Friday July 8th, 2024 Times in GMT+2 | |
---|---|
13:30 - 14:15 | Keynote: Sebastian Garcia Topic: Engage your enemy Technology advanced enough to make honeypots and deception useful again, increasing the role of active defense in protecting our organizations. While still learning how to design, administer, monitor, and decommission our deception, there is an old aspect of defense that should be revised: engaging. Once the attacker is inside our organization, it may be a good idea to consider attacking them. This is a tough decision with the fear of false positives, but that can pay off if done correctly. Don’t let attackers wander inside your network without consequences |
14:15 - 14:45 | Modeling a Cyber Deception Practitioner’s Approach Tim Pappa, Walmart Global Tech |
14:45 - 15:15 | Application Layer Cyber Deception without Developer Interaction Mario Kahlhofer, Dynatrace Research |
15:00 - 15:55 | BREAK |
15:35 - 16:05 | False Flavor Honeypot: Deceiving Vulnerability Scanning Tools Tillmann Angeli, German Research Center for Artificial Intelligence GmbH |
16:05 - 16:25 | Game Theoretic Framework for Multi Domain Cyber Deception Ahmed Hemida, DEVCOM Army Research Laboratory |
16:25 - 16:45 | LLM in the Shell: Generative Honeypots Muris Sladić, Czech Technical University in Prague |
16:45 - 17:05 | Redundant Position-based Rogue Access Point Detection Wenjie Liu, KTH Royal Institute of Technology |
17:05 | End Closing remarks + Best (short/long) paper award |