Sched.com Conference Mobile Apps
FloCon 2017
has ended
Create Your Own Event
FloCon 2017
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Search
or browse by date + venue
General Session
All
All About the Analyst
Behavior and Patterns
Insider Threat
Internet
Know and Love Your Data
Network Operations and Security
Success Stories
Tools that Scale
Keynote
Meals
Networking
Registration
Training
All
Off-Site Training
Popular
menu
Menu
Schedule
Speakers
Sponsors
Search
Popular Events
#1
Welcome Reception
#2
Monday Morning Breakfast
#3
Morning Training Session, Track I: Network Traffic Analysis - SILK
#4
Monday Lunch
#5
Afternoon Training Session, Track I: Network Traffic Analysis - SILK
#6
Afternoon Training Session, Track II: Bro
#7
Registration
#8
The Linux Command Line for Network Traffic Analysis
#9
Finding the Needle in the Haystack
#10
Conference Introduction
#11
Tuesday Morning Breakfast
#12
Backbone Network DRDoS Attack Monitoring and Analysis
#13
SilkWeb - Analyzing Silk Data through API and Javascript Frameworks
#14
Challenges and Opportunities in Protecting the World's Largest Network
#15
DDoS Defense with a Community of Peers (3DCoP)
#16
Netflow Collection and Analysis at an Internet Peering
#17
Metrics-Focused Analysis of Network Flow Data
#18
Running Reliable Network Security Monitoring Infra @ Facebook
#19
Using flow for realtime traffic management in 100G networks
#20
Tuesday Lunch
#21
Assessing Targeted Attacks in Incident Response Threat Correlation
#22
DISA Cyclops Program
#23
Networking Reception
#24
Bus Boarding for Networking Reception
#25
Morning Break
#26
Afternoon Break
#27
Low Hanging Fruit Tastes Just as Good
#28
Mothra: A Large-Scale Data Processing Platform for Network Security Analysis
#29
Next Generation Incident Response: Tools and Methods for Hunting and Responding to Advanced Threats
#30
Flow-Based Monitoring, Troubleshooting and Security using nProbe
#31
echo 'PCAP cant scale'| sed 's/cant/does/'
#32
Navigating the Pitfalls and Promises of Network Security Monitoring
#33
Flow Collection and Analytics at Verizon
#34
Demonstration and Poster Session
#35
A Network Flows Visualization Framework and API for Network Forensics and Analytics in the Web
#36
Wednesday Morning Breakfast
#37
Wednesday Lunch
#38
Delivering Cyber Warfighting Capability from Seabed to Space
#39
Morning Break
#40
Uncovering Beacons Using Behavioral Analytics and Information Theory
#41
Developing Insider Threat Indicators from Netflow
#42
'Lions and Tigers and Bears, Mirai!': Tracking IoT-Based Malware w//Netflow
#43
Incorporating Network Flow Analysis Into an Insider Threat Program
#44
Detecting Threats, Not Sandboxes: Characterizing Network Environments to Improve Malware Classification
#45
Scalable Temporal Analytics to Detect Automation and Coordination
#46
Discovering Deep Patterns in Large-scale Network Flows using Tensor Decompositions
#47
Thursday Morning Breakfast
#48
I Want Your Flows To Be Lies
#49
Thursday Lunch
#50
Morning Break
Popular by Type
All Types
General Session
Keynote
Meals
Networking
Registration
Training
Popular by Day
All days
Sunday, Jan 8
Monday, Jan 9
Tuesday, Jan 10
Wednesday, Jan 11
Thursday, Jan 12