Program Overview

The FIRST Technical Colloquium (TC) event will be held in March 14-16, 2012 at NTT WEST (NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION) Training Center in Osaka, Japan. The Osaka TC will consist of a presentation track, hands-on classes, and the 2nd Global Vulnerability Reporting Summit.

Please note: the program schedule is not in its final version, adjustments will occur.

Wednesday, 14 March

Presentation Track
Room 1
Summit Days
Room 4
11:00 – 13:00

Registration

13:00 – 13:10

Opening remarks

13:10 – 14:10
 FI

Keynote: STATE OF THE NET

Mikko Hypponen (F-Secure, FI)

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

13:10 – 15:00

14:10 – 15:00
 JP

Keynote: A new cyber attack detection technology for future factory systems

Takeshi Yoneda (Mitsubishi Electric Research Laboratories, JP)

15:00 – 15:30

Break

15:30 – 16:20
 UK

Patching cars

Gaus Rajnovic (Panasonic, UK)

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

15:30 – 17:40

16:20 – 17:40
 LU

Reigning in the raw Power of PyMISP thanks to Python

Steve Clement (CIRCL, LU)

17:00 – 17:40
 LV

Beyond paste monitoring: deep information leak analysis

Jānis Džeriņš (CERT.LV, LV)

18:00 – 20:00

Communication Lounge

Thursday, 15 March

Presentation Track
Room 1
Hands-on
Room 2
Hands-on
Room 3
Summit Days
Room 4
09:00 – 09:10

Opening remarks

09:10 – 10:00
 SG

Keynote: A Multi-Stakeholder Approach in the Fight Against Cybercrime

Tang Kok Leong, Augustus (Interpol, SG)

MISP Training

Steve Clement and Andras Iklody (CIRCL)

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

10:00 – 10:30

Break

10:30 – 11:20
 KR

What happened to your home? IoT Hacking and Forensic with 0-Day

Moonbeom Park (KISA, KR) and Yongseon Choi (Raon Secure, KR)

MISP Training

Steve Clement and Andras Iklody (CIRCL)

10:30 – 12:00

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

10:30 – 12:00

11:20 – 12:00

FIRST Board and Team Updates

12:00 – 13:30

Lunch

13:30 – 14:20
 TW

Your good roommates: Friendly IoT devices

TimYeh, DoveChiu and Kenney Lu (Trendmicro, TW)

TBD

Krassimir Tzvetanov (Fastly, Inc.), US

13:30 – 15:00

MISP Training

Steve Clement and Andras Iklody (CIRCL)

13:30 – 15:40

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

13:30 – 15:40

14:20 – 15:00
 AU

CERT/CSIRT Engagements Experience inDeveloping Asia Pacific Economies

Adli Wahid (APNIC, AU)

15:00 – 15:40
 US

Scaling Properties of Software and System Security

Paul Vixie (Farsight Security, US)

15:40 – 16:10

Break

16:10 – 17:00
 US

Big Expensive Problems in Cheap Little Things

Thomas Millar (US-CERT, US)

MISP Training

Steve Clement and Andras Iklody (CIRCL)

16:10 – 18:30

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

16:10 – 18:30

17:00 – 17:50
 LV

Die Hard 104: Attacking and Controlling IEC-60870-5-104 Protocol-Based ICS/SCADA IoT Network Devices

Bernhards Blumbergs (CERT.LV, LV)

17:50 – 18:30
 MY

Coping with fast and furious cyber threats - Malaysia CERT Experience

Megat Muazzam Abdul Mutalib (MyCERT, MY)

19:00 – 21:00

Restaurant in Training Center

Friday, 16 March

Presentation Track
Room 1
Hands-on
Room 2
Hands-on
Room 3
Summit Days
Room 4
09:00 – 09:10

Opening remarks

09:10 – 10:00
 JP

ICT-ISAC's activity on IoT security

Satoshi Noritake (ICT-ISAC, JP)

 JP

Digital Forensics & Incident Response Against Targeted Attacks

Hiroshi Suzuki, Hisao Nashiwa and Minoru Kobayashi (IIJ, JP)

 FR

Incident Response and Cyber Threat Intelligence with TheHive, Cortex & MISP

Saâd Kadhi (TheHive Project, FR)

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

10:00 – 10:30

Break

10:30 – 11:10
 LU

Fail frequently to avoid disaster, or how to organically build a threat intel sharing standard

Andras Iklody (CIRCL, LU)

 JP

Digital Forensics & Incident Response Against Targeted Attacks

Hiroshi Suzuki, Hisao Nashiwa and Minoru Kobayashi (IIJ, JP)

10:30 – 12:00

 FR

Incident Response and Cyber Threat Intelligence with TheHive, Cortex & MISP

Saâd Kadhi (TheHive Project, FR)

10:30 – 12:00

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

10:30 – 12:00

11:10 – 12:00
 PL

Parents' view on Internet of Toys

Przemek Jaroszewski and Anna Rywczynska (CERT Polska/NASK, PL)

12:00 – 13:30

Lunch

13:30 – 14:20
 ES

The day your IP camera took down a website: An In-Depth Analysis of Emerging IoT Botnets

Fernando Díaz Urbano (Koodous, ES)

 JP

Digital Forensics & Incident Response Against Targeted Attacks

Hiroshi Suzuki, Hisao Nashiwa and Minoru Kobayashi (IIJ, JP)

13:30 – 15:10

 FR

Incident Response and Cyber Threat Intelligence with TheHive, Cortex & MISP

Saâd Kadhi (TheHive Project, FR)

13:30 – 15:10

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

13:30 – 15:10

14:20 – 15:10
 JP

All your base are belong to our Red Team

Ryo Mishina and You Nakatsuru (Secureworks, JP)

15:10 – 15:40

Break

15:40 – 16:20
 BR

Team Cymru IoT Research

Jacomo Piccolini (Team Cymru, BR)

 JP

Digital Forensics & Incident Response Against Targeted Attacks

Hiroshi Suzuki, Hisao Nashiwa and Minoru Kobayashi (IIJ, JP)

15:40 – 17:10

 FR

Incident Response and Cyber Threat Intelligence with TheHive, Cortex & MISP

Saâd Kadhi (TheHive Project, FR)

15:40 – 17:10

2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

15:40 – 17:10

16:20 – 17:10
 IN

A new innovative system to handle an Incident in an organized and guided way

Venkat Ramshet (Flexible IR, IN)

17:10 – 17:20

Closing remarks