VB2017: WHOIS and EICAR Small Talks added

Posted by   Martijn Grooten on   Sep 12, 2017

In addition to the nine 'last-minute' papers that were announced and added to the VB2017 programme yesterday, we have also added two more 'Small Talks'.

The 'Small Talks' take place in a smaller room (hence the name) and last longer than regular VB2017 talks, thus giving a more informal atmosphere to allow for discussion and debate among peers – the kind of thing that is, for many, one of the prime reasons for attending a conference. Already on the programme are Small Talks on the testing of security products, on ENISA's lessons from the WannaCry outbreak, and on how security vendors should deal with HTTPS traffic.

In one of the newly added Small Talks, Neil Schwartzman (CAUCE) will discuss the EU's General Data Protection Regulation (GDPR). Beyond the many webinars and press releases about the impact of the GDPR, there is real regulation with real impact, which most security experts agree is a good thing.

The GDPR also has implications for WHOIS, the protocol that stores information on the owners of domains and IP addresses and that is vital for the work of many in the anti-abuse space. It is these implications that Neil, a veteran of the anti-spam community, will discuss: how will the GDPR affect WHOIS? What will future WHOIS records look like? Is there anything to be done?

If you are a regular user of WHOIS in your security research, make sure you attend Neil's Small Talk, so that you're prepared for this side of the GDPR too.

Given our common goals, Virus Bulletin has long cooperated with EICAR, and we are pleased that in the second of the Small Talks to be announced today, we will host Sachar Paulus, Rainer Fahs and Marcel Eberling for a discussion on the organization's trustworthiness strategy and minimum standard.

Anyone who follows the security news will know that the trustworthiness of security products is sometimes questioned. And although the arguments aren't always rational, transparency and verifiability could improve this trustworthiness.

It is this that the organization is working on, and the three speakers will share details of EICAR's Trustworthiness Strategy, as well as of the proposed minimum standard for software vendors to demonstrate the trustworthiness of their solutions – thus making this an important session for vendors and testers alike.

There is still time to register for VB2017, so don't hesitate to book your ticket now to join us in Madrid, 4-6 October 2017!

VB2017-325w.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: Fantastic Information and Where to Find it: A guidebook to open-source OT reconnaissance

A VB2019 paper by FireEye researcher Daniel Kapellmann Zafra explained how open source intelligence (OSINT) can be used to learn crucial details of the inner workings of many a system. Today we publish Daniel's paper and the recording of his…

VB2019 paper: Different ways to cook a crab: GandCrab Ransomware-as-a-Service (RaaS) analysed in depth

Though active for not much longer than a year, GandCrab had been one of the most successful ransomware operations. In a paper presented at VB2019 in London, McAfee researchers John Fokker and Alexandre Mundo looked at the malware code, its evolution…

VB2019 paper: Domestic Kitten: an Iranian surveillance program

At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted surveillance. Today we publish their paper and the video…

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.

VB2019 paper: DNS on fire

In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their paper and the recording of their presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.