BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//hack-lu-2024//speaker//JYPHAH
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-hack-lu-2024-KTE9WR@pretalx.com
DTSTART;TZID=CET:20241025T111500
DTEND;TZID=CET:20241025T114500
DESCRIPTION:In this presentation\, Tristan Madani will delve into "Predicti
 ve Analytics for Adversary Techniques in the MITRE ATT&CK Framework using 
 Rule Mining." This talk introduces a novel approach to predicting potentia
 l adversary techniques by leveraging historical attack data and applying a
 ssociation rule mining. Attendees will gain insights into how the MITRE AT
 T&CK framework can be utilized to enhance threat hunting and incident resp
 onse capabilities. Key takeaways include understanding the methodology beh
 ind rule mining\, the practical application of the Apriori and FP-Growth a
 lgorithms\, and the implications of the findings for proactive cybersecuri
 ty measures. This presentation is essential for cybersecurity professional
 s looking to stay ahead of evolving threats by anticipating adversary acti
 ons.
DTSTAMP:20260314T230159Z
LOCATION:Europe - Main Room
SUMMARY:Predictive Analytics for Adversary Techniques in the MITRE ATT&CK F
 ramework using Rule Mining - Tristan MADANI
URL:https://pretalx.com/hack-lu-2024/talk/KTE9WR/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-hack-lu-2024-DJ7SZA@pretalx.com
DTSTART;TZID=CET:20241025T133000
DTEND;TZID=CET:20241025T133500
DESCRIPTION:As cyber threats continue to evolve\, traditional adversary sim
 ulation methods are struggling to keep pace with the sophisticated tactics
 \, techniques\, and procedures (TTPs) used by attackers today. In this tal
 k\, we explore the shortcomings of current simulation frameworks and intro
 duce the ACTOR Model\, a comprehensive and forward-thinking approach desig
 ned to overcome these challenges.\n\nLeveraging real-world insights and in
 tegrating the MITRE ATT&CK framework and Structured Threat Information Exp
 ression (STIX) data\, the ACTOR Model enhances realism\, scalability\, and
  customization in adversary simulation. Through the lens of humor and deep
  technical analysis\, we declare the end of outdated methods and present t
 he future of simulation: a strategic\, adaptable\, and highly effective fr
 amework that equips organizations to stay ahead of adversaries. Join us as
  we dive into the next generation of adversary simulation — it’s far f
 rom dead\, it’s just evolving.
DTSTAMP:20260314T230159Z
LOCATION:Europe - Main Room
SUMMARY:Introducing the ACTOR Model: Adversary Simulation is dead\, long li
 ve Adversary Simulation! - Tristan MADANI
URL:https://pretalx.com/hack-lu-2024/talk/DJ7SZA/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-hack-lu-2024-RMMUL7@pretalx.com
DTSTART;TZID=CET:20241025T135500
DTEND;TZID=CET:20241025T140000
DESCRIPTION:We will demonstrate how to Backdooring Powershell using Phantom
  DLL Hijacking.
DTSTAMP:20260314T230159Z
LOCATION:Europe - Main Room
SUMMARY:Phantom DLL Hijacking in Powershell.exe (aka Backdooring Powershell
  for Fun and Profit) - Tristan MADANI
URL:https://pretalx.com/hack-lu-2024/talk/RMMUL7/
END:VEVENT
END:VCALENDAR
