FloCon® 2025
March 4-6, 2025 | Pittsburgh, Pennsylvania
Situational Awareness: Beyond the Network
With the enormous amounts of data from ever-expanding sources, how can we apply the power of scalable analytics to this large-scale data to protect our systems from cyber threats—both internal and external? This year's theme focuses on using these analytics to safeguard organizations and networks.
If you’ve attended FloCon before, welcome back! Network data analysis is still an important part of FloCon. Now you'll have the opportunity to share your work with a wider cross-section of data analysts and security professionals.
Keynote
Michael Buratowski
Senior Director of Cybersecurity Operations for The Home Depot
Mike Buratowski is responsible for the security operations center (SOC), network security operations, threat exposure management, and data protection and encryption for The Home Depot.
Prior to joining The Home Depot, he was a managing director in the cybersecurity practice at EY where he supported several Fortune 100 companies with various cybersecurity efforts. While working for Fidelis Cybersecurity, Mike led all services for the organization. During this time, he led teams that responded to many breaches that were reported in the news.
Before working in the private sector, Mike was employed by General Dynamics where he spent significant time leading large teams at the Defense Cyber Crime Center (DC3) and United States – Computer Emergency Readiness Team (US-CERT). Mike got his start in cybersecurity as a detective conducting computer forensics in the Computer Crimes Unit of the Montgomery County Police in Maryland.
Accepted Speaker Highlights
David McGrew, Cisco |
Enterprise Encryption: Good, Bad, and Absent |
Hafiz Farooq, Saudi Aramco; |
AI-Powered Multi-Model Vigilance for Threat Detection |
Lakshmi Adiga, CyLab, Carnegie Mellon University; |
Using LLM-Assisted Autonomous Attackers to Create Labeled Datasets at Scale |
Alan Savage, DoD Cyber Crime Center |
What's Really Going on in My Network, and What Will It Cost Me to Know? |
Kazunori Kamiya, NTT Security Holdings, NTT Social Informatics Laboratories |
Detection and Sharing of C&C Servers based on Network Flow Analysis in Japanese Carriers |
Blake Anderson, Cisco |
Tracking and Correlating Flows Across Your Network for Improved Detections |
Dan Ruef, Software Engineering Institute, Carnegie Mellon University |
Cloud FLow Log Optimizations |
Robert Moody, The Home Depot |
Architecting the Last Line of Defense: Distilling the Threat Landscape to Prioritize CIS Safeguards |
Angel Kodituwakku, Centripetal Networks, Inc. |
Bogon Analysis and Management: A CTI Perspective |
Steven Dong, Carnegie Mellon University |
Tackling Long-Term Network Trace Retention Challenges Using Deep Generative Compression |
Brennan Lodge |
RAGe Against the Machine |
Shapor Naghibzadeh, Google |
Agents for Cybersecurity Operations: Transforming Detection and Response with AI |
John Althouse, FoxIO |
Solving the Internet with JA4+ Network Fingerprinting |
Milind Srivastava, Carnegie Mellon University |
Reducing Cloud Costs for Security Data Analytics by 10x Using Principled Approximation |
Anmol Agarwal, Aloratech |
Rise of the Machines: Adding a Human in the Loop to AI |
Brian Contos, Sevco Security |
Malicious Actors Depend on Your Unknowns. Disappoint Them! |
Brian G. Rodiles Delgado, The University of Texas at El Paso |
Incorporating Dynamic DMZ Towards Resilient OT Infrastructure |
Jay Matthews, AT&T; |
Pivot Analysis |
Top Three Reasons to Attend FloCon
1. Become a better analyst!
Learn about new techniques, tools, and ideas in FloCon training workshops.
2. Improve your data analysis!
Find out how other organizations explore large datasets and apply what you've learned.
3. Network!
You'll meet a wide variety of cybersecurity practitioners from industry, government, and academia during social and networking events.