It’s down to the wire! There is only one day left to vote for the RSA Conference 2015 Crowdsourced Sessions Track. To briefly recap, this is the first time that the information security community has been able to select the talks they would like to see at RSA Conference USA. Voting is open to the public. Voters are not limited to a single choice—they can pick an unlimited number of sessions and even change votes until April 2nd. The top 25 sessions by vote total will then go on a shortlist that the RSA session judges will use to make final selections.
Here’s a quick rundown of the talk submissions from OpenDNS Security Labs researchers:
One crowdsourced submission for this year comes from Jeremiah O’Connor, security researcher at OpenDNS. Titled “NLP for APT via DNS,” O’Connor plans to discuss a new, advanced threat detection model that uses natural language processing techniques to identify malicious domains in the wild. Discussed previously on this blog, NLPRank uses natural language processing coupled with HTML analysis and ASN mapping across billions of DNS records to predict both opportunistic phishing campaigns and attacks directed at high-value targets.
O’Connor says that one of the things that he’s excited to discuss at RSA is the progress he’s made on operationalizing NLPRank. In a conversation late last week, O’Connor talked about working with OpenDNS Research Labs senior security researcher Dhia Mahjoub to set up a review pipeline that can automatically filter out the false positives highlighted by his original algorithm.
Andrew Hay, director of security research at OpenDNS Security Labs submitted two sessions for the RSA crowdsourced track. His talk, titled “The Researcher’s Guide to the Internet of Things,” promises to be one of the first ever sessions to explore actual, anonymized population data from IoT devices used on enterprise networks. Hay also submitted another talk on global trends in malware and other attack campaigns, titled “The Freaks (and Malware) Come Out at Night.” This talk will use new data from a global cross-section of malicious traffic analyzed by OpenDNS to show how the increased prevalence for malware and botnet campaigns to occur at night, when most workers in the Western Hemisphere are using personal devices and are off corporate networks. Both talks will include suggestions for security professionals to update make their own networks and end users more secure.
To vote for crowdsourced sessions submitted by the OpenDNS Security Labs team, select Andrew Hay and Jeremiah O’Connor’s sessions RSA Conference website or vote individually, via the following links:
- Jeremiah O’Connor, “NLP for APT via DNS”
- Andrew Hay, ““The Researcher’s Guide to the Internet of Things”
- Andrew Hay, “The Freaks (and Malware) Come Out at Night”