FRIDAY, NOVEMBER 3, 2023
The Unlock your brain workshops

Discover your attack surface with Onyphe
Patrice AUFFRET
In this workshop, we offer you the opportunity to explore a repeatable methodology for identifying your attack surface starting from a simple domain name. We will see that it’s possible to pivot to other sources of information to unravel the connections between these sources and create the most comprehensive inventory of your attack surface possible.
Next, we will analyze your attack surface to identify weaknesses in assets exposed to the Internet, and we will also explore how to create visualizations and dashboards with Kibana to maintain an up-to-date view of your online exposure.
About the speaker:
- Over 20 years of experience in cybersecurity, spanning both offensive and defensive domains.
- Founder, CEO, and CTO of ONYPHE, a company specialized in attack surface management.

NATURAL LANGUAGE PROCESSING (NLP) FOR THREAT INTELLIGENCE
CANCELLED
English
Beginners
9:30 AM – 11:30 AM
Online ticketing
Pauline BOURMEAU
Natural language processing is a subfield of AI. It is at the core of large language models. In this workshop you learn how to break AI into tools and build your first NLP program. You learn to use natural language processing to extract knowledge and uncover patterns in text data. This workshop provides you with practical knowledge and skills that you can apply in your daily practice as a security professional. It is designed for beginners, you will be introduced to the foundations of NLP and gain practical experience in text pre-processing, representation, and classification.
Goals:
- Learn how to leverage natural language processing for Threat Intelligence and investigation in cybersecurity.
- Acquire practical skills to allow you to build your own pipelines.
- Guide you to an intuitive path for learning NLP and integrate it progressively to your daily tasks.
Program:
Building a sentiment analysis pipeline using pre-trained models and industry-standard libraries.
- Learn the essential steps of text pre-processing by practicing on a real dataset.
- Explore different methods of representing text data.
- Build a simple text classifier using popular techniques.
- Learn to measure accuracy of your model.
- Discussions and resources to go further.
Conclusion:
We quickly discuss diverse ranges of applications of NLP, including Open-Source Intelligence (OSINT), Security research and Incident Response.
And finally, we highlight the significance of working with structured and unstructured data.
Requirements: Knowledge in Python, no prior experience in AI is required.
_______________
About the speaker:
Pauline holds degrees in criminology and software engineering, with a first passion for linguistics, trained at the University of Sorbonne. At the helm of Cubessa, her focus gravitates towards the crossroads of AI, human cognition, and cybersecurity.
Her contributions to open-source initiatives reflect her genuine commitment. She has also had the opportunity to provide training sessions in hardware security. Beyond this, she is an active participant in the MISP community.
With a unique perspective rooted in linguistics, Pauline offers a fresh lens on building AI systems and their implications in the cybersecurity domain. Beyond her technical contributions, Pauline is an advocate for AI education. She is also the founder of the DEFCON group in Paris.
* Disclaimer: In her earlier days, 'Cookie' has spent a long-time fixing languages and bikes with very little money and great ingenuity, squatting university benches and corrupting teachers for beer.


Create your custom Command & Control
Guillaume PRIGENT and Adrien BARCHAPT-PERROT
Command & Control is a cornerstone of any attacker’s infrastructure, whether affiliated state actors (APTs), cybercriminals or legitimate Red Team operators.
“Custom your own C&C” is a 3:30 hours workshop for those interested in getting a quick start into the world of Command & Control design & architecture and who aim to develop their own implant in a famous open source framework.
In this bring-your-own-laptop workshop, participants will get to learn the architecture & the design of a well known open source framework, as an example and get a full hands-on introduction to designing a simple custom implant, working with 2 already prepared virtual machines and concluding with writing their own integrated x64 implant (C++/Python wrapper).
________
About the speakers
Guillaume Prigent (@g0ul4g)
Guillaume is a digital freethinker and an expert in cyber security. Co-founder of DIATEAM, Guillaume started out as an engineer in information systems security, and has been working in the digital security for 25 years now. He has developed many "proofs of concept" and some tools like netglub, ipmorph, hynesim and also gives talks and classes in many engineering schools (ENIB, ENSIETA, ESM Saint-Cyr, ...). Guillaume is the author of several papers on security, and is a frequent speaker and/or attendee at security and testing conferences such as SSTIC, HITB, HACK.LU, FRHACK, ...
Adrien Barchapt-Perrot
Adrien is the RedTeam leader at DIATEAM. Working in the field of offensive cybersecurity for 10 years, he is particularly interested and involved in the development of customized implants and the bypassing of defense systems.


Leverage the power of the crowd to improve your security
Manuel SABBAN and Cristian NITESCU (Crowdsec)
In a fast-evolving digital landscape, ensuring robust information security has become a paramount concern for decision-makers worldwide. That’s where CrowdSec Security Engine comes into play, offering a cutting-edge solution that empowers security teams to defend against intrusions with unparalleled efficiency.
CrowdSec Security Engine leverages advanced log analysis techniques to swiftly identify and neutralize offending IPs, providing an immediate shield for your digital infrastructure. Flagged IPs are seamlessly integrated into our community blocklist, creating a united front to safeguard the entire CrowdSec ecosystem.
But CrowdSec is much more than just a security engine; it's a set of dynamic open-source remediation tools, named 'bouncers.' These tools are designed to tackle a wide array of security challenges, ensuring a comprehensive defense strategy for your organization.
In our workshop, we will delve into the following key areas:
* Installation and configuration: learn how to seamlessly integrate CrowdSec into your environment and tailor it to your specific needs.
* Cold log analysis: discover how CrowdSec can effectively analyze your old logs, thus offering a forensic approach to allow for configuration adjustments.
* Targeted alerting notifications: explore how our system can be configured to provide precise alerts, keeping you informed when it matters most.
* Remediation in action: see how CrowdSec's remediation tools swiftly neutralize threats at IP and application level minimizing potential damage.
* Metrics analysis with our SaaS tool: gain insights into how our provided SaaS tool can help you make data-driven decisions and enhance your security posture.
________
About the speakers:
Manuel: I am Manuel Sabban, and I have been with CrowdSec since its beginning. I bring with me experience as a system engineer and in information security.
Cristian: I am Cristian Nitescu, Cloud and Data Architect at Crowdsec. Passionate about “making things work” in general, I have a (long) background in Software Development and Cloud Architecture. My personal interests include electronics, robotics, home automation

How the cryptocurrency Monero protects privacy
Mathias HERBERTS
Monero is the leading cryptocurrency that stands out for its commitment to preserving privacy. During this workshop, Mathias Herberts will detail its features, the practical aspects of its implementation and daily use, while also addressing its future prospects
This workshop includes a practical section aimed at familiarizing participants with the use of Monero. An Android or iOS mobile phone or a computer running Linux/MacOS/Windows will be required for that. A big shout out to Cake Wallet thanks to whom each attendee will receive some Monero.
________
About the speaker: Has been protecting their privacy since the 20th century.


The NIS v2 directive without an epidural
Marc-Antoine LEDIEU and Jean-Philippe GAULIER
The NISv2 directive represents a major development in the European cybersecurity landscape. It aims to enhance the security of networks and information systems across the European Union, expanding its scope compared to the original NIS directive by including a greater number of entities and strengthening security requirements.
We are transitioning from 300 entities to over 10,000 impacted. Therefore, we will discuss together how to establish a roadmap in a calm manner by clarifying the most significant buzzwords in the text: state of the art, hygiene, risk analysis, charters, security assurance plan, and logging.
In joy and good spirits, armed with some well-prepared jokes, we will go through the most delightful moments surrounding an unmissable text!
________
About the speakers:
Marc-Antoine Ledieu
After five years of experience as a litigator in business law, Marc-Antoine Ledieu specialized in digital law and B2B contractual engineering.
His areas of expertise cover software and SaaS service law, databases, personal data, the web, electronic communications, and encryption.
Since 1999, Marc-Antoine Ledieu has been teaching digital contract law in the Master 2 PRO "digital law" program at the University of Paris II Panthéon-Assas.
Jean-Philippe Gaulier
Jean-Philippe Gaulier is the co-founder of Cyberzen. Previously, he served as the CISO of the IT department of the Orange Group and as the Director of Innovation at digital.security. His areas of expertise include system, network, and open-source software, to which he regularly contributes. He is a member of the board of directors of OSSIR (Organisation de la Sécurité et de la Sûreté des Systèmes d'Information et des Réseaux - Organization for the Security and Safety of Information Systems and Networks).
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.