The latest brochure of the International Conference of Cyber Security Asia, Singapore (8 - 11 November, 2011).
The last page of registration is intentionally removed from the brochure. For that one, please download it from
http://www.cybersecurity-asia.com/
On 8 November, 2011 and 11 November, 2011 there are two full-day workshops (pre-conference and post-conference, respectively) organized by Cyber Security Forum Initiative (CSFI), US and Microsoft.
If someone is interested to attend the conference, then do not delay anymore as the dates are now too close. Just send an email to
LAURA GREEN:
lgreen AT smi-online DOT sg
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Cyber Security Asia, Singapore
1. GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR
SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR
• Introducing the leading forum for Cyber Security Professionals in Asia
Cyber Security ASIA
9th & 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore
CONFERENCE HIGHLIGHTS:
OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES:
C ase studies from
International Cyber
Wing Commander Tom Parkhouse, Iftekharul Bashar, Senior Analyst,
Commands
Cyber Security Strategy Staff Officer, International Centre for Political
Y our chance to assess how
Cyber Terrorism and
Ministry of Defence, UK Violence and Terrorism Research,
Singapore
Radicalisation through
social networking is being Major (Ret’d) Manik M Jolly, Commander Michael Rothery, First Assistant
used across Asia Pacific Secretary, National Security Resilience
Cyber Security Cell, Indian Army
Division, Australian Government
B e involved in our
interactive panel Dr Goh Shen Tat, Assistant Department
discussions and working Head, Cryptography and Security Research Bernie Trudel, Chairman,
groups and get your Group, Institute for Infocomm Research Asia Cloud Computing
opinion across to the (I2R), Agency for Science Technology and Association
people that matter Research (A*STAR), Singapore
E nter into sessions focusing
on National Capabilities Xundi Zhang, Founder, XFocus, China Sazali Sukardi, Head, Strategic Policy
and Protecting Critical Research, CyberSecurity Malaysia
National Infrastructure
R each out and network
with your industry peers Neelabh Rai, Independent Cyber Security Ammar Jaffri, Chief Executive, Pakistan
Information Security Association
and leave having forged Researcher, Cyber Cops, India
new working relationships (PISA)
and strengthened your
current ones!
PLUS ONE FULL DAY PRE-CONFERENCE WORKSHOP AND ONE FULL DAY POST-CONFERENCE WORKSHOP:
Cyber Games and the Operational Application to Preparing for the Next Cyber Attack…
A B
Cyber Security Friday 11th November
Tuesday 8th November
In Association with: In Association with:
Lead Sponsor: Sponsored by:
Conference
Knowledge
Partners:
www.cybersecurity-asia.com
Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +65 664 990 94 or +44 (0) 870 9090 712 or
call +65 664 990 95/96 or +44 (0) 870 9090 711
2. DAY ONE Wednesday 9th November 2011
8:30 Registration and Coffee 2:00 The Chinese Cyber Security Strategy
• Overview and insight into activities into Chinese Security Team
9:00 Chairman's Opening Remarks
• Cyber security, policies, standards and regulations in China
Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
Ministry of Defence, UK • Underground economy on the Chinese cyber programme
• The security landscape in China
9:10 GUEST OF HONOUR OPENING ADDRESS
Xundi Zhang, Founder, XFocus,
Building a Secure and Connected Future
• Investing in information security competencies/expertise China
• Qualified information security professionals for Singapore
• Everyone has a part to play
2:30 Best Practice Cyber Defence, Based on Network Intelligence and
• Conclusions
Senior Representative, Agency for Science, Technology and Research Communications Metadata
(A*STAR), Singapore • The challenges of government cyber defense
• Detecting cyber threats by scanning traffic
9:40 KEYNOTE ADDRESS
The Global Cyber Security Challenge • Using DPI & Network Intelligence to build a second line of cyber
Michael Wilks, Regional Director, Public Safety and National Security defense
APAC, Microsoft
• Examples of technical implementations
10:20 SCENARIO CYBER ATTACK • Using communication metadata to detect suspicious traffic
Cyber Attack – Is it an Act of War? Emmanuel Roger, Vice President Sales Asia Pacific & Japan,
This session will be run by Microsoft – a large multinational
Qosmos
company/government is being hit by a Cyber Attack what are the
options to respond to this attack? This is the opportunity for the
audience to engage with each other to discuss potential counter 3:00 Networking Coffee Break
measures to a cyber attack.
Michael Wilks, Regional Director, Public Safety and National Security
STRATEGIES AND PROGRAMMES
APAC, Microsoft
11:00 Networking Coffee Break 3:30 Analysing Open Source Cyber Intelligence
• The importance of open source intelligence
INTERNATIONAL CYBER COMMANDS AND NATIONAL CAPABILITIES
• Information sharing among professionals involved in corporate security,
11:30 SPECIAL ADDRESS information security, and the intelligence community
Military Cyber Commands – An Overview
• Utilisation of open source data to protect physical assets and individuals
Many nations have been surging their efforts to meet the national
security challenges, still largely unknown, of conflict in cyber space. This • Identify sensitive information that has been compromised, malware,
presentation will survey and compare these national efforts with a focus phishing, identity theft, and related subject matter
on military cyber commands: which nations have them, what missions
Paul de Souza, Owner, Cyber Security Forum Initiative (CSFI)
they are likely to engage in, and the implications for the rest of us.
Jason Healy, Executive Director, Cyber Conflict Studies Association
4:00 Cloud Computing in Asia – An Introduction
12:00 KEYNOTE ADDRESS
• Regional issues of regulation and policy
USCYBERCOM – An Insight
• Security infrastructure and awareness
• The US CYBERCOM - An overview
• Conducting full spectrum military cyberspace operations in order to • Collaboration and innovation
enable actions in all domains Bernie Trudel, Chairman, Asia Cloud Computing Association
• Ensuring US/Allied freedom of action in cyberspace
• Training at the centre
• Recent operations and lessons learned 4:30 Cloud Reality – Dispelling the Myths
Colonel Robert Morris, Director, 24 AF (AF CYBER) Air Component • The cold hard facts of cloud computing today
Coordination Element to US Cyber Command (USCYBERCOM)*
• Defining the private cloud vs public vs hybrid
12:30 Update on the UK’s National Cyber Security Programme • How secure is cloud?
• The UK’s National Cyber Crime Strategy Aloysius Cheang, APAC Strategy Advisor, Cloud Security Alliance
• The UK’s ability to detect and defend against cyber attacks from
terrorists, states, and other hostile actors
• Emerging threat of cyber-attacks against Britain’s infrastructure 5:00 Conclusions and Key Talking Points from Day One
• An insight into the UK Defence Cyber Operations Group Michael Wilks, Regional Director, Public Safety and National Security
• Interoperability and collaboration with industry to address weaknesses
APAC, Microsoft
in cyber security defence of critical infrastructure
• Cooperation in cyber security defence with the United States and other
“like-minded nations” 5:15 Chairman’s Closing Remarks and Close of Day One
Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
Ministry of Defence, UK
5:30 Networking Drinks Reception
1:00 Networking Lunch Sponsored by
Register online at www.cybersecurity-asia.com • Alternatively fax your registration
3. DAY TWO Thursday 10th November 2011
8:30 Registration and Coffee 12:50 Networking Lunch
9:00 Chairman's Opening Remarks
1:50 The Facebook Jihad - Radicalisation through Social Networking
Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
Ministry of Defence, UK • A social network for jihad?
• The newest face of terrorist and extremist use of the internet
9:10 KEYNOTE ADDRESS
• The potential for misuse
Australia’s Cyber Security Capabilities
• Coordinating operational responses to cyber events of national • Cyber radicalisation vs. Social networking
importance across government and critical infrastructure • The Power of Facebook
• An overview of operations in the CSOC – Cyber Security Operations
• Facing the new challenge
Centre
• Creating an integrated whole-of-government approach on cyber Iftekharul Bashar, Senior Analyst, International Centre for Political
security Violence and Terrorism Research, Singapore
• Information Security (InfoSec) role
Michael Rothery, First Assistant Secretary, National Security Resilience
Division, Australian Government 2:20 Social Engineering – Context and Update
• Meaning and implications in current scenario
CYBER TERRORISM
• Threat as a victim
9:50 PANEL DISCUSSION • Advantages as a user
What Constitutes Cyber Terrorism? Fact vs. Fiction • Corporate lessons to be learnt
Chairman:
• Successful cases with modus operandi explained in detail
Michael Wilks, Regional Director, Public Safety and National Security
APAC, Microsoft Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,
Panellists: Indian Army
Neelabh Rai, Independent Cyber Security Researcher,
Cyber Cops, India
Ammar Jaffri, Chief Executive, 2:50 Networking Coffee Break
Pakistan Information Security Association (PISA)
Sazali Sukardi, Head, Strategic Policy Research,
PROTECTING CRITICAL NATIONAL INFRASTRUCTURE
CyberSecurity Malaysia
Iftekharul Bashar, Senior Analyst, International Centre for Political
Violence and Terrorism Research, Singapore
3:10 Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare
Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,
• The first recognised cyber weapon
Indian Army
• Designed to target critical national infrastructure
10:50 Networking Coffee Break
• Operating through external Programmable Logic Controllers (PLCs)
• Operational case studies – Attacks against Iran, Russia and Kazakhstan
11:20 Cyber Cops at the Crossroads of Cyber Hypnotism and Cyber Warfare –
Indian Perspective • Identifying the perpetrators
• An overview of the Indian Cyber Cops
• A new era in which cyber warfare is no longer theoretical and action
• Cyber terrorism in India – Tackling the asymmetric threat
and discussion is vital to ensure the protection of critical infrastructure
• Comprehensive Online Proactive Security
• Liberty is the price of vigilance on a global scale
Neelabh Rai, Independent Cyber Security Researcher,
Speaker Details to be Announced
Cyber Cops, India
11:50 Cyber Warfare and Pakistan – An Operational Assessment 3:40 The Possible Risks and Protection needed for Smart Grid Communication
• The cyber security programme in Pakistan
• Advance Smart Security Research and Development
• The internet as a tool for radicalisation
• Gaining access to grid-controlling networks
• Organisational set up to counter the threat
• The Facebook explosion in Pakistan – Terrorist threats and implications • Intelligence required: HUMINT (human intelligence), IMINT (imagery
• Understanding the challenges and overcoming them
intelligence), SIGINT (signals intelligence) and MASINT (measurement
• Lessons learned and aims for the future
and signature intelligence)
Ammar Jaffri, Chief Executive, Pakistan Information Security Association
(PISA) • Countering the threat - A strong intelligence presence inside our critical
infrastructure systems
12:20 The Cyber Defence Cell in Malaysia
Dr Goh Shen Tat, Assistant Department Head, Cryptography and Security
• The current cyber security threat in Malaysia
• Terrorism vs. Cyber terrorism Research Group, Institute for Infocomm Research (I2R), Agency for Science
• Malaysia’s critical national information infrastructure
Technology and Research (A*STAR), Singapore
• The use of ICT and cyberspace by terrorist
Sazali Sukardi, Head, Strategic Policy & Research Department,
CyberSecurity Malaysia 4:10 Chairman's Closing Remarks and Close of Conference
*subject to final confirmation
n to +65 664 990 94 or call +65 664 990 95/96 • GROUP DISCOUNTS AVAILABLE •
4. PRE-CONFERENCE WORKSHOP A 8TH NOVEMBER 2011
In association with:
In association with:
Cyber Games and the Operational Application
to Cyber Security
Benefits of Attending:
This hands-on interactive workshop is designed to help
the audience members understand the value of cyber
games and how to develop a customized cyber games About your workshop leaders:
program in their organizations. The workshop will give
the attendees the ability to follow a cyber games Colonel (Ret’d) Marc Jamison graduated from
framework, which can greatly improve the cyber Texas A&M and was commissioned into the USAF.
security posture of any organization or cyber command. He is a combat aviator, having flown the B-52 and
B-1 bombers. Col Jamison is a USAF weapon school
graduate and has led multiple divisions in Air
Programme
Operations Centers. He holds 4 Master degrees to
08.30 Registration and Coffee
include one from the School of Advanced Air and
09.00 History of war games
Space Studies and the US Army War College.
09.30 Definitions and differences between an Recently, he was the Director of Operations for
exercise, training, war game, etc. Joint Functional Component Command Network
10.00 History of cyber games Warfare, Director of Future Operations and Chief
10.30 Morning Coffee of Modeling and Simulation for US CYBER
11.00 Definitions and differences between cyber Command.
games, cyber exercises, etc.
Paul de Souza is the Founder/President/Director of
12.00 Current cyber games platforms and the
applicability to organizations CSFI (Cyber Security Forum Initiative) and its
divisions CSFI-CWD (Cyber Warfare Division) and
13.00 Networking Lunch
CSFI-LPD (Law and Policy Division). CSFI is a non-
14.00 Creating a cyber game culture (boosting profit organization with headquarters in Omaha,
hands-on skills of your IT security team)
NE and offices in the DC area. Paul has over 12
15.00 Cyber games operations and framework years of cyber security experience and has worked
(hands-on group exercise) as a Chief Security Engineer for AT&T where he
15.30 Afternoon Tea designed and approved secure networks for MSS.
16.00 US Department of Defense and NATO cyber Paul has also consulted for several governments,
games initiatives military and private institutions on best network
16.30 Q & A sessions security practices and cyber warfare capabilities,
17.00 Close of Workshop leading a group of more than 9000 cyber security
professionals.
POST-CONFERENCE WORKSHOP B 11TH NOVEMBER 2011
In association with:
Preparing for the Next Cyber Attack…
Why Attend this Workshop?
• Learn about how to protect critical information 8:30 Registration and Coffee
systems and network infrastructure from cyber attacks 9:00 Session 1
and fully understand which can be launched against 10:30 Networking Coffee Break
the industrial control systems used to protect critical 11:00 Session 2
infrastructure 12:30 Networking Lunch Break
• See how cyber attacks are launched against critical 1:30 Session 3
information systems and network infrastructure 3:00 Networking Coffee Break
• Understand how to apply technical and administrative 3:30 Session 4
controls to mitigate critical systems and networks 5:00 Q&A
from future attacks 5:30 Close of Workshop
Workshop Key Objectives:
• Analyse the key aspects of the cyber security as it
relates to protection, detection, respond and recovery Benefits of Attending:
• Discuss how cyber attackers exploit current system • Recognise how information systems can be subjected to
vulnerabilities cyber attacks and the impact of these attacks on
• Review what Microsoft and other vendors have done government services, economy and social aspects of society
to identify and attempt to prevent cyber attacks on • Enhance your knowledge of potential security controls or
systems countermeasures that can be implemented to mitigate the
• Evaluate various administrative and technical security risk of a potential cyber attack
controls that can be used to mitigate future cyber
• Be aware of the actions that can be performed once a
attacks
system is compromised
Register online at www.cybersecurity-asia.com
5. Microsoft provides software and services that help people communicate, do their work, be
entertained, and manage their personal lives. Over the past 30 years, innovative technology has
Lead Sponsor: transformed how we access and share information, changed the way businesses and institutions
operate, and made the whole smaller by giving us instant access to people and resources
everywhere. Microsoft works closely with public and private sector partners throughout Asia
Pacific to help enterprise customers, governments, educational institutions and nongovernmental
bodies meet business, social and economic challenges and realize the potential of their
organizations and their people. Our commitment to the region is reflected by the thousands of
developers, resellers, independent software vendors, and small and medium-sized enterprises
whose goals for growth and greater business efficiency has been made possible by Microsoft
technology. www.microsoft.com
The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha,
Conference Knowledge
NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and
Partners:
security solutions through collaboration, education, volunteer work, and training to assist the US
Government, US Military, Commercial Interests, and International Partners." CSFI was born out of
the collaboration of dozens of experts, and today CSFI is comprised of a large community of nearly
5000 Cyber Security and Cyber Warfare professionals from the government, military, private sector,
and academia. Our amazing members are the core of all of our activities, and it is for them that
we are pushing forward our mission. www.csfi.us
The Agency for Science, Technology and Research (A*STAR) is the lead agency for fostering world-
class scientific research and talent for a vibrant knowledge-based and innovation-driven
Singapore. A*STAR supports Singapore's key economic clusters by providing intellectual, human
and industrial capital to its partners in industry. It also supports extramural research in the
universities, hospitals, research centres, and with other local and international partners.
www.a-star.edu.sg
Conference and Exhibition Supported By: