Sched.com Conference Mobile Apps
FloCon 2019
has ended
Create Your Own Event
Menu
Schedule
Speakers
Sponsors
Attendees
Search
Log in
Sign up
FloCon 2019
-
Saved To My Sched
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Search
or browse by date + venue
Break
General Session
All
Bridging the Gap Between Analysis and Analyst
Domain Analysis
Exploratory Analytics
Helping ML
Ideas in Cybersecurity
Platform Ideas
Practical Implementation
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
Popular
Popular Events
#1
Cutting Through the Hype: How to Effectively Apply ML to Cybersecurity
#2
Keynote
#3
Cybersecurity Data Science: Best Practices from the Field
#4
Four Machine Learning Techniques that Tackle Scale (And Not Just By Increasing Accuracy)
#5
The Power of Cyber Threat Intelligence and its Influence on Executive Decision Making
#6
Detecting Lateral Movement with a Compute-intense Graph Kernel
#7
Time-based Correlation of Malicious Events and their Connections
#8
Improved Hunt Seeding with Specific Anomaly Scoring
#9
Using Triangulation to Evaluate Machine Learning Models
#10
The Generation and Use of TLS Fingerprints
#11
Monitoring Massive Network Traffic Using Bayesian Inference
#12
Backwaters: Security Streaming Platform
#13
Using Generative Adversarial Networks to Harden Phishing Class
#14
Hunting Frameworks
#15
Network Telescopes Revisited: From Loads of Unwanted Traffic to Threat Intelligence
#16
Data as Evidence: Analysis of Logs for Litigation
#17
Welcome Reception
#18
Panel: What Cybersecurity Practice Produces the Least Benefit?
#19
Arbitrary Albatross: Neutral Naming of Vulnerabilities at Scale
#20
Keynote: Improving Relationships with Data
#21
Simulating Your Way to Security - One Detector at a Time
#22
Identifying Automatic Flows
#23
Lunch
#24
Introduction
#25
Quantum Approach to Inverse Malware Eradication
#26
Insight2
#27
IMPACT
#28
Automated Cluster Testing and Optimization
#29
Breakfast
#30
Demo & Poster Session
#31
Dynamically Repurposed and Programmable Network Monitoring
#32
Breakfast
#33
Off-Site Networking Reception at the Jax Brewery, Riverview Room
#34
Breakfast
#35
Lunchtime Table Talk: Data Science Behind the Scenes, Part 1 - The Data Science Process for Network Security
#36
Breakfast
#37
Morning Track I: How to Be An Analyst
#38
Afternoon Track I: How to Be An Analyst
#39
Morning Break
#40
Lunch
#41
Afternon Break
#42
Morning Break
#43
Morning Break
#44
Lunchtime Table Talk: Data Science Behind the Scenes, Part 2 - "Tidy" Data for Network Traffic Analysis
#45
Conference Closing
#46
Sunday Regiception
#47
Morning Track II: Suricata Training
#48
Afternoon Track II: Threat Hunting with Suricata
#49
Lunchtime Table Talk: Graph Measures for Network Traffic Analysis
#50
Registration
Popular by Type
All Types
Break
General Session
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
Popular by Day
All days
Sunday, Jan 6
Monday, Jan 7
Tuesday, Jan 8
Wednesday, Jan 9
Thursday, Jan 10
Recently Active Attendees
Admin
Joseph Reves
Nancy Ott
Florin Badita
JM
John Matrix
AD
Aaron Detwiler
Rastislav Janota
Renee Burton
More →