APWG Cybercrime Assessment
Threats Without Frontiers
Dave Jevans APWG
APWG Europe: Promise and Potential of Intercontinental Cybercrime Engagement
Jorge Aguila Vila CaixaBank
APWG eCrime Exchange: A Forensic Collaboration Nexus for Cybercrime Event Data Induction, Exchange and Processing
Mike D'Ambrogia APWG
Mobile Threats: Going Where the Money Is
Etay Maor RSA
Mobile Intrusion: From State Sponsorship to the Cybercrime Plexus
Jart Armin HostExploit
APWG Mobile Panel
Moderator: Jart Armin HostExploit
Panel: Etay MaorRSA
Kurt WescoeWombat Security Technologies
Dave JevansAPWG
APWG Cybercrime Data Discussion
Announcing the APWG Accredited Reporter Cybercrime Data Submission Program
URL Block List 2.0 - Expanding Data Sets for Precision Reporting and Deeper Data Mining
Pat Cain APWG
Data Exchange Policy- Avoiding the Zero-Sum Trap
Erin Kenneally eLCHEMY, Inc.
Botnet Mitigation Panel -
Moderator: Don Blumenthal PIR
Panel: Michael HausdingSWITCH Ben Butler - PresentationGoDaddy Pat Cain - PresentationAPWG
eCrime Research Programs Review and Announcements
Announcing the APWG eCrime Research Scientific Advisory Board Program
Panel:Saeed Abu-NimehAPWG eCrime Researchers Summit Co-Chair
Shawn Loveland Microsoft
The Technologies and Tools of eCrime Forensics
Shylock: an end-to-end cybercrime organization
Peter KruseCSIS
The ZueS Blitz Strategy
Brad WardmanPayPal
Linking Crimeware to the Criminals
Saeed Abu-NimehPayPal
Behavioral Aspects and Human Factors in Cybercrime Management
PhishAri: Automatic Realtime Phishing Detection on Twitter
Anupama AggarwalIndaraprastha Institute of Information Technology
Ashwin RajadesinganArizona State University
Ponnurangam KumaraguruIndraprastha Institute of Information Technology
Does Context Influence Responses to Firewall Warnings?
Muhammad MahmoudCarleton University
Sonia ChiassonCarleton University
Ashraf MatrawyCarleton University
Explaining Cybercrime through the Lens of Differential Association Theory
Rachel LevinThe College of New Jersey
Jonathan RichardsonNorthern Kentucky University
Gary Warner, Kent R KerleyUniversity of Alabama at Birmingham
The Technologies and Tools of Cybercrime Response and Management
Discovering Phishing Dropboxes Using Email Metadata
Tyler Moore Southern Methodist Univeristy
Richard ClaytonCambridge University
Investigative Response Modeling and Predictive Data Collection
Dan MoorHewlett Packard
S. Raj RajagopalanHewlett Packard
Sathya Chandran Sundaramurthy, Xinming OuKansas State University
Internet Policy Committee - Programs in Development Review
Moderator: Rod Rasmussen InternetIdentity
Internet Policy Commettee reveiw
The Global Phishing Report on Abuse of TLDs
Website Exploit Survey
Greg Aaron Afilias
Rod Rasmussen InternetIdentity
Dave Piscatello ICANN
APWG Global Response Roundtable The Challenge and Promise of Globalized Online Awareness Messaging
Moderator: Peter Cassidy APWG
Panel: Amy JarrettePublic Safety Canada
Aury M. Curbelo RuizUniversity of Puerto Rico
Kim SanchezMicrosoft
Brian SullivanOrganization of American States
How Do Consumers React to Cybercrime?
Rainer BoehmeUniversität Münster
Tyler MooreSouthern Methodist University
There Is A Scam for Everyone: Critical Trends in Internet Fraud Solicitations
Jon RuschUS Justice Department
Dual Canonicalization: An Answer to the Homograph Attack
James Helfrich Brigham Young University
APWG Malicious Domain Suspension Program
eCRS Research In Progress: A Crime Classification System to Improve eCrime Reporting, Metrics, and Response
Identity Federation as Fraud Metadata Beat Cop
Joni Brennan Kantara Initiative
An Integrated Approach to Analyzing Malware and Abusive Domains
Chris Davis ICANN
APWG Global Response Roundtable Data Sharing Agonistes: Challenges for Cybercrime Responders and Investigators Beyond Static Record Exchange
Moderator: Wes Young REN-ISAC
Panel: Tom MillarUS-CERT (Invited)
Rod RasmussenInternetIdentity