OASIS Borderless Cyber Conference & FIRST Technical Symposium

 
PRESENTATION MATERIALS - Day One
Wednesday, 6 December


Welcome Remarks from Conference Chair, OASIS & FIRST.org
  • Luc Dandurand, Conference Chair
  • Gershon Janssen, OASIS Open Standards Board
  • Damir 'Gaus' Rajnovic, FIRST Board of Directors
<NO SLIDES AVAILABLE>

STIX Patterning: Viva la Revolución!

  • Trey Darley, New Context
  • Jason Keirstead, IBM

VIEW SLIDES

STIX: The 'Infinite Coding Possibilities' Problem

  • Chris O'Brien, EclecticIQ
 VIEW SLIDES

OpenC2: Protecting our future at machine speed

  • Lisa Mathews, Open C2 Technical Committee

VIEW SLIDES

PROTECTIVE: A European-wide NREN Cyber Threat Intelligence Sharing Platform - lessons learnt to date

  • Jassim Happa, University of Oxford
 VIEW SLIDES

Military Grade Security at last: Using protective marking schemes in Cyber Threat Intelligence sharing

  • Dave Cridland, Surevine, Ltd.
 VIEW SLIDES

Analytical Results of a Cyber Threat Intelligence Survey

  • Ryan Trost, ThreatQuotient
 VIEW SLIDES

Using Knowledge of Adversary TTP’s to Inform Cyber Defense: MITRE's ATT&CK™ Framework

  • Richard Struse, The MITRE Corporation
 VIEW SLIDES

Developing and Sharing ATT&CK-based Analytics

  • John Wunder, The MITRE Corporation
 VIEW SLIDES

Extracting and Exploring Threat Intelligence on Open Sourced Documents using Natural Language Processing

  • Mayo Yamasaki, NTT
 VIEW SLIDES


PRESENTATION MATERIALS - Day Two
Thursday, 7 December


Strategies for Semantics-Rich Machine-Understandable CTI - Human-Machine Cybersecurity Collaboration

  • Ryusuke Masuoka, Fujitsu System Integration Laboratories
 


VIEW SLIDES       

Towards a Mature Cyber Threat Intelligence Practice

  • Richard Kerkdijk, TNO
 VIEW SLIDES

What are the characteristics of a mature cyber threat intelligence program and how is it measured?

  • Mark Arena, Intel 471
 VIEW SLIDES

Fail frequently to avoid disaster, or how to organically build a threat intel sharing standard

  • Alexandre Dulaunoy, CIRCL
  • Andras Iklody, CIRCL
 VIEW SLIDES
 Lightning Round Talks  

Processing threat data through the GDPR regulatory lens using the PMRM Privacy Engineering Tool

  • Gershon Janssen, OASIS Open Standards Board
  • John Sabo, OASIS PMRM Technical Committee
  • Chiljon Janssen, Toolset Project
 VIEW SLIDES

C-TAS Ecosystem for Cyber Threat Analysis & Sharing in Korea

  • San Wook Seo, Korea Internet & Security Agency (KISA)
 VIEW SLIDES

Applying Key Threat Intelligence Practices to Fight Cybercrime

  • Sarah Brown, Security Links
  • Dhia Mahjoub, Cisco Umbrella (OpenDNS)
 VIEW SLIDES

Japanese-style STIX and TAXII information sharing platform

  • Masato Terada, Hitachi Ltd.
 VIEW SLIDES