FloCon 2021 Presentations and courses
Video recordings of presentations and courses from FloCon 2021.
Publisher:
Software Engineering Institute
Abstract
Video recordings of presentations and courses from the virtual FloCon 2021 conference.
Collection Contents
-
FloCon 2021 Keynote Address "Data Inspired Doing"
September 15, 2021 • Video
Dr. Ambareen Siraj, Keynote Address "Data Inspired Doing"
watch -
FloCon 2021 Keynote Address: Using Data to Defend
June 23, 2021 • Video
Dr. Lauren Deason of Facebook delivers the Keynote Address for FloCon 2021: "Using Data to Defend"
watch -
InSightNG: A System for Improving the Analyst Workflow Using Behavior Based Host Detection
June 23, 2021 • Presentation
By Angel Kodituwakku (University of Tennessee, Eboni Thamavong (X8, Full Spectrum Engagement)
This presentation describes a scalable distributed system to identify hosts based on behavior rather than addresses.
read -
GHOSTS in the Machine: Orchestrating a Realistic Cybersecurity Exercise Battlefield
June 3, 2019 • Presentation
By Dustin D. Updyke
This presentation provides details about a software tool called GHOSTS that the SEI developed to improve the realism of training environments by creating simulated characters through the use of sophisticated artificial intelligence.
read -
How Cyber Insurance Companies Determine Cyber Risk
June 23, 2021 • Video
To develop an accurate and useful cybersecurity score, we need a holistic understanding of the risk environment. This talk will discuss the typical avenues companies currently use to determine cyber risk.
watch -
Real-Time, Data-Driven Risk Management
June 23, 2021 • Video
In this presentation, we will discuss and demonstrate our solution built on the Splunk Big Data platform with analytics for monitoring and assessing the NIST 800-53 Rev 4 security controls and an integrated workflow based on the NIST Risk Management Frame
watch -
Microservice-Aware Reference Monitoring through Hybrid Program Analysis
June 23, 2021 • Presentation
By Teryl Taylor (IBM Research)
In this talk, we present a microservice-aware reference monitor (MRM) for enforcing stateful security policies over lightweight system call traces produced by the SysFlow pipeline.
read -
A Pluggable Edge-Processing Pipeline for SysFlow
June 23, 2021 • Presentation
By Teryl Taylor (IBM Research)
This talk will introduce a new stream processing and edge analytics pipeline for SysFlow. The pipeline is implemented as a multi-threaded, pluggable framework that enables custom analytics on SysFlow data streams.
read -
Traffic Analysis for Website Prediction
September 15, 2021 • Video
We will show that network traffic analysis can still be performed by looking at the metadata of the network traffic, which consists only of the size of each network packet.
watch -
Applying Text Analytics to Insider Threat Detection
September 15, 2021 • Video
By Daniel L. Costa, Carrie Gardner
In this talk, we discuss how text analytics can be used to enhance an organization's insider risk management practices, highlight the state of the practice, identify current limitations, and present strategies for incorporating text analytic capability.
watch -
Characterizing Packet Linearity
September 15, 2021 • Video
Using features of network flow metadata, we propose a method for producing a generalizable baseline to support operational analysis on established networks.
watch -
Introduction to Data Science - Concepts & Techniques
September 15, 2021 • Video
By Andrew Fast, PhD (CounterFlow AI)
This course provides an accessible introduction to foundational data science concepts, terminology, and approaches using cybersecurity examples and use cases.
watch -
Cybersecurity Data Science (CSDS): Emerging Trends
September 15, 2021 • Video
By Scott Mongeau (SAS)
Cybersecurity Data Science (CSDS) encompasses the rapidly growing practice of applying data science to prevent, detect, and remediate cybersecurity threats.
watch -
Collecting Wire Data at Household Speeds
September 15, 2021 • Video
With a focus on network defense, this talk will review some of the ways that have been used to collect, collate, and analyze wire data and other data on the speaker's home network.
watch -
Intrusion Analysis and Threat Hunting with Open Source Tools
September 15, 2021 • Video
By Josh Stroschein (Open Information Security Foundation - OISF)
In Intrusion Analysis and Threat Hunting with Open Source Tools, you will learn how to dig deep into network traffic to identify key evidence that a compromise has occurred, deal with new forms of attack, and search for evidence of breaches.
watch -
Improving Cyber Security Operations Through Security Data Discipline
September 15, 2021 • Video
Security Data Discipline is an analytical framework that helps security teams collect and use the right data to defend networks more effectively.
watch