
Red Teamer 2.0: Automating the C&C Set up Process
#33
Coffee break
#34
Closing ceremony
#35
Cutting the Wrong Wire: how a Clumsy Attacker Revealed a Global Cryptojacking Campaign
#36
Coffee break
#37
Lightning talks
#38
Triada: the Past, the Present, the (Hopefully not Existing) Future
#39
Welcome second day of the conference
#40
How many Mirai variants are there?
#41
Welcome third day of the conference
#42
Cocktail
#43
Reception
#44
WS1 - ExtREme Malware Analysis
#45
Lunch (only for workshop attendees)
#46
Registration workshops
#47
WS2 - Introducing a new Cyber Threat Detection System: How Threat Intelligence Halts Tomorrow’s Botnets
#48
WS3 - Detect, Investigate and Respond using MISP, TheHive & Cortex
Popular by Type
All Types
Break
Keynote
Organisation
Presentation
Reception
Registration
Short presentation
Workshop
Popular by Day
All days
Tuesday, Dec 4
Wednesday, Dec 5
Thursday, Dec 6
Friday, Dec 7