
About Track 4 - Encrypted Traffic Monitoring and IT Intrusion Product Training
    
    The full agenda for track 4 is below.  For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Threat Detection from Automated OSINT Collection and Analysis
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Product Training
Track 6: Social Network Monitoring and Big Data Analytics Product Training
Track 7: Mobile Signal Intercept and Electronic Surveillance Product TrainingPre-Conference: Seminars and Tutorials (Monday, 16 March 2015)
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Monday, 16 March 2015
| 13:30-14:30 | Encryption of mass-communication changed the game’s rules: Remote Stealth Surveillance Presented by AGT | 
| 14:45-15:15 | HackingTeam and Its Competitors:  IT Offensive Surveillance in Today's Changing, Challenging and Dangerous World Eric Rabe, Hacking Team | 
Tuesday, 17 March 2015
| 9:00-10:00 Session A | "Covert IT Operations with OSINT and FinFisher™ - Real Scenarios" Presented by FinFisher | 
| 9:00-10:00 Session B | Carrier Grade Platform to Intercept Secured Communications and Remote Intrusion Presented by ClearTrail Technologies | 
| 11:30-12:30 Session A | FinFisher™: Maximum Impact - The Evolution of IT Investigation Presented by FinFisher | 
| 11:30-12:30 Session B | Encryption of mass-communication changed the game’s rules, learn how to stay ahead of Remote Stealth Surveillance Presented by AGT | 
| 14:00-15:00 Session A | Intruding Personal Devices with Remote Control System: Live Demo of Latest Attack and Data Gathering Techniques Presented by Hacking Team | 
| 14:00-15:00 Session B | Optimized Cryptanalysis Infrastructure - "Doing more with less" Presented by SciEngines | 
| 15:30-16:30 Session A | Cyber Weapons, Warfare, Decryption and Evasion Platforms Dr (hc) Ankur Srivastava, Founder, Aglaya | 
| 15:30-16:30 Session B | Methodologies and Instruments for Remote IT Intrusion Presented by RCS S.p.A. | 
Wednesday, 18 March 2015
| 9:00-10:00 | Cyber Weapons and Remote Delivery Mechanisms. A Live Presentation for Asymmetric Warfare and Decryption of Closed Online Services Dr (hc) Ankur Srivastava, Founder, Aglaya |