Sched.com Conference Mobile Apps
FloCon 2019
has ended
Create Your Own Event
FloCon 2019
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Search
or browse by date + venue
Break
General Session
All
Bridging the Gap Between Analysis and Analyst
Domain Analysis
Exploratory Analytics
Helping ML
Ideas in Cybersecurity
Platform Ideas
Practical Implementation
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
Popular
menu
Menu
Schedule
Speakers
Sponsors
Attendees
Search
Popular Events
#1
Sunday Regiception
#2
Registration
#3
Welcome Reception
#4
Lunch
#5
Breakfast
#6
Morning Track I: How to Be An Analyst
#7
Afternoon Track I: How to Be An Analyst
#8
Morning Track II: Suricata Training
#9
Afternoon Track II: Threat Hunting with Suricata
#10
Cutting Through the Hype: How to Effectively Apply ML to Cybersecurity
#11
Keynote
#12
Cybersecurity Data Science: Best Practices from the Field
#13
Four Machine Learning Techniques that Tackle Scale (And Not Just By Increasing Accuracy)
#14
The Power of Cyber Threat Intelligence and its Influence on Executive Decision Making
#15
Improved Hunt Seeding with Specific Anomaly Scoring
#16
Using Triangulation to Evaluate Machine Learning Models
#17
The Generation and Use of TLS Fingerprints
#18
Panel: What Cybersecurity Practice Produces the Least Benefit?
#19
Introduction
#20
Breakfast
#21
Off-Site Networking Reception at the Jax Brewery, Riverview Room
#22
Morning Break
#23
Lunch
#24
Afternon Break
#25
Monitoring Massive Network Traffic Using Bayesian Inference
#26
Using Generative Adversarial Networks to Harden Phishing Class
#27
Hunting Frameworks
#28
Network Telescopes Revisited: From Loads of Unwanted Traffic to Threat Intelligence
#29
Data as Evidence: Analysis of Logs for Litigation
#30
Arbitrary Albatross: Neutral Naming of Vulnerabilities at Scale
#31
Keynote: Improving Relationships with Data
#32
Simulating Your Way to Security - One Detector at a Time
#33
Demo & Poster Session
#34
Breakfast
#35
Lunchtime Table Talk: Data Science Behind the Scenes, Part 1 - The Data Science Process for Network Security
#36
Morning Break
#37
Detecting Lateral Movement with a Compute-intense Graph Kernel
#38
Time-based Correlation of Malicious Events and their Connections
#39
Backwaters: Security Streaming Platform
#40
Identifying Automatic Flows
#41
Quantum Approach to Inverse Malware Eradication
#42
Insight2
#43
IMPACT
#44
Automated Cluster Testing and Optimization
#45
Dynamically Repurposed and Programmable Network Monitoring
#46
Breakfast
#47
Morning Break
#48
Lunchtime Table Talk: Data Science Behind the Scenes, Part 2 - "Tidy" Data for Network Traffic Analysis
#49
Conference Closing
#50
Lunchtime Table Talk: Graph Measures for Network Traffic Analysis
Popular by Type
All Types
Break
General Session
Keynote
Lunch Time Table Talk
Meals
Networking
Panel
Registration
Training
Popular by Day
All days
Sunday, Jan 6
Monday, Jan 7
Tuesday, Jan 8
Wednesday, Jan 9
Thursday, Jan 10
Recently Active Attendees
Hafiz Farooq
Admin
AD
Aaron Detwiler
Mike Brunner
Rastislav Janota
N
NBBrett
Nancy Ott
Joseph Reves
More →