Sched.com Conference Mobile Apps
FloCon 2017
has ended
Create Your Own Event
Menu
Schedule
Speakers
Sponsors
Search
Log in
Sign up
FloCon 2017
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Search
or browse by date + venue
General Session
All
All About the Analyst
Behavior and Patterns
Insider Threat
Internet
Know and Love Your Data
Network Operations and Security
Success Stories
Tools that Scale
Keynote
Meals
Networking
Registration
Training
All
Off-Site Training
Popular
Popular Events
#1
Finding the Needle in the Haystack
#2
Conference Introduction
#3
Low Hanging Fruit Tastes Just as Good
#4
Mothra: A Large-Scale Data Processing Platform for Network Security Analysis
#5
Welcome Reception
#6
Tuesday Morning Breakfast
#7
Backbone Network DRDoS Attack Monitoring and Analysis
#8
Next Generation Incident Response: Tools and Methods for Hunting and Responding to Advanced Threats
#9
SilkWeb - Analyzing Silk Data through API and Javascript Frameworks
#10
Challenges and Opportunities in Protecting the World's Largest Network
#11
DDoS Defense with a Community of Peers (3DCoP)
#12
Netflow Collection and Analysis at an Internet Peering
#13
Flow-Based Monitoring, Troubleshooting and Security using nProbe
#14
echo 'PCAP cant scale'| sed 's/cant/does/'
#15
Uncovering Beacons Using Behavioral Analytics and Information Theory
#16
Developing Insider Threat Indicators from Netflow
#17
Metrics-Focused Analysis of Network Flow Data
#18
Running Reliable Network Security Monitoring Infra @ Facebook
#19
Navigating the Pitfalls and Promises of Network Security Monitoring
#20
Flow Collection and Analytics at Verizon
#21
Demonstration and Poster Session
#22
'Lions and Tigers and Bears, Mirai!': Tracking IoT-Based Malware w//Netflow
#23
Incorporating Network Flow Analysis Into an Insider Threat Program
#24
Detecting Threats, Not Sandboxes: Characterizing Network Environments to Improve Malware Classification
#25
Using flow for realtime traffic management in 100G networks
#26
A Network Flows Visualization Framework and API for Network Forensics and Analytics in the Web
#27
Scalable Temporal Analytics to Detect Automation and Coordination
#28
Tuesday Lunch
#29
Wednesday Morning Breakfast
#30
Wednesday Lunch
#31
Assessing Targeted Attacks in Incident Response Threat Correlation
#32
DISA Cyclops Program
#33
Networking Reception
#34
Discovering Deep Patterns in Large-scale Network Flows using Tensor Decompositions
#35
Thursday Morning Breakfast
#36
Monday Morning Breakfast
#37
Morning Training Session, Track I: Network Traffic Analysis - SILK
#38
Monday Lunch
#39
Afternoon Training Session, Track I: Network Traffic Analysis - SILK
#40
Afternoon Training Session, Track II: Bro
#41
Bus Boarding for Networking Reception
#42
I Want Your Flows To Be Lies
#43
Registration
#44
Morning Break
#45
Delivering Cyber Warfighting Capability from Seabed to Space
#46
The Linux Command Line for Network Traffic Analysis
#47
Afternoon Break
#48
Thursday Lunch
#49
Morning Break
#50
Morning Break
Popular by Type
All Types
General Session
Keynote
Meals
Networking
Registration
Training
Popular by Day
All days
Sunday, Jan 8
Monday, Jan 9
Tuesday, Jan 10
Wednesday, Jan 11
Thursday, Jan 12