- 13
- 771
Assoc. of Cyber Forensics & Threat investigators
United Kingdom
เข้าร่วมเมื่อ 15 ก.ย. 2021
A forum in the United Kingdom focusing on the academics and practitioners of cybersecurity, digital forensics, incident response, and threat investigations and their influence on society. Our main aim is to inspire the next generation of underrepresented groups to flourish by creating a learning community of researchers, academics, practitioners, and students that connects future cybersecurity practitioners and researchers on campus with leading academics and industry professionals.
DFIR Stream 0xD
"Cybersecurity & Open Source Policy" by Daniel Appelquist, Samsung Electronics.
Abstract: Dan will discuss the importance of open-source security for the essential digital infrastructure we all rely on. He will explore initiatives by organizations like OpenSSF to enhance open-source security and explain how these efforts integrate with emerging regulatory frameworks, such as the EU Cyber Resilience Act (CRA).
More Info: www.acfti.org/news-events/dfir-stream-0xd
Abstract: Dan will discuss the importance of open-source security for the essential digital infrastructure we all rely on. He will explore initiatives by organizations like OpenSSF to enhance open-source security and explain how these efforts integrate with emerging regulatory frameworks, such as the EU Cyber Resilience Act (CRA).
More Info: www.acfti.org/news-events/dfir-stream-0xd
มุมมอง: 28
วีดีโอ
DFIR Stream 0xC
มุมมอง 6128 วันที่ผ่านมา
"Responsible AI and Cross-Border Compliance for Global Business" by Dr. Engr. Muslim Jameel Syed, Atlantic Technological University. Abstract: Artificial Intelligence (AI) is transforming industries but raises ethical and regulatory concerns, from bias and privacy issues to compliance challenges. This talk explores the history of AI, the pitfalls of current approaches, and the urgent need for r...
DFIR Stream 0xB
มุมมอง 684 หลายเดือนก่อน
"Cybercrime Landscape in 2024" by Stephanie Corvese, Grant Thornton LLP. Abstract: In today's digital age, cyber threats have become increasingly sophisticated and widespread. With years of experience in cybersecurity, Stephanie will explore the various types of cybercrime that pose risks to individuals and organizations alike. From traditional malware and phishing attacks to advanced ransomwar...
DFIR Stream 0xA
มุมมอง 397 หลายเดือนก่อน
"How to Detect when Residential IP Proxies are Used as a Botnet" by Dr. Elisa Chiapponi, Amadeus IT Group. Abstract: Residential IP Proxies (RESIPs) enable proxying out requests from vast networks of residential devices without inserting any information revealing it. Despite legitimate uses, these proxies have been associated with malicious activities, particularly in the context of web scrapin...
DFIR Stream 0x9
มุมมอง 397 หลายเดือนก่อน
"Low-Level Hardware Information Assisted Approach Towards System Security" by Dr. Chen Liu, Clarkson University. Abstract: Cyber-attacks come in many different shapes and forms. In order to combat against the modern cyber-attacks, cyber-security researchers have to play the game of “cat and mouse” in analyzing and discovering the vulnerabilities of the system to come out on top against the mali...
DFIR Stream 0x8
มุมมอง 437 หลายเดือนก่อน
"Malware Detection in Memory Forensics: Open Challenges and Issues" by Dr. Ricardo J. Rodríguez, University of Zaragoza. Abstract: Memory forensics is one of the steps of computer forensics, related to the analysis of digital evidence collected from the memory of the system under analysis after a computer incident. Memory forensics can be useful for recovering encryption keys, fileless malware,...
DFIR Stream 0x7
มุมมอง 318 หลายเดือนก่อน
"Bringing User Sovereignty to Smartphones" by Dr. Shweta Shinde, ETH Zurich. Abstract: Modern smartphones are complex systems where control over phone resources is exercised by phone manufacturers, operators, OS vendors, and users. These parties have diverse and often competing interests. Barring some exceptions, users, including developers, entrust their security and privacy to OS vendors (And...
DFIR Stream 0x6
มุมมอง 448 หลายเดือนก่อน
"Operationalizing Machine Learning for Networks" by Shinan Liu, University of Chicago. Abstract: The landscape of computer networking has witnessed a rapid expansion, with machine learning (ML) models playing an increasingly vital role in network management, such as service recognition, QoE measurement, activity recognition, and intrusion detection. Operationalizing ML in networking, unlike tra...
DFIR Stream 0x5
มุมมอง 698 หลายเดือนก่อน
"A Holistic Approach to Cybersecurity Readiness: Application of the Commitment-Preparedness-Discipline Framework" by Dr. Dave Chatterjee, University of Georgia. Abstract: Dr. Chatterjee will draw upon his empirically derived Commitment-Preparedness-Discipline (CPD) framework to present a holistic approach to cybersecurity readiness. More specifically, he will speak to several success factors an...
DFIR Stream 0x4
มุมมอง 689 หลายเดือนก่อน
"Combating Targeted Ransomware Through Threat Hunting" by Amr Thabet, Founder of MalTrak. Abstract: This presentation will focus on understanding APT attacks & targeted ransomware attacks, why your security is failing you, and lastly, the step-by-step guide to implementing continuous threat hunting in your organizations to combat these attacks. More Info: www.acfti.org/news-events/dfir-stream-0x4
DFIR Stream 0x3
มุมมอง 709 หลายเดือนก่อน
"Security Enhancements for 5G Wireless Networks" by Professor Maode Ma, College of Engineering, Qatar University Abstract: Recently, the Fifth Generation (5G) wireless network has become a major carrier for wireless communications that supports the Internet of Everything and large-scale heterogeneous connections. Nowadays, 5G wireless networks have been deployed in many countries in the world, ...
DFIR Stream 0x1
มุมมอง 669 หลายเดือนก่อน
"Principles and Practice of Software Forensics" by Bob Zeidman, President of Zeidman Consulting Abstract: Software copyright infringement and trade secret theft are problems of growing concern. Software code theft may be purposeful to gain an unfair advantage over a competitor, or it may be unintended as when a programmer takes code from one project and uses it in another project without first ...
DFIR Stream 0x2
มุมมอง 14610 หลายเดือนก่อน
"Securing the IoT: Harnessing Deep Learning for Robust and Interpretable Intrusion Detection" by Dr. Antonio Montieri, University of Naples Federico II, and Dr. Domenico Ciuonzo, University of Naples Federico II. Abstract: In recent years, IoT traffic proliferation has been exponential and is poised for further escalation. With IoT devices being vulnerable targets for cyber-attacks, there is an...