Report Phishing
Vendor Solutions
Consumer Advice
 
 - Home
 - Report Phishing
 - APWG Events
 - Resources
 - eCrime & Phishing News
 - Phishing Education
 - Crimeware Map
 - JOIN THE APWG
 - APWG Member Site
 - Contact Us
 
 
 
 
 
Platinum Sponsor



 

Silver Level Sponsors Bronze Sponsor
PIR PIR

Wombat
CERT/SEI
Program Partners

OAS

STOP. THINK. CONNECT.

Technical Sponsor
and
2012 eCrime Fighter Scholarship Patron
IEEE

 

 
Available Sessions
Monday,22 October

APWG Cybercrime Assessment

Threats Without Frontiers

Dave Jevans
APWG

APWG Europe: Promise and Potential of Intercontinental Cybercrime Engagement

Jorge Aguila Vila
CaixaBank

APWG eCrime Exchange: A Forensic Collaboration Nexus for Cybercrime Event Data Induction, Exchange and Processing

Mike D'Ambrogia
APWG

Mobile Threats: Going Where the Money Is

Etay Maor
RSA

Mobile Intrusion: From State Sponsorship to the Cybercrime Plexus

Jart Armin
HostExploit

APWG Mobile Panel

Moderator:
Jart Armin
HostExploit

Panel:
Etay Maor
RSA

Kurt Wescoe
Wombat Security Technologies

Dave Jevans
APWG

APWG Cybercrime Data Discussion

Announcing the APWG Accredited Reporter Cybercrime Data Submission Program

Dave Jevans
APWG

URL Block List 2.0 - Expanding Data Sets for Precision Reporting and Deeper Data Mining

Pat Cain
APWG

Data Exchange Policy- Avoiding the Zero-Sum Trap

Erin Kenneally
eLCHEMY, Inc.

Botnet Mitigation Panel -

   Moderator:
   Don Blumenthal
   PIR

Panel:
Michael Hausding
SWITCH
Ben Butler - Presentation
GoDaddy
Pat Cain - Presentation
APWG

Tuesday, 23 October  

eCrime Research Programs Review and Announcements

Announcing the APWG eCrime Research Scientific Advisory Board Program

 

Panel:
Saeed Abu-Nimeh
APWG eCrime Researchers Summit Co-Chair

Shawn Loveland
Microsoft

The Technologies and Tools of eCrime Forensics

Shylock: an end-to-end cybercrime organization

Peter Kruse
CSIS

The ZueS Blitz Strategy

Brad Wardman
PayPal

Linking Crimeware to the Criminals

Saeed Abu-Nimeh
PayPal

Behavioral Aspects and Human Factors in Cybercrime Management

PhishAri: Automatic Realtime Phishing Detection on Twitter

Anupama Aggarwal
Indaraprastha Institute of Information Technology

Ashwin Rajadesingan
Arizona State University

Ponnurangam Kumaraguru
Indraprastha Institute of Information Technology

Does Context Influence Responses to Firewall Warnings?

Muhammad Mahmoud
Carleton University

Sonia Chiasson
Carleton University

Ashraf Matrawy
Carleton University

Explaining Cybercrime through the Lens of Differential Association Theory

Rachel Levin
The College of New Jersey

Jonathan Richardson
Northern Kentucky University

Gary Warner, Kent R Kerley
University of Alabama at Birmingham

The Technologies and Tools of Cybercrime Response and Management

Discovering Phishing Dropboxes Using Email Metadata

Tyler Moore
Southern Methodist Univeristy

Richard Clayton
Cambridge University

Investigative Response Modeling and Predictive Data Collection

Dan Moor
Hewlett Packard

S. Raj Rajagopalan
Hewlett Packard

Sathya Chandran Sundaramurthy, Xinming Ou
Kansas State University

Internet Policy Committee - Programs in Development Review

   Moderator:
   Rod Rasmussen
   InternetIdentity

 

Internet Policy Commettee reveiw

The Global Phishing Report on Abuse of TLDs

Website Exploit Survey

Greg Aaron
Afilias

Rod Rasmussen
InternetIdentity

Dave Piscatello
ICANN

Wednesday, 24 October  

APWG Global Response Roundtable
The Challenge and Promise of Globalized Online Awareness Messaging

   Moderator:
   Peter Cassidy
   APWG

Panel:
Amy Jarrette
Public Safety Canada

Aury M. Curbelo Ruiz
University of Puerto Rico

Kim Sanchez
Microsoft

Brian Sullivan
Organization of American States

How Do Consumers React to Cybercrime?

Rainer Boehme
Universität Münster

Tyler Moore
Southern Methodist University

There Is A Scam for Everyone: Critical Trends in Internet Fraud Solicitations

Jon Rusch
US Justice Department

Dual Canonicalization: An Answer to the Homograph Attack

James Helfrich
Brigham Young University

APWG Malicious Domain Suspension Program

Mike D'Ambrogia
APWG

eCRS Research In Progress:
A Crime Classification System to Improve eCrime Reporting, Metrics, and Response

Pat Cain
APWG

Cybercrime and the Internet Infrastructure

Identity Federation as Fraud Metadata Beat Cop

Joni Brennan
Kantara Initiative

An Integrated Approach to Analyzing Malware and Abusive Domains

Chris Davis
ICANN

APWG Global Response Roundtable
Data Sharing Agonistes: Challenges for Cybercrime Responders and Investigators Beyond Static Record Exchange

   Moderator:
   Wes Young
   REN-ISAC

Panel:
Tom Millar
US-CERT (Invited)

Dave Jevans
APWG

Rod Rasmussen
InternetIdentity