Fighting network threats Save to my Google calendar

Fighting malicious network traffic and attacks, information leakage as well
as misconfigured network devices: Network traffic to or from the void - that
is unassigned or unused IP address space - is suspicious and often indicates
a problem. Monitoring the void helps detecting those.

Fighting botnets - policy and code of conduct: Due to the distributed nature of botnets when fighting them, many organisations, legislations and countries are involved, so incident responders at all involved levels and law enforcement are in need of a code of conduct on how to deal with the incident itself as well as with confidential and private data that the botnet may have collected.

Fighting botnets - practice: Detecting threats in networks as well as on websites and end-user devices, correlating and sharing data via a centralised repository, and providing data and support to all affected parties.


Tuesday, 20 May from 12:00 to 13:30 IST
Lecture Theatre B
Reimer Karlsen-Masur DFN-CERT Services GmbH

Related documents

Archived stream