International Workshop on Big Data Analytics for Cyber Threat Hunting (CyberHunt) 2020
Event submitted on Monday, October 12th 2020, approved by Henry Dalzel ✓
This event has been tagged as follows:
This would be an excellent conference for those with working with IOT technology and also living and working in Atlanta
Conference Event Summary
The following description was either submitted by the Conference Organizer on Monday, October 12th 2020, or created by us.
Cyber-crimes against critical infrastructure, operational technology, IoT, and large organizations have become more sophisticated and are executed at machine speed. In response to that, cyber defenders transition from manual and reactive approaches to more automated and proactive. A key element for building a robust security posture against adversarial attacks is Cyber threat intelligence (CTI). CTI allows security teams to benefit from increased situational awareness and thus minimize their organization’s attack surfaces. Based on the detection maturity of an organization, such intelligence can update cyber defense components in an automated manner based on the established trust between the entity sharing the intelligence and the entity consuming it, or in more proactive approaches such as threat hunting and risk assessment. For example, TTPs used in adversarial activities can support threat hunting efforts where the objective is to detect unidentified malicious activity that evaded existing security solutions. The CyberHunt workshop aims to present (potentially AI-focused) new research in the areas of cyber-threat hunting, cyber-threat intelligence, and security orchestration, automation, and response.
Any novel research related to cyber threat intelligence, incident and threat response, threat hunting, and security automation and orchestration is welcome.
Some suggested topics are:
-Cyber Threat Intelligence (strategic, operational, tactical, technical)
-Models for forecasting cyber-attacks and measuring the impact
-Threat actor groups & techniques
-Semantic modeling, data representation and fusion for CTI
-Models that take into consideration Deception and Uncertainty in cyber-attack attribution
-Indicators of compromise and how to detect/mitigate
-Visualization techniques for intelligence analysis and investigation
-Legal, privacy and ethical factors in intelligence analysis
-Data analytics for security
-Intrusion and anomaly detection and prevention
-Monetization of cybercrime
-Open Source tools
-Relevant geopolitical cybersecurity research