Events

Subscribe to Diary - RSS | Cybercamp

Friday, November 27, 2015

Morning

Employment and Talent
10:00
30 min

Talent, Technology, Security and Freedom

Juan Cubeiro (Head of Talent ManpowerGroup & CEO Right Management España - Talento, liderazgo & Coaching)

Each lost in the world of information technology jobs are created 2.4 linked to new profiles. Was in the Human Age, where talent is more valuable than the Capital, Cybersecurity jobs require a differentiating attitude and commitment.

Trainnig lab for families
10:00
1h

Netiquette and cyberbullying prevention

Urko Fernández Román

Prevent cyberbullying is up to each and all and it is therefore important to be aware of the concept of digital citizenship on which ciberconvivencia establish standards that, without laws, rules imply agreement that allow us to enjoy the digital life. In this workshop the importance of taking an active part in different social spaces shared on the Internet for values like respect, solidarity and cooperation as well as the right to privacy and self-image will address are taken into account, exercised and defended by girls and boys.

Families classroom
10:00
1h

Security in mobile devices

Josep Albors

In this workshop the status of the current security situation on mobile devices will be made, paying particular attention to monitoring applications and can learn to recognize and malicious apps requesting permits. Also other issues such as attack vectors, connecting to unsecured networks, the use of IM applications to spread malware and messaging preventive safety measures will be discussed.

Industry and Startups
10:00
2h.

Pitch workshop

Final workshop phase projects Cybersecurity Accelerator 2015 INCIBE

Employment and Talent
10:30
30min

The need of multi-tasking teams within cybersecurity departments

Aurélie Pols

The companies operate globally since the time using data and information exchange through electronic systems, from the development of new information systems. In a globalized world, companies must comply with local laws, but also international such as that applied by the European Union, while keeping abreast of the latest developments in cybersecurity. The institutions therefore need multidisciplinary teams that can cope with the new challenges and telecommunications engineers, lawyers specializing in IT, data analysts are profiles that should integrate these new working groups. Detect the right talent it is therefore a 'must'.

Industry and Startups
11:00
30min

What to expect when you are expecting?

Pedro Fernández, abogado de Cuatrecasas y Gonçalves Pereira.

Families classroom
11:00
1 hora

Musical workshop for children 's online safety

Ángel-Pablo Avilés García de la Rosa

The workshops messages on Security, Privacy and responsible use nternet, directing them to the awareness of responsible use of the Internet knowing the dangers that any child is exposed on the network transmitted. The workshops will be conducted by own songs, for RAP, composed and sung by David Aviles (David "Insonusvita") and that the audience will sing along with children, explaining the significaco of each stanza. Videos and songs used are unique to the initiative X1RedMasSegura compounds and assembled by David "Insonusvita".

Employment and Talent
11:00
30 min

The challenges of cyberspace for developing talent and demand in the market

Samuel Álvarez (CEO del Grupo In-Nova)

Cyberspace, a new field for criminals, organized or individualists, for terrorists and mafia, as the new battleground states and nations or as a space for expression and activism of new social movements. An environment where only the best prepared will have the capacity to respond to challenges and challenges it presents.

Research on Cybersecurity
11:00
45min.

Adaptive immune system to mitigate Denial of Service attacks

Jorge Maestre Vidal, Luis Javier García Villalba y Ana Lucila Sandoval Orozco (Universidad Complutense de Madrid)

JNIC 2015. Best long scientific article.

In this talk using Artificial immune systems (AIS) to mitigate Denial of Service (DoS) it is proposed based on flooding. The proposal is based on building networks of distributed sensors along the protected environment. These components are able to identify threats and react according to the behavior of biological defense mechanisms in humans. For this his reaction to emulate different types of incidents, and produces an immune memory. The experimentation demonstrates its effectiveness and accuracy when deployed on networks with different characteristics.

Theatre
11:00
30 min.

Trapped in the Web

Theater, from 12 years.

Employment and Talent
11:00
30min

LinkedIn and hunting opportunities

Laura Pereiro

LinkedIn is a very powerful when looking for work actively tool both to be found by companies Jobs 2.0, visibility and positioning network, all that and more able to help you.

Industry and Startups
11:30
30min

Microsoft Entrepreneurs Program: Entrepreneurs to Enterprise.

Sonia Marzo Arnáez, Responsible Entrepreneurship and Innovation Centers

Employment and Talent
11:30
30 min

Why you should devote yourself to the computer if you want to dedicate to security

David Moreno del Cerro (Responsable de Seguridad de la Información en Grupo Cortefiel)

Traditionally, information security has been linked to a strong technological component which today is not sufficient and that, in many cases, it can be a hindrance in professional development. The presentation emphasizes the qualities that should have a professional and the knowledge and skills that businesses demand.

Employment and Talent
11:30
30min

Perspectives on cybersecurity incident response team

Abel González (INCIBE)

From the activity of a computer incident response, different profiles that complement capaciadades so coordianda with a single purpose will be identified.

Research on Cybersecurity
11:45
45 min.

Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys

Dario Fiore & Luca Nizzardo  (IMDEA Software Institute)

In this talk we will focus on the following question: how can a user be ensured that his data and computations outsourced to the cloud remain correct? We will show how advanced cryptographic techniques — homomorphic signatures — can solve this question, and we will present new results that improve their efficiency. 

As a main technical contribution, we introduce the notion of Asymmetric Programmable Hash Functions (APHFs), which adapts Programmable Hash Functions, introduced by Hofheinz and Kiltz at Crypto 2008. We show that APHFs are surprisingly powerful objects. 

Industry and Startups
12:00
1h.

Final Cybersecurity Accelerator Program 2015

Startups presentations to the jury and investments.

Entrepreneurs teams reach the finals after the 2015 acceleration process, training and mentoring by executives and professionals from some of the most important companies in Spain.

The finalists are: Voting Agora, Continuum Security, Electronic identification, Stealth, and Hackdoor.

Trainnig lab for families
12:00
1h

Privacy and social networks

Urko Fernández Román (Pantallas amigas)

How to build a good digital identity avoiding problems online reputation? This workshop will learn how to strengthen through simple games and animations Internet privacy and to protect our technological devices and to preserve our digital identity and that of others.

Employment and Talent
12:00
30min

Computer Forensics Service of Justice!

José Aurelio García Mateo

Technological devices are used more and more frequently; as a working tool and interaction with others. We live in a hyper-connected world. Many tech crime (threats, data theft, theft of digital identity ...), is already produced by these devices. Increasingly, the courts require experts to analyze and extract digital evidence stored on these media. In short: the computer and the right are hopelessly condemned to understand. -real- A new field of work and future.

Families classroom
12:00
1h

Privacy and social networks

Urko Fernández Román (Pantallas amigas)

How to build a good digital identity avoiding problems online reputation? This workshop will learn how to strengthen through simple games and animations Internet privacy and to protect our technological devices and to preserve our digital identity and that of others

Theatre
12:00
30 min.

Trapped in the Web

Theater, from 12 years.

Trainnig lab for families
12:00
1h

Build your digital identity with head (5 key to not regret what you post)

Lidia Parra Ortiz and Luisa Mª Paz Vázquez

Workshop offered practical tips for a safe and responsible use in publishing content and the proper construction and management of digital identity.

Families classroom
12:00
1h

Windows 10 & security

Teodoro Fernández Álvarez

The safety of our devices and the information they contain, is one of the most important elements when assessing what operating system we use. So Windows 10 has more security features integrated than ever. From the way we protect our devices and the information within them or even in the cloud, via the safety management of our family, to the privacy of the data collected and Windows 10's use of them . These are just some examples of how Windows 10 helps you manage security and how to use these tools is important to have an experience without surprises.

Research on Cybersecurity
12:30
45 min

Artificial Immune System for Intrusion Detection using negative selection to user behavior profiles

César Guevara (Universidad de las Fuerzas Armadas)

JNIC 2015. Best student article.

This research presents the development of several anomaly detection algorithms in computer systems. The paper uses data sets the behavior of users that have run multiple tasks in a considerable period of time within the system.

Employment and Talent
12:30
30min

From zero to expert level on cybersecurity

Miguel Ángel Arroyo Moreno 

In the workshop the current labor market situation in cybersecurity is explained, focusing on the growing demand for professionals in this area and tips on how to approach a career in the world of cybersecurity will.

Industry and Startups
13:00
90min

How they think, act and make decisions investors. What an investor looking for an entrepreneurial project?

ModeratorINCIBE.

Juan López (Kibo Ventures), Juan Revuelta (Swanlaab) Gonzalo Tradacete (Farady Venture Partners), Nico Goulet (Adara Ventures) and Ian Noel (K Fund).

Theatre
13:00
30 min.

The Glass Slipper

Theater, from 9 years.

 

Employment and Talent
13:00
30min

How to get funding to start my start-up of cybersecurity?

Javier Martín Robles

Keys to build your business, define the best model, prepare documents such as business plan and executive summary. How and where to apply for funding and how to present to investors.

Families classroom
13:00
1h.

Threats and scams online games

Josep Albors

This talk will discuss what are the risks to which a user faces playing online, how to recognize the main threats and how to avoid scams and to continue enjoying the game without worries.

Research on Cybersecurity
13:15
45 min.

Forensic analysis on discs

José Carlos Sancho Núñez (Universidad de Extremadura)

JNIC 2015. Best challenge proposal

Who has not deleted an important file by mistake? The conference with a totally practical and designed for the whole family approach explain how the recovery of deleted files from a hard disk is performed using classical techniques of forensic analysis.

Employment and Talent
13:30
30min

An image is worth a thousand words?

Sergio Picciolato

Workshop that helps the audience how to create the best impression in an interview. Technical profiles also have to take good care of his image, it does not serve only to have great knowledge on the subject.

Afternoon

Theatre
16:00
30min.

Trapped in the Web

Theater, from 12 years.

Technical Workshop 1
16:00
2 horas

IPv6: Challenge accepted

Pablo González & Rafa Sánchez

We need more research on IPv6 Security, we encourage research in this field.

Employment and Talent
16:00
60 min

Learn from experts: how to develop your career in cybersecurity?

David Ávila Parodi,  Juan de Dios García Carretero, David Alberto Conde Rontome and Aarón Pozo Sánchez (S21sec).

Since S21sec want young talent interested in developing their career within the world of security know firsthand that work performed by security experts, how they are made, what brings them professionally devote to this, challenges of performing each job.

Research on Cybersecurity
16:00
1h.

TACIT – Tool for simulating cyberattacks on SmartGrids.

Erkuden Ríos Velasco (TECNALIA) & Alberto Domínguez Serra (EVERIS).

Presentation of the TACIT tool developed in the framework of the European of the CIPS Programme, which consists of a smart grid cyberattack simulator.

Technical Workshop 2
16:00
2h.

Threats in SCADA (4th generation)

Jesus Friginal Lopez y Miquel Martínez Raga

This workshop aims to bring the public the problem that arises when securize sensor networks. Its wireless features and the limited life of your batteries makes traditional protection schemes based solely on cryptography longer valid. The workshop includes a live demo on the exploitation of one of the wireless protocols traditionally used in such environments.

Trainnig lab for families
17:00
1h

Privacy and social networks

Urko Fernández Román (Pantallas amigas)

How to build a good digital identity avoiding problems online reputation? This workshop will learn how to strengthen through simple games and animations Internet privacy and to protect our technological devices and to preserve our digital identity and that of others

Theatre
17:00
30 min.

The Glass Slipper

Theater, from 9 years.

 

Auditorium
17:00
30 min

Opening ceremony

Víctor Calvo-Sotelo (Secretario de Estado de Telecomunicaciones y para la Sociedad de la Información), Francisco Martínez (Secretario de Estado de Seguridad) and  Miguel Rego (Director General del Instituto Nacional de Ciberseguridad).

Families classroom
17:00
1h

Facebook: Tips and advices to parents on the use of social networks

Natalia Basterrechea

Social networks are an increasingly popular with young people who grow attached to them and use them to interact with the virtual world environment. There is concern by parents about the safe use and good practices. In this talk, Facebook will offer parents tips and tools to become familiar with social networks and to talk to their children about responsible use of them.

Auditorium
17:30
1h

Blindsided Attacks

Samy Kamkar

Industry and Startups
17:45
15min

Financial boost to SMEs

Bruno Fernandez, ENISA.

Research on Cybersecurity
18:00
45 min.

Research-to-market transition in European Cybersecurity Projects

Aljosa Pasic (Atos origin)

JNIC 2015. Best industrial research article.

Cybersecurity research, innovation and market take-up in Europe, face challenges that are specific and different from the other ICT topics. This presentation will cover a wide range of issues related to the alignment of research with emerging needs, as well as drivers and constraints for market take-up of research & innovation results. 
 

Industry and Startups
18:00
90min.

Workshop models Financing and Investment for Startups

Mariano Torrecilla

What you should know, what to take and what decisions must be taken before going to investors.

Theatre
18:00
30 min.

Trapped in the Web

Theater, from 12 years.

Trainnig lab for families
18:00
1h

Netiquette and cyberbullying prevention

Urko Fernández Román

Prevent cyberbullying is up to each and all and it is therefore important to be aware of the concept of digital citizenship on which ciberconvivencia establish standards that, without laws, rules imply agreement that allow us to enjoy the digital life. In this workshop the importance of taking an active part in different social spaces shared on the Internet for values like respect, solidarity and cooperation as well as the right to privacy and self-image will address are taken into account, exercised and defended by girls and boys.

Technical Workshop 1
18:00
2h

Development of Cyber Intelligence tool

Deepak Daswani

In this workshop the concepts of information, intelligence and the different types of intelligence (HUMINT, SIGINT, OSINT, MASINT, ....) with examples and practical demonstrations of intelligence based on human sources are introduced, later introducing the concept of Cyber Intelligence and its relationship with intelligence based on open sources (OSINT). Deepak will show attendees how to develop their own Cyber Intelligence tool, leaning for it in his Whatsapp Discover and Whatsapp Intelligence tools.

Families classroom
18:00
1h

Internet y nuestros hijos e hijas: acompañar para educar y ayudar

Urko Fernández Román

¿Cuáles son las oportunidades y retos que plantean redes sociales como Instagram o Facebook? ¿Qué riesgos trae la mensajería instantánea como Whatsapp o Snapchat? ¿Cómo afecta el uso abusivo de los smartphones a la infancia y a la adolescencia? En esta charla analizaremos estos riesgos y se proporcionará una visión clara sobre las oportunidades que ofrecen estas tecnologías a menores y adolescentes

Technical Workshop 2
18:00
2 horas

Big Brother is just one click away

Félix Brezo Fernández y Yaiza Rubio Viñuela

OSRFramework es una herramienta de software libre que integra diferentes utilidades de investigación en fuentes abiertas orientadas a la identificación de usuarios en más de 200 plataformas diferentes y su explotación en ataques de ingeniería social.

Auditorium
18:30
45min

Research extortion 2.0

Spanish Unidad de Investigación Tecnológica (UIT) de la Policía Nacional.

Research on Cybersecurity
18:45
45min.

Repository autonomous activities for teaching computer systems security

Francisco J. Ribadas-Pena & Rubén Anido-Bande (Universidad de Vigo)

JNIC 2015. Best education and innovation article.

The educational use of virtualization techniques in the context of security-related matters will be reviewed, presenting the repository of educational activities developed during the last years, along with tools to simplify the design of educational environments and virtualized test.

Employment and Talent
19:00
30min

Are there professionals ready to defend the world of cyberwar?

Antonio Luis  Flores 

 

Families classroom
19:00
1h

Cyber addictions

Antonio Gancedo Baranda

After a brief introduction, we will continue with an approach to social networks, habits of teenagers, problems arising from possible addictions, as expressed in the child's behavior, its development both in the family environment and school, their detection and finally practical advice for parents, for both prevention and proper guidance and management and professional search.

Theatre
19:00
30 min.

The Glass Slipper

Theater, from 9 years.

 

Trainnig lab for families
19:00
1h.

Musical workshop for children 's online safety

Ángel-Pablo Avilés García de la Rosa

The workshops messages on Security, Privacy and responsible use nternet, directing them to the awareness of responsible use of the Internet knowing the dangers that any child is exposed on the network transmitted. The workshops will be conducted by own songs, for RAP, composed and sung by David Aviles (David "Insonusvita") and that the audience will sing along with children, explaining the significaco of each stanza. Videos and songs used are unique to the initiative X1RedMasSegura compounds and assembled by David "Insonusvita"

Auditorium
19:15
60 min

In Depth Radio and Car Hacking

Samy Kamkar

Employment and Talent
19:30
30 min

How to make your hobby a profession

Roberto López Santoyo (Consultor de Seguridad - SIA Red Team & Tiger Team), Enrique Martín Gómez (Experto en Ciberseguridad en GMV) and Andrés Núñez Barjola (Delegado Madrid en S2 Grupo)           

Many come to the world of cybersecurity because people are worried that the origin of things and wonder who likes to test everything that falls into their hands. This "hobby" is the germ of the great professionals of cybersecurity, without this motivation is difficult to grow and reach further than others. But just as important it is to have to channel this concern is knowing and doing something you excited your lifestyle and profession.With attendees we discuss what is the best way to orient yourself in the world of cyber security based on its own case and experience. Knowing what to do but also what not to do.

Saturday, November 28, 2015

Morning

Families classroom
10:00
1h.

Parental support

Iván Vázquez y de la Varga

Presentation mothers, fathers and guardians of what they are prepared to accompany their children 's in the Digital Age. Their children 's computer does not need, but parents with vital experience.

Technical Workshop 1
10:00
1h

Blockchains

Óscar Delgado

Blockchain is frequently considered as one of those disrupting technologies destined to solve every problem in the world. Although it has the potential to make a wide societal impact if implemented by governments, financial institutions or Internet of Things, there also exist drawbacks that are not usually spotted.

In this talk, we will show which are the main applications and use cases of this technology and how some of them are not being correctly implemented. Finally, the main vulnerabilities and weaknesses of the blockchain will be analyzed.

Research on Cybersecurity
10:00
1h.

H2020 calls regarding Critical Infrastructure Protection (CIP) and Digital Security Focus Area (DS)

Maite Boyero Egido (CDTI)

Calls and European Funds H2020 program related research and innovation in cybersecurity and critical infrastructure protection.

Industry and Startups
10:00
3h.

Competition of entrepreneurial projects

Presentation and selection of projects for INCIBE Cyber Security Accelerator Programme 2016.

Trainnig lab for families
10:00
1h

Security in mobile devices

Josep Albors

In this workshop the status of the current security situation on mobile devices will be made, paying particular attention to monitoring applications and can learn to recognize and malicious apps requesting permits. Also other issues such as attack vectors, connecting to unsecured networks, the use of IM applications to spread malware and messaging preventive safety measures will be discussed.

Technical Workshop 2
10:00
2h

Improve your security and IT Developing Microsoft tools: FREE

Simón Roses Femerling

Microsoft has published many free to improve safety both at and system development tools. Come to this workshop to learn some of these tools to increase security posture in your organization.

Auditorium
10:00
1h

3G mobile communications and security

José Picó García and David Pérez Conde 

Everyone knows that GSM (2G) communications are completely insecure nowadays. By contrast, UMTS (3G) and LTE (4G) communications are considered to be reasonably secure. In this talk, we will show how certain attacks that were possible in 2G can also be carried out in 3G, even on a very limited budget. Specifically, we will demonstrate that it is possible to carry out user identification attacks (IMSI catching) and persistent denial-of-service attacks against mobile devices, using only 3G technology.

Employment and Talent
10:00
30 min

How not incur in illegality? What do we need to know?

Carlos Alberto Saiz Peña (Attorney, Partner and Head of Governance, Risk & Compliance practice at Ecix Group), Gabriel Follón  (Senior IT Security Analyst en EY), Juan Carlos Torres Cañete (Gerente Senior – Grupo de Servicios Europeos de Redes y Seguridad  asociado a la Red de Centros de Accenture en Europa)

From his experience will develop what you need to know to avoid making certain illegal aspects in cybersecurity and how they approach their day in your area.

Theatre
10:30
30 min.

The Glass Slipper

Theater, from 9 years.

 

 

Employment and Talent
10:30
30 min

Corporate cybersecurity; future professional profile

Fernando Davara (Director and Patron at "España Digital" Foundation)

Cybersecurity is no longer just a technical matter, ceasing to be a child to become a key component of corporate strategy and government whose management must be planned and executed by a compliance-oriented strategic objectives holistic approach.

Auditorium
11:00
45min

Operations in cyberspace

Teniente Coronel Ángel Gómez de Ágreda y Capitán de Navío Enrique Cubeiro Cabello. 

Mando Conjunto de Ciberdefensa de las Fuerzas Armadas (MCCD)

Families classroom
11:00
1h.

My Account, security tools and privacy in Google

Antonio Vargas

Description of the security and privacy tools that Google makes available to its users in My Account integrated way for the main products and services from Google (search engine, Chrome browser, Google Maps, YouTube, Google Play, Android, etc.) with special emphasis on parental control.

Research on Cybersecurity
11:00
45min.

Research trends in cybersecurity and presentation of the european Strategic Research Agenda

Raúl Riesco Granadino (INCIBE) & Aljosa Pasic (Atos Origin)

Main lines of research identified in the process of drafting the European Strategic Agenda, an initiative which complements and supports the strategy euroepea security of networks and information, and inspiring the national and European agendas of R & D ICT and as the Horizon 2020 program.

Trainnig lab for families
11:00
1h.

Musical workshop for children 's online safety

Ángel-Pablo Avilés García de la Rosa

The workshops messages on Security, Privacy and responsible use nternet, directing them to the awareness of responsible use of the Internet knowing the dangers that any child is exposed on the network transmitted. The workshops will be conducted by own songs, for RAP, composed and sung by David Aviles (David "Insonusvita") and that the audience will sing along with children, explaining the significaco of each stanza. Videos and songs used are unique to the initiative X1RedMasSegura compounds and assembled by David "Insonusvita"

Technical Workshop 1
11:00
1h

How can (bad guys) rule the world?

Pablo González

In this letter a study of vulnerabilities in Internet and exposing millions of users machines is detailed. A proof of concept with which a user can seize thousands of machines with little effort, taking advantage of the resources that can be found on the Internet will be presented.

Auditorium
11:45
1h

Hack The Future

Keren Elazari

This talk is about how security enthusiast to be the change agents of the future, with practical things we can all do to create a positive impact. It’s about being a good hacker while making the world a better place – with the power of hacking & creativity. Keren will share her own personal story and the hackers who inspire her. 

Technical Workshop 1
12:00
2h

Contactless payment cards: vulnerabilities, attacks and solutions

Ricardo J. Rodriguez

Payment by credit card (or debit) is increasingly present in our daily lives. Before the banking sector as a payment instrument used magnetic stripe cards. Because the facilities to commit fraud in this system, cards that each transaction is explicitly authorized by the client were developed. These cards are known as chip cards-and-PIN or EMV cards. Now, the world of payment cards is undergoing a new revolution with contactless payment, based on Near-Field Communication (NFC). In this workshop, an overview of NFC, the protocol used by your version EMV contactless payment is made, and the vulnerabilities of each, some possible attacks and possible solutions are listed

Technical Workshop 2
12:00
1h

Web Security: Attacks on Business Logic

Miguel Ángel Hernández Ruiz

In this talk, there will be relaxed mode of locating these failures in business logic and three examples spot where such errors will be displayed.

Trainnig lab for families
12:00
1h

Netiquette and cyberbullying prevention

Urko Fernández Román

Prevent cyberbullying is up to each and all and it is therefore important to be aware of the concept of digital citizenship on which ciberconvivencia establish standards that, without laws, rules imply agreement that allow us to enjoy the digital life. In this workshop the importance of taking an active part in different social spaces shared on the Internet for values like respect, solidarity and cooperation as well as the right to privacy and self-image will address are taken into account, exercised and defended by girls and boys.

Theatre
12:30
30min.

Careful! Contrast

For all audiences.

Auditorium
12:45
45 min

Long Hanging Fruit: O cómo ser un Fashion Victim y un Looser a la vez

Chema Alonso

The task of managing the security of a company usually like dancing on the wire. We must allow the business running, be trendy, protect what already implemented and innovate new things. Of course, more efficiently and with less each year budget. All with the aim of not that nothing happens. The conclusion is that the end is always Long Hanging Fruit for anyone to take.

Industry and Startups
13:00
90min.

Success cases of entrepreneurs. The keys to entrepreneurship in the field of cybersecurity.

Talk with successful entrepreneurs about their experiences, successes and failures. Paul de la Riva (BUGUROO), Daniel Solis Agea (blueliv), Josep Coll (Red Point)

Theatre
13:00
30 min.

Trapped in the Web

Theater, from 12 years.

Technical Workshop 2
13:00
1h

Counterattack the enemy with Incident Response

Pedro Sánchez Cordero

Yo have 24 hours to pay the amount, if you do not leave your systems servicing. Today at 16: 01h know of my existence.

This enigmatic phrase see a real case of an unprecedented attack, we will see how the process of incident response, the methodologies that we apply the tools we develop and how we could take control of the IT department to detect, analyze and eradicate this stealth and brutal attack

Research on Cybersecurity
13:00
1h.

JNIC: Spanish Cybersecurity Research Forum

Miguel Carriegos (Universidad de León) & Pedro García Teodoro (Universidad de Granada)

In the current context of widespread and growing relevance of the topic of cybersecurity, this talk will try to point out research in the field and on the value needed to shore up and improve the current network security, systems and services and, in short, the users.

Families classroom
13:00
1h

Threats and scams online games

Josep Albors

This talk will discuss what are the risks to which a user faces playing online, how to recognize the main threats and how to avoid scams and to continue enjoying the game without worries.

Employment and Talent
13:00
30 min

Professional managerial skills cybersecurity

Alfredo Vela (Socio-director en Social Media TICs and Training, S.L.)

What skills managers must have engaged in the area of cybersecurity.

Auditorium
13:30
45min

21 days

Ruben Santamarta

Inspirational talk.

Employment and Talent
13:30
30min

Looking for digital natives to the National Police

Yésica López Vilar & Pablo Prieto Vilacorta 

Functional description of the UIT (Spanish Technology Research Unit of the National Police) and explanation of how the talent search is performed in the unit as well as the motivation for police and access to UIT.

Theatre
13:30
30 min.

The Glass Slipper

Theater, from 9 years.

Afternoon

Theatre
15:30
30min.

Trapped in the Web

Theater, from 12 years.

Research on Cybersecurity
16:00
45min.

NeCS: European Training Network for Cybersecurity

Carmen Fernández Gago (Universidad de Málaga)

Introducing the newly launched network cybersecurity research training in Europe.

Auditorium
16:00
1h

Making-Of: The Good, the Bad and the Ugly

Raúl Siles

Mobile devices are threatened by common user behaviors (Can install mobile applications (apps)?), Integration with the platform of the manufacturer (Do you have an account of Apple, Google, Microsoft ...), and technical vulnerabilities (you have the latest version of OS?). These three factors put at risk the own device, all data and information managed by (local and remote) and user credentials.
During the presentation will be discussed in a practical and direct the technical details of preparing and carrying out an attack on Android showing in action this trio, manipulating code apps and integrating it with Metasploit, installing apps remotely, and exploiting other vulnerabilities that allow escalate privileges to take complete control of the mobile victim, taking advantage of all the capabilities of device access: data, camera, microphone, GPS coordinates, etc.
 

Technical Workshop 2
16:00
1h

SOHO Routers: Swords and Shields

José Antonio Rodríguez García, Iván Sanz de Castro and Álvaro Folgado Rueda.

The aim of the talk is to show both the standpoint of the attacker, making a tour of their arsenal and the ease with which these devices can be exploited; as the end user, which through a series of recommendations can mitigate the risk of these threats.

Technical Workshop 1
16:00
4h

Writing, debugging, bypassing AVs & exploiting shellcodes

Pedro Candel

Eminently practical workshop, which aims to help "no fear" to directly modify assembly code and then make the reverse engineering process associated to investigate and expand other techniques used to mitigate detection AVs attendees.

Different techniques and tricks will be detailed to manually edit different shellcodes, with its updated versions obtained from exploit.db to evade detection by antivirus and / or different protections. It is made with standard tools such as compilers and NASM, gcc, disassemble.rb, peencode.rb, gdb, OllyDbg, radare2, etc.

In order to successfully exploit the content of the workshop it is required to have a minimum knowledge of writing shellcodes mainly on GNU / Linux 32/64.

Pedro will use a virtual machine ready and available for download (User: root/p4$$w0rd. 2 GB RAM):

Trainnig lab for families
16:00
1h

Privacy and social networks

Urko Fernández Román (Pantallas amigas)

How to build a good digital identity avoiding problems online reputation? This workshop will learn how to strengthen through simple games and animations Internet privacy and to protect our technological devices and to preserve our digital identity and that of others.

Industry and Startups
16:00
15min.

Evolution Start-up SME: Initiatives for promoting Cybersecurity (INCIBE)

INCIBE

The main challenges facing SMEs to evolve to be exhibited.

Employment and Talent
16:00
30min

Follow the yellow brick road

Antonio Robles

It is a motivational training that invites us to reflect on the path that will lead you to live fully contributing talent to everything we do. A path that leads us to be responsible to ourselves, engage with others and be creative as the basis for success in life and work.

Industry and Startups
16:15
30min.

Case Study evolution Start-up SME: Buguroo

Eduardo Alberto Sánchez and Elisabet Fernández Cerro 
 

Employment and Talent
16:30
30 min

Have you ever thought that you'd be 'hacker'?

Eduardo Arriols (Senior Penetration Tester en Deloitte y Profesor en U-TAD)

In reality you can work as 'hacker', checking and violating the security systems of all types of organizations, without falling into any offense. This work is called 'ethical hacker, it is now a place with real demand in the market and certainly for those who like the security, is the most exciting and motivating work that may exist.

Theatre
16:30
30 min.

The Glass Slipper

Theater, from 9 years.

 

Industry and Startups
16:45
30min.

Case Study evolution Start-up SME: INIXA

Julio Rilo

Research on Cybersecurity
16:45
45min.

A4CLOUD: Accountability on the cloud

Carmen Fernández Gago (Universidad de Málaga)

The solutions provided by the A4Cloud project to help users hear and decide how their data is processed by the providers of cloud services are presented.

Technical Workshop 2
17:00
1h

Cyberspace and Terrorism: the use of the Internet as a means of propaganda, recruitment, expansion and destruction

Manuel J. Gazapo Lapayese

Internationally, terrorism and cyber security are declared as two of the highest priorities in terms of security.

Employment and Talent
17:00
30 min

Keys to undertake and find employment in the world of cybersecurity

Emilio Márquez Espino (Emprendedor, business angel and trainner with Actívate con Google)

Getting undertake or get jobs related to cybersecurity requires the attitude (soft skills) and fitness (hard skills) skills. The world of cybersecurity has many employment opportunities face but we must prepare properly.

Auditorium
17:00
45min

HoneyStation, detection, analysis and visualization of cyber attacks in real time

Francisco Jesús Rodriguez Montero

HoneyStation is a proof of concept created to detect, analyze and display real-time cyber attacks that has allowed over the past year various campaigns notify attacks received from both country and from abroad.

Industry and Startups
17:15
15min.

Conclusions evolution SME Start-up

Theatre
17:30
30 min.

Careful! Contrast

For all audiences.

Industry and Startups
17:30
15min.

Initiatives supporting the internationalization of the industry

INCIBE

From local market to global or international market.

An approach will be made to global security market and services, such as the technology sector cybersecurity: dependence on markets over the global digital economy.

Employment and Talent
17:30
30 min

Latin America, a great opportunity to work on cybersecurity

Aaron Crespo (CEO Teamsec)

From a personal and based on your experience level will give the attendant the keys to success in the Latin American market in the field of cybersecurity. For this it will rely on its own history as an entrepreneur and consultant in the field of computer security different multinationals and governments in Latin America.

Industry and Startups
17:45
30min.

Successfuly internationalization case: INDRA

From local market to global or international market. Big Business Case

Auditorium
17:45
15min

CyberOlympics awards Ceremony

Cyberlympics is a team championship between centers where they will test the technical skills in different fields of security in Internet and new technologies.

Employment and Talent
18:00
30 min

CYBERSECUIRTY, today & tomorow

Pedro Pablo Pérez (Eleven Paths)

Motivational talk to inspire the audience to work on cybersecurity

Technical Workshop 2
18:00
1h

Damn hippies Internet

Luis Jurado Cano

With the entry into force of the new Penal Code and soon the Criminal Procedure Act, you try to put hurdles in the field of internet. High and strong fences. Will that be enough? How does it affect the information security profession? What new crimes have been modified?

Theatre
18:00
30 min.

Trapped in the Web

Theater, from 12 years.

Auditorium
18:00
45 min

Charla inspiracional

Ramón González Gallego, Capitán del Grupo de Delitos Telemáticos.

Trainnig lab for families
18:00
1h

Build your digital identity with head (5 key to not regret what you post)

Lidia Parra Ortiz and Luisa Mª Paz Vázquez

Workshop offered practical tips for a safe and responsible use in publishing content and the proper construction and management of digital identity.

Industry and Startups
18:15
30min.

Successfuly internationalization case: Panda Security

From local market to global or international market.

Rosa Díaz

Theatre
18:30
30 min.

The Glass Slipper

Theater, from 9 years.

 

Employment and Talent
18:30
30min

What does a cybersecurity technician in a company?

Gonzalo Sánchez

It guides the listener what the functions to be performed by a technician in a business cybersecurity according to the following scheme.

  • What is an ISMS within a company?
  • What is it good for?
  • What role does the technical cybersecurity within the ISMS?
  • Compliance and introduction to ISO 27001.
     
Auditorium
18:45
45min

How to protect your Active Directory?

Juan Garrido

Active Directory services are the engine through which a company manages the services you can offer to their customers, whether external or internal. Management control, SLA compliance, user control, management and printing systems integration services are some of the features that make a service governed by this infrastructure it attractive for IT administrators and managers.

In this paper the basis for proper analysis and audit of such services, as well as presenting a free tool that will guide the analyst in the audit of such elements will be explained.

Industry and Startups
18:45
30min.

Successfuly internationalization case: Vulnex

From local market to global or international market.

Simón Roses

Employment and Talent
19:00
30min

The key to develop in cybersecurity

Ignacio Giralt (Socio co-fundador de la compañía WhiteBearSolutions WBSgo), Oscar Gonzalez Pérez (Responsable de Gestion de Profesionales en Entelgy) and Oscar Maire-Richard (CEO en Prot-On).

The roundtable participants looking to experience first hand the keys to a successful career in the world of cybersecurity. To do this it will be discussed with the speakers what opportunities offered by large multinationals, but also start-ups. In addition to the jobs traditionally technical positions will emphasize those that also require technical skills but often are not valued by those who are starting their professional career are trade positions.

Technical Workshop 2
19:00
1h

Continuous Security Testing for DevOps

Stephen de Vries

We discover methods to automate security testing to fit into a process of continuous deployment without interruption.

Trainnig lab for families
19:00
1h.

Musical workshop for children 's online safety

Ángel-Pablo Avilés García de la Rosa

The workshops messages on Security, Privacy and responsible use nternet, directing them to the awareness of responsible use of the Internet knowing the dangers that any child is exposed on the network transmitted. The workshops will be conducted by own songs, for RAP, composed and sung by David Aviles (David "Insonusvita") and that the audience will sing along with children, explaining the significaco of each stanza. Videos and songs used are unique to the initiative X1RedMasSegura compounds and assembled by David "Insonusvita"

Families classroom
19:00
1h

Cyber addictions

Antonio Gancedo Baranda

After a brief introduction, we will continue with an approach to social networks, habits of teenagers, problems arising from possible addictions, as expressed in the child's behavior, its development both in the family environment and school, their detection and finally practical advice for parents, for both prevention and proper guidance and management and professional search.

Industry and Startups
19:15
15min.

Conclussions: From local market to global or international market.

Auditorium
19:30
45min

Deconstructing the myth of new scenarios and threats Cybersecurity

Antonio Ramos Varon

The basic problem in the cybersecurity market is creating new threats which do not really exist without delving into the real factors that make any corporate cybersecurity plan is a continuous failure.

Sunday, November 29, 2015

Morning

Technical Workshop 1
10:00
2h

Python, and sec-hacking tools from the trenches

Daniel García (cr0hn) 

A tour network hacking low and communications protocols, with the Swiss Army knife of the low: Scapy.

We learn how to turn on hacking tools well built so far resolvías with scripts to "step out" of that audit that you are resisting. We create various hacking tools from scratch.

Industry and Startups
10:00
15min.

Collaborative models Cybersecurity Industry

INCIBE.

Collaborative initiatives, discussion table.

Employment and Talent
10:00
30min

Want to work in cybersecurity? We explain that we want from you

Javier Caparrós

Trainnig lab for families
10:00
1h

Security in mobile devices

Josep Albors

In this workshop the status of the current security situation on mobile devices will be made, paying particular attention to monitoring applications and can learn to recognize and malicious apps requesting permits. Also other issues such as attack vectors, connecting to unsecured networks, the use of IM applications to spread malware and messaging preventive safety measures will be discussed.

Research on Cybersecurity
10:00
45min.

TYPES: Towards transparency and privacy in the online advertising business

Ángel Cuevas Rumín (Universidad Carlos III de Madrid)

Most free services on the Internet (Google, Facebook, etc.) are monetized by exploiting the personal data of users who have become a product for online advertising. The market associated with online advertising is completely opaque so that end users do not know who, how or what your person information is used. This talk will introduce the TYPES project which aims to create transparency in the market for online advertising. In addition, the FDVT (www.fdvt.org) tool that offers a solution to end users to know the assessment as a sample of the work being carried out within the project will be presented TYPES.

Technical Workshop 2
10:00
2h

Cookies and privacy

Alejandro Ramos

The workshop aims to explain what cookies are and how they work when surfing the Internet, which methods companies use marketing to know our preferences and how to protect it.

Auditorium
10:00
1h

Deanonymization methods in Bitcoin network

Marko Marić

Bitcoin is widely accepted as anonymous payment system, but although you have your identity hidden, it is not anonymity network. 

Industry and Startups
10:15
30min.

Successfuly collaborative models in the Cyber Security Industr: Grupo S21Sec

Juan Antonio Gómez Bule

Employment and Talent
10:30
30 min

Proactive approaches to making the world safer

Masa Maeda (CEO and founder of Valueinnova )

Making the world safer should go beyond better threat detection and approaches such as war against cybercrime because such measures are reactive and expensive. Coming professionals interested on security should take upon proactive approaches that avoid and prevent, rather than detect and stop cybercrime.This talks explores such approach

Theatre
10:30
30min

Careful! Contrast

For all audiences.

Industry and Startups
10:45
30min.

Successfuly collaborative models in the Cyber Security Industry:: Enigmedia

Paloma Valdés

Research on Cybersecurity
10:45
45min.

TREDISEC: towards a more secure and reliable Cloud infrastructure

Beatriz Gallego-Nicasio Crespo (Atos Origin)

Presentation that will be shown first, the problems and threats that currently contribute negatively to the adoption of Cloud, and second, will describe the vision of TREDISEC project and the solutions it proposes.

Employment and Talent
11:00
30min

Your trademark: why we are the best?

Javier Peña

It is a motivational training that invites us to reflect on the path that will lead you to live fully contributing talent to everything we do. A path that leads us to be responsible to ourselves, engage with others and be creative as the basis for success in life and work.

Families classroom
11:00
1h

Threats and scams online games

Josep Albors

This talk will discuss what are the risks to which a user faces playing online, how to recognize the main threats and how to avoid scams and to continue enjoying the game without worries.

Trainnig lab for families
11:00
1h

Netiquette and cyberbullying prevention

Urko Fernández Román

Prevent cyberbullying is up to each and all and it is therefore important to be aware of the concept of digital citizenship on which ciberconvivencia establish standards that, without laws, rules imply agreement that allow us to enjoy the digital life. In this workshop the importance of taking an active part in different social spaces shared on the Internet for values like respect, solidarity and cooperation as well as the right to privacy and self-image will address are taken into account, exercised and defended by girls and boys.

Auditorium
11:00
45min

We need OPSEC

David Barroso

OPSEC is part of our lives, whether in our research work or any activity we conduct. Know the history of OPSEC, recommendations both in real life and in our technological activities, as well as large OPSEC faults committed by different people ended in complete disaster. Essential for paranoid, not paranoid.

Theatre
11:15
30min.

Careful! Contrast

For all audiences.

Industry and Startups
11:15
30min.

Successfuly collaborative models in the Cyber Security Industry:: CSIC

Luis Hernández Ercinas

Research on Cybersecurity
11:30
45min.

SUAC3i: Secure User Authentication in Control Centers for Critical Infrastructures

Roger Frauca Córdoba (GMV)

SUAC3i project within the European framework of CIPS program, in which an improvement over the control centers of critical infrastructure is developed, making it possible to live together in a single solution needs immediate access to the workstations on the one hand exposed and such access control on the other.

Auditorium
11:45
45min

Security risks in the XXI century: families and professionals

Román Ramírez

The talk is aimed at a general public, professionals and non-professionals. Concepts of risk in the modern world will be discussed and, above all, the interaction of all existing actors (from the minors, mafias).

Industry and Startups
11:45
15min.

Conclusions: collaborative models in the Cyber Security Industry

Technical Workshop 2
12:00
1h

What if we need Batman Big Data and Machine Learning? Spark crimes prediction

Rubén Martínez Sanchez

The aim of this presentation will show how you can use one of the strongest platforms in the Big Data with artificial intelligence algorithms to develop a proof of concept to learn to predict crimes. The talk will be organized in 2 parts:

  • The first part will be presented Apache Spark
  • Spark has a module called MLlib that allows working with artificial intelligence algorithms in parallel.
  • The second part consists of a proof of concept to show how they might try to predict crimes using a set of data published by the City of Chicago on crime statistics (see dataset)
     
Employment and Talent
12:00
30 min

The new development and employment opportunities in cybersecurity

Juan Carlos Pascual (Responsable de Seguridad en Sogeti España)

Application Security Testing is one of the disciplines of the security due to booming digital transformation. As a result of the technologies introduced in Mobility, BigData, Cloud, Social Media and the Internet of Things, society and businesses have been expanded its exhibition space and the search for competitiveness transferred to these environments allows attackers to have an arsenal of resources to exploit any problems that exist in all these new areas. Application Security Testing can identify all the vulnerabilities of these environments and provide solutions for the variety of environments that need contribution wealth both companies and society. We will highlight the qualities for this work.

Industry and Startups
12:00
30min.

Cybersecurity momentum through the major market players

Effect tractor purchasing companies, case studies, table debate. 

Fernando Picatoste (Deloitte)

Technical Workshop 1
12:00
45min

Phone fraud

Jose Luis Verdeguer

Times change, and every day more companies are replacing their conventional PBX by VoIP, but are not aware of the great danger securize no such systems or choose a suitable operator.

We make an analysis of the current situation regarding toll fraud and the various techniques used by criminals to abuse a poorly configured VoIP system. In a conventional phone system we know who calls us but do so is in a VoIP system?

Theatre
12:00
30min.

Careful! Contrast

For all audiences.

Research on Cybersecurity
12:15
45 min.

Online Privacy Enforcement, Rights Assurance and Optimization (OPERANDO)

Leire Orue-Echevarria Arrieta (TECNALIA)

The project OPERANDO aims to develop a platform that will be used by Privacy Service Providers (PSPs) to provide the user with mechanisms to ensure privacy in the form of a dedicated online service, called "Privacy Authority".

Auditorium
12:30
45min

Cybersecurity in Public Administration

Javier Candau

Industry and Startups
12:30
30min.

Cybersecurity momentum through the major market players: Banco Santander

Theatre
12:45
30min.

Careful! Contrast

For all audiences.

Industry and Startups
13:00
30min.

Cybersecurity momentum through the big players in the market since the offer: IBM

Employment and Talent
13:00
30min.

Discussion: the need for cybersecurity experts in all areas of the company

Javier Rubio (Abogado Dept. Nuevas Tecnologías en Fuster-Fabra Abogados) and Ramón Ortiz González   (Responsable de Seguridad de Mediaset)

Auditorium
13:15
45 min

Security is dead. Long live security

Luis Iván Cuende

Internet security has changed dramatically from a few years ago. Every day we face new challenges and enemies increasingly difficult to combat. Intelligence agencies have widespread spying and infiltrating the lack of privacy in many systems. But, as always, new technologies allow us to protect ourselves.

Industry and Startups
13:30
15min.

Conclusions: Cybersecurity momentum through the major market players, sophisticated supply and demand.

Auditorium
14:00
90 min

Closing

Download Programme (content only available in English):