Awwwards

Network Security Fundamentals

The workshop looks at the nature and structure of network attacks and the motivation that drives such online malicious activity. The types of tools that are used in modern attacks, who is behind them, and the impact they have are also discussed. The course further examines the actions and processes that can be used to identify, mitigate, and respond to such attacks. The role and impact of botnets will also be discussed in detail covering botnet operation, functionality, and control.

Points to be learned

  1. DNS Security
  2. Anatomy of a network attack
  3. Network Analysis and Forensics
  • 3

    topics

  • 5

    hours

  • 3

    discussions

  • 25

    key participants

Participants

Program

program icon
08:45 - 09:00

REGISTRATION & COFFEE

program icon
09:00 - 09:15

WELCOME & INTRODUCTION

program icon
09:15 - 09:45

BROWSER SECURITY

How can a criminal take control over your network? This talk presents the threats of zero day exploits to the internal/external IT infrastructure of a network.
Moritz Jodeit

Moritz Jodeit

Blue Frost Security Head of R&D
program icon
09:45-10:15

NETWORKING & REFRESHMENTS

program icon
10:15 - 10:45

THE THREAT OF THIRD PARTY SECURITY APPLIANCES

Most people feel more protected when they add another security appliance to their network. They spend a large part of their security budget to buy these solutions. In most cases they are increasing the attack surface by a big factor. What exactly are the risks of installing third party security software or hardware in your network? Listen to a concrete case study of a vulnerability that was found during a routine penetration test that affected all FireEye appliances. This vulner- ability was exploited to gain full access to the customer’s network. Listen to various techniques of finding these vulnerabilities to avoid cases like this.
Dr. Yan Frederik Sima

Dr. Yan Frederik Sima

Blue Frost Security Security Analyst
program icon
10:45 - 11:30

INTERNET BANKING - COMMON SECURITY MISTAKES THAT CAUSE SECURITY INCIDENTS

Interactive round-table discussions around common mistakes that lead to security incidents in banks. Hear about vast experiences from previous penetration tests conducted in banks. Network segregation misconfigurations Outdated software Server-side security logic Common challenges that are the culprits behind security incidents in many cases
program icon
11:30-12:30

NETWORKING LUNCH

program icon
12:30-13:30

PENETRATION TESTING OF UNIQUE PROPRIETARY PROTOCOLS

In many instances industry sectors build their own systems and protocols which are then adopted and implemented by companies within these sectors. Since these protocols and systems are not standard, many penetration testers would not know how to test these systems effectively, as there are no publicly available tools that support testing of these protocols. Network segregation misconfigurations: Outdated software Server-side security logic Common challenges that are the culprits behind security incidents in many cases
program icon
13:30-14:00

SUMMARY OF THE DAY & OPEN NETWORKING

This was one of the best seminars I've attended lately. Presentations were technical and in-depth; not just sales pitches. I can say I've learned something new which is why I attend these events. Well done!

Erkan Kahraman

CISO