Sched.com Conference Mobile Apps
FloCon 2020
has ended
Create Your Own Event
Menu
Schedule
Speakers
Sponsors
Attendees
Search
Log in
Sign up
FloCon 2020
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Search
or browse by date + venue
Break
General Session
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
Popular
Popular Events
#1
SysFlow: Scalable System Telemetry for Improved Security Analytics
#2
Comcast Security Analytics Platform
#3
Keynote
#4
Less is More with Intelligent Packet Capture
#5
Track I Morning Session - Introduction to Data Science for Cybersecurity: Concepts
#6
Conference Introduction
#7
Bayes at 10+ Gbps: Identifying Malicious and Vulnerable Processes from Passive Traffic Fingerprinting
#8
Lunch
#9
Cyber Analyst Data Fusion Dreams Do Come True
#10
Alchemy: Stochastic Data Augmentation for Malicious Network Traffic Detection
#11
Track I Afternoon Session - Introduction to Data Science for Cybersecurity: Techniques
#12
Breakfast
#13
Off-Site Networking Reception
#14
A Structural Approach to Modeling Encrypted Connections
#15
Automating Reasoning with ATT&CK?
#16
ML Detection of Cyber Attack Signatures and Behaviors from Known and New Threat Actors
#17
Welcome Reception
#18
Data Driven Challenges
#19
A Practical Decision Framework for Implementing Evasion-Resilient Host-Based Analytics
#20
Keynote
#21
Methods for Testing and Qualifying Analytics
#22
Using Deep Neural Networks to Detect Compromised Hosts in Large Scale Networks
#23
The Long & Winding Road to “Production-Worthy”
#24
Required Elements for Constructing a Highly Adoptable and Adaptive Digital Forensic Model
#25
Uncovering Priority Anomalies using Pattern Discovery as a Roadmap for Contextual Analysis
#26
Morning Break
#27
Afternoon Break
#28
Breakfast
#29
Morning Break
#30
Lunch
#31
Demo & Poster Session
#32
Breakfast
#33
Look Ma, No Malware!
#34
Malware's Abuse of Privacy Enhancing Technologies
#35
Lunch
#36
Mobile Users’ Susceptibility to Phishing Attacks
#37
How to Use Machine Learning for a Phishing Incident Response
#38
Code Similarity Detection Using Syntax-Agnostic Locality Sensitive Hashing
#39
Cybersecurity Data Science 2020: Practitioner Perspectives and Guidance
#40
Breakfast
#41
Lunch Time Table Talk: Get Beyond Alerts - Maximizing Network Defense w/Suricata, Session 1
#42
Morning Break
#43
Lunch
#44
Countermeasures to Security Threats in Networked Medical Devices
#45
Conference Close
#46
Lunch Time Table Talk: Get Beyond Alerts - Maximizing Network Defense w/Suricata, Session 2
#47
Registration
#48
Registration
#49
Track II Morning Session - AI is not Magic
#50
Early Registration "Regiception"
Popular by Type
All Types
Break
General Session
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
Popular by Day
All days
Sunday, Jan 5
Monday, Jan 6
Tuesday, Jan 7
Wednesday, Jan 8
Thursday, Jan 9
Recently Active Attendees
Admin
AD
Aaron Detwiler
Rastislav Janota
Shapor Naghibzadeh
Gene Litt
SN
Shapor Naghibzadeh
Nancy Ott
Joseph Reves
More →