tf-csirt.org Open in urlscan Pro
2001:798:3::132  Public Scan

URL: https://tf-csirt.org/72nd-tf-csirt-meeting-prague-full-programme/
Submission: On August 23 via api from TR — Scanned from NL

Form analysis 3 forms found in the DOM

GET https://tf-csirt.org/

<form role="search" method="get" class="search-form" action="https://tf-csirt.org/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search..." value="" name="s" title="Search for:">
  </label>
  <input type="submit" class="search-submit" value="Search">
  <span class="searchico genericon genericon-search"></span>
</form>

GET https://tf-csirt.org/

<form role="search" method="get" class="search-form" action="https://tf-csirt.org/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search..." value="" name="s" title="Search for:">
  </label>
  <input type="submit" class="search-submit" value="Search">
  <span class="searchico genericon genericon-search"></span>
</form>

GET https://tf-csirt.org/

<form role="search" method="get" class="search-form" action="https://tf-csirt.org/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search..." value="" name="s" title="Search for:">
  </label>
  <input type="submit" class="search-submit" value="Search">
  <span class="searchico genericon genericon-search"></span>
</form>

Text Content

 * 

ocf-sec@opencsirt.org


TF-CSIRT


HOME FOR THE COMPUTER SECURITY INCIDENT RESPONSE TEAMS


MENU

Skip to content
 * Home
 * TRANSITS
   * TRANSITS I
     * TRANSITS I Programme
     * PGP Keysigning
     * Preparing for TRANSITS I
   * TRANSITS II
     * Next TRANSITS II info
     * TRANSITS II Programme
   * TRANSITS materials
   * TRANSITS Terms and Conditions
 * TF-CSIRT
   * Meetings
     * Meeting Guest Policy
   * Steering Committee
     * SC Member Responsibilities
     * Trusted Introducer Review
     * Futures Review
   * Membership
     * House Rules
     * Geographical Regions
     * Dispute Resolution Procedure
     * Voting Record
   * Strategy
 * Trusted Introducer
   * Public TI Directory
   * Access for TI Members
   * TI Self Service for Team Representatives
   * Why Become Listed?
   * Why Become Accredited?
 * Resources
   * Working Groups
   * Training materials
 * News
 * Contacts

Search for:



72ND TF-CSIRT MEETING: PRAGUE (FULL PROGRAMME)

TF-CSIRT > 72nd TF-CSIRT Meeting: Prague (full programme)


DETAILED PROGRAMME: WEDNESDAY 25TH SEPTEMBER 2024

time title ATTENDEES tlp 09:00 – 12:00 TF-CSIRT Steering Committee Members
Steering Committee Members only CLOSED MEETING 12:00 – 13:00 LUNCH 13:00 – 17:00
CLOSED MEETING Accredited and Certified teams only RED/AMBER


DETAILED PROGRAMME: THURSDAY 26TH SEPTEMBER 2024

time title speaker tlp 09:00 – 09:10 Welcome Silvio Oertli, SWITCH-CERT CLEAR
09:10 – 09:30 Twelve years experience of cybersecurity awareness raising in
Latvia Egils Stūrmanis, CERT.LV CLEAR 09:30 – 10:00 Inside BinConf Range:
Design, Challenges, and Operational Overview Peter Kleinert, BinConf CDC CLEAR
10:00 – 10:45 What IT security can learn from civil defence and disaster control
Jens Bothe, OTRS GREEN 10:45 – 11:00 CVE Prioritisation using MISP and TheHive
Lewis Goor, StACSIRT GREEN 11:00 – 11:30 COFFEE BREAK 11:30 – 12:00 DDoS me now!
Bilgehan Turan, EATM-CERT GREEN 12:00 – 12:15 Honeypot in a boxHugo Pavel
Valach, CESNET-CERTS CLEAR 12:15 – 12:45 Security aspects of internet routing
Maria Matejka, BIRD | CZ.NIC CLEAR 12:45 – 13:30 LUNCH 13:30 – 14:00 Navigating
Threat Response when security depends on user behavior Sergio Albea, CSOC CLEAR
14:00 – 14:20 The Rise and Impact of DNS Firewall in Latvia – from idea to
mandatory measure Dana Ludviga, CERT.LV CLEAR 14:20 – 14:35 It’s 2024… and we
still haven’t learned what system (not) to expose on the internet Jan Kopriva
CLEAR 14:35 – 14:55 Network scanning in e-infrastructure CESNET Radko Krkoš,
CESNET-CERTS CLEAR 14:55 – 15:20 COFFEE BREAK 15:20 – 15:40 Netflow FTAS Pavel
Kácha, CESNET-CERTS CLEAR 15:40 – 16:00 Vulnerability management in
e-infrastructure CESNET Radko Krkoš, CESNET-CERTS CLEAR 16:00 – 17:00 Lightning
talks moderated by Sigita Jurkynaite CLEAR


DETAILED PROGRAMME: FRIDAY 27TH SEPTEMBER 2024 (TRAINING DAY)

The training sessions will take place on 27 September at various locations in
Prague – check the location for the specific training in the table below.

time title speaker description location FULL DAY TRAINING 09:00 – 17:00



Registration for this training is already closed as the capacity has been
reached

BinConf Range Showdown: Hands-On Defense and Attack Simulation Peter
Kleinert, Binconf CDC In this hands-on workshop, participants will engage in an
intense cybersecurity showdown using the BinConf range, a sophisticated cyber
range that simulates a small organization’s IT environment. Designed for both
blue and red team members, this immersive experience will challenge participants
to defend and attack within a realistic, dynamic network simulation that mirrors
common organizational setups. CESNET



Generála Píky 430/26
160 00 Prague 6
Czech Republic

FULL DAY TRAINING 09:00 – 17:00



Registration for this training is already closed as the capacity has been
reached

Log & Metrics architecting on the Elastic Stack Thorben Jändling, Elastic The
training goes through all the Elastic Stack components relevant to logging and
metrics use-cases (in particular for security), what they do and how to use
them. It should give participants the ability to create robust and future proof
Elastic Stack architectures, from log collection, to indexing, to analytics.
Each module ends with a Quiz running in CTFd, that always gets fun and
competitive. All attendees would need a device (laptop/tablet) that can browse
the internet, for the course material PDF and CTFd participation. CESNET



Generála Píky 430/26
160 00 Prague 6
Czech Republic

HALF DAY TRAINING 09:00 – 12:00



Registration for this training is already closed as the capacity has been
reached

Inter federation incident response (IR) in eduGAIN Sven Gabriel, eduGAIN CSIRT
In this workshop we want to raise awareness of the complexity of incident
response in a large federated environment like eduGAIN (https://edugain.org/)
providing a trusted infrastructure for federated authentication. The focus here
is on the inter federation aspect of IR, and what the key players in IR can do,
to deal with an incident requiring the collaboration of the operators
(Federation, IdP, SP) contributing to the eduGAIN service and the coordination
with eduGAIN CSIRT. The participants will get an introduction to eduGAIN, the
relevant security policies, the key security roles, and the IR supporting
frameworks like SIRTFI. After that the participants will have to deal with an
artificial incident and apply the IR concepts presented before in a Table Top
Exercise (TTX) set-up. Although it’s an “made up” scenario, it consists of real
world incidents the authors had to deal with. Each of the security roles will be
taken by a group, in which the possible reaction to the developing incident
response situation needs to be discussed and the found reaction fed back to the
incident coordinator. The goal here is to identify the organisational obstacles
an operator may run into during IR, and check if the existing procedures are
clear enough. The enabled learning objectives (what the participants should
learn) include:



* IdP/SP logfile analysis (check for/find a reported Id).

* Know SIRTFI v2, and understand how to apply it.

* Know how eduGAIN is organised, role of Federations, and eduGAIN CSIRT.

* Name the risks of Federated Identity Management.

SPCSS



Na Vápence 915/14, 130 00 Praha 3

HALF DAY TRAINING



09:00 – 12:00

AND

13:00 – 17:00

Registration for the afternoon session is already closed as the capacity has
been reached

Artemis (Security Scanner) Krzysztof Zając, CERT PL Artemis is a security
scanner that we’ve built and use at CERT PL. It is able to check a large number
of systems for vulnerabilities and security-related misconfigurations and
prepare easy-to-read reports that we then send to affected entities. Using
Artemis, we already found almost 300 thousand vulnerabilities and
misconfigurations in systems in our constituency. During the training you will
learn how to set up and use Artemis.



For best results you are encouraged to have access to a Linux virtual machine
and prepare your own list of domains to scan. If you bring a list of e.g., 100
schools in your constituency, you will be able to configure Artemis and initiate
a scan that will end with a package of e-mails that can be sent to the affected
entities to improve their security.

However, if you don’t bring your own domains, you will still learn how Artemis
works and how to use it in practice. You will be able to configure Artemis (or
use a demo instance I will set up) and scan example domains.

CESNET



Generála Píky 430/26
160 00 Prague 6
Czech Republic

HALF DAY TRAINING



13:00-15:30

 

Open Hardware as a Security Probe Michal Hrušecký, CZ.NIC Open hardware with a
free operating system can be utilized as a security probe. This potential use
will be demonstrated using the Turris router, which was originally developed as
a security probe for our Turris Sentinel program. This ongoing security research
allows participants to join the program, help collect data, and simultaneously
use it for their own protection. Within an organization, the Turris router can
also serve as a data source for internal security analysis. The workshop will
focus on features available to regular users and on possibilities that might be
interesting when deploying open hardware in the corporate sphere to enhance
security. The goal of the workshop is to show users that open hardware with a
free operating system can be an effective solution for both home and corporate
security. CZ.NIC z.s.p.o., Milesovska 5, 130 00

 


Search for:


RECENT POSTS

 * Back to Stockholm for 70th TF-CSIRT
 * Open Cyber Security Conference
 * TF-CSIRT Steering Committee: Candidates 2023
 * TF-CSIRT Returns to Romania
 * TF-CSIRT SC Elections 2023


ARCHIVES

Archives Select Month October 2023  (1) September 2023  (2) June 2023  (1) May
2023  (1) February 2023  (1) January 2023  (1) September 2022  (1) July 2022
 (1) May 2022  (2) December 2021  (1) September 2021  (2) June 2021  (2) March
2021  (1) October 2020  (3) September 2020  (6) June 2020  (1) April 2020  (1)
November 2019  (1) September 2019  (1) May 2019  (1) March 2019  (2) February
2019  (1) November 2018  (1) July 2018  (1) March 2018  (1) December 2017  (2)
November 2017  (1) October 2017  (2) September 2017  (1) May 2017  (1) April
2017  (1) December 2016  (2) October 2016  (2) September 2016  (1) May 2016  (1)
December 2015  (1)


META

 * Log in
 * Entries feed
 * Comments feed
 * WordPress.org




PRIVACY NOTICE

Privacy Notice

Copyright © TF-CSIRT
Powered by WordPress , Theme i-excel by TemplatesNext.
MENU
 * Home
 * TRANSITS
   
   * TRANSITS I
     
     * TRANSITS I Programme
     * PGP Keysigning
     * Preparing for TRANSITS I
   * TRANSITS II
     
     * Next TRANSITS II info
     * TRANSITS II Programme
   * TRANSITS materials
   * TRANSITS Terms and Conditions
 * TF-CSIRT
   
   * Meetings
     
     * Meeting Guest Policy
   * Steering Committee
     
     * SC Member Responsibilities
     * Trusted Introducer Review
     * Futures Review
   * Membership
     
     * House Rules
     * Geographical Regions
     * Dispute Resolution Procedure
     * Voting Record
   * Strategy
 * Trusted Introducer
   
   * Public TI Directory
   * Access for TI Members
   * TI Self Service for Team Representatives
   * Why Become Listed?
   * Why Become Accredited?
 * Resources
   
   * Working Groups
   * Training materials
 * News
 * Contacts

Search for:


 * Home
 * TRANSITS
   * TRANSITS I
     * TRANSITS I Programme
     * PGP Keysigning
     * Preparing for TRANSITS I
   * TRANSITS II
     * Next TRANSITS II info
     * TRANSITS II Programme
   * TRANSITS materials
   * TRANSITS Terms and Conditions
 * TF-CSIRT
   * Meetings
     * Meeting Guest Policy
   * Steering Committee
     * SC Member Responsibilities
     * Trusted Introducer Review
     * Futures Review
   * Membership
     * House Rules
     * Geographical Regions
     * Dispute Resolution Procedure
     * Voting Record
   * Strategy
 * Trusted Introducer
   * Public TI Directory
   * Access for TI Members
   * TI Self Service for Team Representatives
   * Why Become Listed?
   * Why Become Accredited?
 * Resources
   * Working Groups
   * Training materials
 * News
 * Contacts