Sched.com Conference Mobile Apps
FloCon 2020
has ended
Create Your Own Event
FloCon 2020
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Search
or browse by date + venue
Break
General Session
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Attendees
Search
Popular Events
#1
Registration
#2
Early Registration "Regiception"
#3
Track I Morning Session - Introduction to Data Science for Cybersecurity: Concepts
#4
Track I Afternoon Session - Introduction to Data Science for Cybersecurity: Techniques
#5
Welcome Reception
#6
Lunch
#7
Breakfast
#8
Registration
#9
Track II Morning Session - AI is not Magic
#10
SysFlow: Scalable System Telemetry for Improved Security Analytics
#11
Comcast Security Analytics Platform
#12
Keynote
#13
Less is More with Intelligent Packet Capture
#14
Conference Introduction
#15
Bayes at 10+ Gbps: Identifying Malicious and Vulnerable Processes from Passive Traffic Fingerprinting
#16
Lunch
#17
Cyber Analyst Data Fusion Dreams Do Come True
#18
Alchemy: Stochastic Data Augmentation for Malicious Network Traffic Detection
#19
Breakfast
#20
Off-Site Networking Reception
#21
Data Driven Challenges
#22
Morning Break
#23
Afternoon Break
#24
A Structural Approach to Modeling Encrypted Connections
#25
Automating Reasoning with ATT&CK?
#26
A Practical Decision Framework for Implementing Evasion-Resilient Host-Based Analytics
#27
Keynote
#28
Methods for Testing and Qualifying Analytics
#29
The Long & Winding Road to “Production-Worthy”
#30
Breakfast
#31
Morning Break
#32
Lunch
#33
Demo & Poster Session
#34
Mobile Users’ Susceptibility to Phishing Attacks
#35
How to Use Machine Learning for a Phishing Incident Response
#36
Lunch Time Table Talk: Get Beyond Alerts - Maximizing Network Defense w/Suricata, Session 1
#37
ML Detection of Cyber Attack Signatures and Behaviors from Known and New Threat Actors
#38
Using Deep Neural Networks to Detect Compromised Hosts in Large Scale Networks
#39
Required Elements for Constructing a Highly Adoptable and Adaptive Digital Forensic Model
#40
Uncovering Priority Anomalies using Pattern Discovery as a Roadmap for Contextual Analysis
#41
Breakfast
#42
Look Ma, No Malware!
#43
Malware's Abuse of Privacy Enhancing Technologies
#44
Code Similarity Detection Using Syntax-Agnostic Locality Sensitive Hashing
#45
Cybersecurity Data Science 2020: Practitioner Perspectives and Guidance
#46
Morning Break
#47
Lunch
#48
Countermeasures to Security Threats in Networked Medical Devices
#49
Conference Close
#50
Lunch Time Table Talk: Get Beyond Alerts - Maximizing Network Defense w/Suricata, Session 2
Popular by Type
All Types
Break
General Session
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
Popular by Day
All days
Sunday, Jan 5
Monday, Jan 6
Tuesday, Jan 7
Wednesday, Jan 8
Thursday, Jan 9
Recently Active Attendees
AD
Aaron Detwiler
Admin
Sheela Nath
Rastislav Janota
Shapor Naghibzadeh
Gene Litt
SN
Shapor Naghibzadeh
Nancy Ott
More →