SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR
         SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR




•                 Introducing the leading forum for Cyber Security Professionals in Asia

                               Cyber Security ASIA
                 9th & 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore


    CONFERENCE HIGHLIGHTS:
                                      OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES:
    C ase studies from
      International Cyber
                                             Wing Commander Tom Parkhouse,                            Iftekharul Bashar, Senior Analyst,
        Commands
                                             Cyber Security Strategy Staff Officer,                   International Centre for Political
    Y   our chance to assess how
        Cyber Terrorism and
                                             Ministry of Defence, UK                                  Violence and Terrorism Research,
                                                                                                      Singapore
        Radicalisation through
        social networking is being           Major (Ret’d) Manik M Jolly, Commander                   Michael Rothery, First Assistant
        used across Asia Pacific                                                                      Secretary, National Security Resilience
                                             Cyber Security Cell, Indian Army
                                                                                                      Division, Australian Government
    B   e involved in our
        interactive panel                    Dr Goh Shen Tat, Assistant Department
        discussions and working              Head, Cryptography and Security Research                       Bernie Trudel, Chairman,
        groups and get your                  Group, Institute for Infocomm Research                         Asia Cloud Computing
        opinion across to the                (I2R), Agency for Science Technology and                       Association
        people that matter                   Research (A*STAR), Singapore
    E   nter into sessions focusing
        on National Capabilities             Xundi Zhang, Founder, XFocus, China                      Sazali Sukardi, Head, Strategic Policy
        and Protecting Critical                                                                       Research, CyberSecurity Malaysia
        National Infrastructure

    R   each out and network
        with your industry peers             Neelabh Rai, Independent Cyber Security                  Ammar Jaffri, Chief Executive, Pakistan
                                                                                                      Information Security Association
        and leave having forged              Researcher, Cyber Cops, India
        new working relationships                                                                     (PISA)
        and strengthened your
        current ones!




              PLUS ONE FULL DAY PRE-CONFERENCE WORKSHOP AND ONE FULL DAY POST-CONFERENCE WORKSHOP:

        Cyber Games and the Operational Application to                         Preparing for the Next Cyber Attack…
    A                                                                   B
        Cyber Security                                                         Friday 11th November
        Tuesday 8th November


        In Association with:                                                   In Association with:



           Lead Sponsor:                         Sponsored by:

                                                                                      Conference
                                                                                      Knowledge
                                                                                      Partners:




                       www.cybersecurity-asia.com
                   Register online and receive full information on all of SMi’s conferences
               Alternatively fax your registration to +65 664 990 94 or +44 (0) 870 9090 712 or
                                call +65 664 990 95/96 or +44 (0) 870 9090 711
DAY ONE                Wednesday 9th November 2011

8:30    Registration and Coffee                                                        2:00   The Chinese Cyber Security Strategy

                                                                                              • Overview and insight into activities into Chinese Security Team
9:00    Chairman's Opening Remarks
                                                                                              • Cyber security, policies, standards and regulations in China
        Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
        Ministry of Defence, UK                                                               • Underground economy on the Chinese cyber programme

                                                                                              • The security landscape in China
9:10    GUEST OF HONOUR OPENING ADDRESS
                                                                                              Xundi Zhang, Founder, XFocus,
        Building a Secure and Connected Future
        • Investing in information security competencies/expertise                            China
        • Qualified information security professionals for Singapore
        • Everyone has a part to play
                                                                                       2:30   Best Practice Cyber Defence, Based on Network Intelligence and
        • Conclusions
        Senior Representative, Agency for Science, Technology and Research                    Communications Metadata
        (A*STAR), Singapore                                                                   • The challenges of government cyber defense

                                                                                              • Detecting cyber threats by scanning traffic
9:40    KEYNOTE ADDRESS
        The Global Cyber Security Challenge                                                   • Using DPI & Network Intelligence to build a second line of cyber
        Michael Wilks, Regional Director, Public Safety and National Security                   defense
        APAC, Microsoft
                                                                                              • Examples of technical implementations

10:20   SCENARIO CYBER ATTACK                                                                 • Using communication metadata to detect suspicious traffic
        Cyber Attack – Is it an Act of War?                                                   Emmanuel Roger, Vice President Sales Asia Pacific & Japan,
        This session will be run by Microsoft – a large multinational
                                                                                              Qosmos
        company/government is being hit by a Cyber Attack what are the
        options to respond to this attack? This is the opportunity for the
        audience to engage with each other to discuss potential counter                3:00   Networking Coffee Break
        measures to a cyber attack.
        Michael Wilks, Regional Director, Public Safety and National Security
                                                                                                                STRATEGIES AND PROGRAMMES
        APAC, Microsoft


11:00   Networking Coffee Break                                                        3:30   Analysing Open Source Cyber Intelligence

                                                                                              • The importance of open source intelligence
        INTERNATIONAL CYBER COMMANDS AND NATIONAL CAPABILITIES
                                                                                              • Information sharing among professionals involved in corporate security,
11:30   SPECIAL ADDRESS                                                                         information security, and the intelligence community
        Military Cyber Commands – An Overview
                                                                                              • Utilisation of open source data to protect physical assets and individuals
        Many nations have been surging their efforts to meet the national
        security challenges, still largely unknown, of conflict in cyber space. This          • Identify sensitive information that has been compromised, malware,
        presentation will survey and compare these national efforts with a focus                phishing, identity theft, and related subject matter
        on military cyber commands: which nations have them, what missions
                                                                                              Paul de Souza, Owner, Cyber Security Forum Initiative (CSFI)
        they are likely to engage in, and the implications for the rest of us.
        Jason Healy, Executive Director, Cyber Conflict Studies Association
                                                                                       4:00   Cloud Computing in Asia – An Introduction
12:00   KEYNOTE ADDRESS
                                                                                              • Regional issues of regulation and policy
        USCYBERCOM – An Insight
                                                                                              • Security infrastructure and awareness
        • The US CYBERCOM - An overview
        • Conducting full spectrum military cyberspace operations in order to                 • Collaboration and innovation
          enable actions in all domains                                                       Bernie Trudel, Chairman, Asia Cloud Computing Association
        • Ensuring US/Allied freedom of action in cyberspace
        • Training at the centre
        • Recent operations and lessons learned                                        4:30   Cloud Reality – Dispelling the Myths
        Colonel Robert Morris, Director, 24 AF (AF CYBER) Air Component                       • The cold hard facts of cloud computing today
        Coordination Element to US Cyber Command (USCYBERCOM)*
                                                                                              • Defining the private cloud vs public vs hybrid

12:30   Update on the UK’s National Cyber Security Programme                                  • How secure is cloud?
        • The UK’s National Cyber Crime Strategy                                              Aloysius Cheang, APAC Strategy Advisor, Cloud Security Alliance
        • The UK’s ability to detect and defend against cyber attacks from
          terrorists, states, and other hostile actors
        • Emerging threat of cyber-attacks against Britain’s infrastructure            5:00   Conclusions and Key Talking Points from Day One
        • An insight into the UK Defence Cyber Operations Group                               Michael Wilks, Regional Director, Public Safety and National Security
        • Interoperability and collaboration with industry to address weaknesses
                                                                                              APAC, Microsoft
          in cyber security defence of critical infrastructure
        • Cooperation in cyber security defence with the United States and other
          “like-minded nations”                                                        5:15   Chairman’s Closing Remarks and Close of Day One
        Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
        Ministry of Defence, UK
                                                                                       5:30           Networking Drinks Reception

1:00    Networking Lunch                                                                              Sponsored by




   Register online at www.cybersecurity-asia.com • Alternatively fax your registration
DAY TWO                Thursday 10th November 2011

   8:30    Registration and Coffee                                                     12:50   Networking Lunch


   9:00    Chairman's Opening Remarks
                                                                                       1:50    The Facebook Jihad - Radicalisation through Social Networking
           Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
           Ministry of Defence, UK                                                             • A social network for jihad?

                                                                                               • The newest face of terrorist and extremist use of the internet
   9:10    KEYNOTE ADDRESS
                                                                                               • The potential for misuse
           Australia’s Cyber Security Capabilities
           • Coordinating operational responses to cyber events of national                    • Cyber radicalisation vs. Social networking
             importance across government and critical infrastructure                          • The Power of Facebook
           • An overview of operations in the CSOC – Cyber Security Operations
                                                                                               • Facing the new challenge
             Centre
           • Creating an integrated whole-of-government approach on cyber                      Iftekharul Bashar, Senior Analyst, International Centre for Political
             security                                                                          Violence and Terrorism Research, Singapore
           • Information Security (InfoSec) role
           Michael Rothery, First Assistant Secretary, National Security Resilience
           Division, Australian Government                                             2:20    Social Engineering – Context and Update

                                                                                               • Meaning and implications in current scenario
                                    CYBER TERRORISM
                                                                                               • Threat as a victim

   9:50    PANEL DISCUSSION                                                                    • Advantages as a user
           What Constitutes Cyber Terrorism? Fact vs. Fiction                                  • Corporate lessons to be learnt
           Chairman:
                                                                                               • Successful cases with modus operandi explained in detail
           Michael Wilks, Regional Director, Public Safety and National Security
           APAC, Microsoft                                                                     Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,
           Panellists:                                                                         Indian Army
           Neelabh Rai, Independent Cyber Security Researcher,
           Cyber Cops, India
           Ammar Jaffri, Chief Executive,                                              2:50    Networking Coffee Break
           Pakistan Information Security Association (PISA)
           Sazali Sukardi, Head, Strategic Policy Research,
                                                                                                       PROTECTING CRITICAL NATIONAL INFRASTRUCTURE
           CyberSecurity Malaysia
           Iftekharul Bashar, Senior Analyst, International Centre for Political
           Violence and Terrorism Research, Singapore
                                                                                       3:10    Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare
           Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,
                                                                                               • The first recognised cyber weapon
           Indian Army
                                                                                               • Designed to target critical national infrastructure
   10:50   Networking Coffee Break
                                                                                               • Operating through external Programmable Logic Controllers (PLCs)

                                                                                               • Operational case studies – Attacks against Iran, Russia and Kazakhstan
   11:20   Cyber Cops at the Crossroads of Cyber Hypnotism and Cyber Warfare –
           Indian Perspective                                                                  • Identifying the perpetrators
           • An overview of the Indian Cyber Cops
                                                                                               • A new era in which cyber warfare is no longer theoretical and action
           • Cyber terrorism in India – Tackling the asymmetric threat
                                                                                                 and discussion is vital to ensure the protection of critical infrastructure
           • Comprehensive Online Proactive Security
           • Liberty is the price of vigilance                                                   on a global scale
           Neelabh Rai, Independent Cyber Security Researcher,
                                                                                               Speaker Details to be Announced
           Cyber Cops, India


   11:50   Cyber Warfare and Pakistan – An Operational Assessment                      3:40    The Possible Risks and Protection needed for Smart Grid Communication
           • The cyber security programme in Pakistan
                                                                                               • Advance Smart Security Research and Development
           • The internet as a tool for radicalisation
                                                                                               • Gaining access to grid-controlling networks
           • Organisational set up to counter the threat
           • The Facebook explosion in Pakistan – Terrorist threats and implications           • Intelligence required: HUMINT (human intelligence), IMINT (imagery
           • Understanding the challenges and overcoming them
                                                                                                 intelligence), SIGINT (signals intelligence) and MASINT (measurement
           • Lessons learned and aims for the future
                                                                                                 and signature intelligence)
           Ammar Jaffri, Chief Executive, Pakistan Information Security Association
           (PISA)                                                                              • Countering the threat - A strong intelligence presence inside our critical

                                                                                                 infrastructure systems
   12:20   The Cyber Defence Cell in Malaysia
                                                                                               Dr Goh Shen Tat, Assistant Department Head, Cryptography and Security
           • The current cyber security threat in Malaysia
           • Terrorism vs. Cyber terrorism                                                     Research Group, Institute for Infocomm Research (I2R), Agency for Science
           • Malaysia’s critical national information infrastructure
                                                                                               Technology and Research (A*STAR), Singapore
           • The use of ICT and cyberspace by terrorist
           Sazali Sukardi, Head, Strategic Policy & Research Department,
           CyberSecurity Malaysia                                                      4:10    Chairman's Closing Remarks and Close of Conference

                                                                                               *subject to final confirmation




n to +65 664 990 94 or call +65 664 990 95/96 • GROUP DISCOUNTS AVAILABLE •
PRE-CONFERENCE WORKSHOP A                        8TH NOVEMBER 2011
                                                                                                    In association with:
                                                                                                     In association with:
Cyber Games and the Operational Application
to Cyber Security
  Benefits of Attending:
  This hands-on interactive workshop is designed to help
  the audience members understand the value of cyber
  games and how to develop a customized cyber games            About your workshop leaders:
  program in their organizations. The workshop will give
  the attendees the ability to follow a cyber games                        Colonel (Ret’d) Marc Jamison graduated from
  framework, which can greatly improve the cyber                           Texas A&M and was commissioned into the USAF.
  security posture of any organization or cyber command.                   He is a combat aviator, having flown the B-52 and
                                                                           B-1 bombers. Col Jamison is a USAF weapon school
                                                                           graduate and has led multiple divisions in Air
  Programme
                                                                           Operations Centers. He holds 4 Master degrees to
  08.30  Registration and Coffee
                                                                           include one from the School of Advanced Air and
  09.00  History of war games
                                                                           Space Studies and the US Army War College.
  09.30  Definitions and differences between an                            Recently, he was the Director of Operations for
         exercise, training, war game, etc.                                Joint Functional Component Command Network
  10.00  History of cyber games                                            Warfare, Director of Future Operations and Chief
  10.30  Morning Coffee                                                    of Modeling and Simulation for US CYBER
  11.00  Definitions and differences between cyber                         Command.
         games, cyber exercises, etc.
                                                                           Paul de Souza is the Founder/President/Director of
  12.00  Current cyber games platforms and the
         applicability to organizations                                    CSFI (Cyber Security Forum Initiative) and its
                                                                           divisions CSFI-CWD (Cyber Warfare Division) and
  13.00  Networking Lunch
                                                                           CSFI-LPD (Law and Policy Division). CSFI is a non-
  14.00  Creating a cyber game culture (boosting                           profit organization with headquarters in Omaha,
         hands-on skills of your IT security team)
                                                                           NE and offices in the DC area. Paul has over 12
  15.00  Cyber games operations and framework                              years of cyber security experience and has worked
         (hands-on group exercise)                                         as a Chief Security Engineer for AT&T where he
  15.30  Afternoon Tea                                                     designed and approved secure networks for MSS.
  16.00  US Department of Defense and NATO cyber                           Paul has also consulted for several governments,
         games initiatives                                                 military and private institutions on best network
  16.30  Q & A sessions                                                    security practices and cyber warfare capabilities,
  17.00  Close of Workshop                                                 leading a group of more than 9000 cyber security
                                                                           professionals.




POST-CONFERENCE WORKSHOP B                         11TH NOVEMBER 2011


                                                                                               In association with:

Preparing for the Next Cyber Attack…

Why Attend this Workshop?
• Learn about how to protect critical information                 8:30    Registration and Coffee
  systems and network infrastructure from cyber attacks           9:00    Session 1
  and fully understand which can be launched against              10:30   Networking Coffee Break
  the industrial control systems used to protect critical         11:00   Session 2
  infrastructure                                                  12:30   Networking Lunch Break
• See how cyber attacks are launched against critical             1:30    Session 3
  information systems and network infrastructure                  3:00    Networking Coffee Break
• Understand how to apply technical and administrative            3:30    Session 4
  controls to mitigate critical systems and networks              5:00    Q&A
  from future attacks                                             5:30    Close of Workshop
Workshop Key Objectives:
• Analyse the key aspects of the cyber security as it
  relates to protection, detection, respond and recovery       Benefits of Attending:
• Discuss how cyber attackers exploit current system           • Recognise how information systems can be subjected to
  vulnerabilities                                                cyber attacks and the impact of these attacks on
• Review what Microsoft and other vendors have done              government services, economy and social aspects of society
  to identify and attempt to prevent cyber attacks on          • Enhance your knowledge of potential security controls or
  systems                                                        countermeasures that can be implemented to mitigate the
• Evaluate various administrative and technical security         risk of a potential cyber attack
  controls that can be used to mitigate future cyber
                                                               • Be aware of the actions that can be performed once a
  attacks
                                                                 system is compromised




                           Register online at www.cybersecurity-asia.com
Microsoft provides software and services that help people communicate, do their work, be
                       entertained, and manage their personal lives. Over the past 30 years, innovative technology has
  Lead Sponsor:        transformed how we access and share information, changed the way businesses and institutions
                       operate, and made the whole smaller by giving us instant access to people and resources
                       everywhere. Microsoft works closely with public and private sector partners throughout Asia
                       Pacific to help enterprise customers, governments, educational institutions and nongovernmental
                       bodies meet business, social and economic challenges and realize the potential of their
                       organizations and their people. Our commitment to the region is reflected by the thousands of
                       developers, resellers, independent software vendors, and small and medium-sized enterprises
                       whose goals for growth and greater business efficiency has been made possible by Microsoft
                       technology. www.microsoft.com




                       The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha,
Conference Knowledge
                       NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and
      Partners:
                       security solutions through collaboration, education, volunteer work, and training to assist the US
                       Government, US Military, Commercial Interests, and International Partners." CSFI was born out of
                       the collaboration of dozens of experts, and today CSFI is comprised of a large community of nearly
                       5000 Cyber Security and Cyber Warfare professionals from the government, military, private sector,
                       and academia. Our amazing members are the core of all of our activities, and it is for them that
                       we are pushing forward our mission. www.csfi.us

                       The Agency for Science, Technology and Research (A*STAR) is the lead agency for fostering world-
                       class scientific research and talent for a vibrant knowledge-based and innovation-driven
                       Singapore. A*STAR supports Singapore's key economic clusters by providing intellectual, human
                       and industrial capital to its partners in industry. It also supports extramural research in the
                       universities, hospitals, research centres, and with other local and international partners.
                       www.a-star.edu.sg




                             Conference and Exhibition Supported By:

Mais conteúdo relacionado

Destaque

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destaque (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Cyber Security Asia, Singapore

  • 1. GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR • Introducing the leading forum for Cyber Security Professionals in Asia Cyber Security ASIA 9th & 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore CONFERENCE HIGHLIGHTS: OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES: C ase studies from International Cyber Wing Commander Tom Parkhouse, Iftekharul Bashar, Senior Analyst, Commands Cyber Security Strategy Staff Officer, International Centre for Political Y our chance to assess how Cyber Terrorism and Ministry of Defence, UK Violence and Terrorism Research, Singapore Radicalisation through social networking is being Major (Ret’d) Manik M Jolly, Commander Michael Rothery, First Assistant used across Asia Pacific Secretary, National Security Resilience Cyber Security Cell, Indian Army Division, Australian Government B e involved in our interactive panel Dr Goh Shen Tat, Assistant Department discussions and working Head, Cryptography and Security Research Bernie Trudel, Chairman, groups and get your Group, Institute for Infocomm Research Asia Cloud Computing opinion across to the (I2R), Agency for Science Technology and Association people that matter Research (A*STAR), Singapore E nter into sessions focusing on National Capabilities Xundi Zhang, Founder, XFocus, China Sazali Sukardi, Head, Strategic Policy and Protecting Critical Research, CyberSecurity Malaysia National Infrastructure R each out and network with your industry peers Neelabh Rai, Independent Cyber Security Ammar Jaffri, Chief Executive, Pakistan Information Security Association and leave having forged Researcher, Cyber Cops, India new working relationships (PISA) and strengthened your current ones! PLUS ONE FULL DAY PRE-CONFERENCE WORKSHOP AND ONE FULL DAY POST-CONFERENCE WORKSHOP: Cyber Games and the Operational Application to Preparing for the Next Cyber Attack… A B Cyber Security Friday 11th November Tuesday 8th November In Association with: In Association with: Lead Sponsor: Sponsored by: Conference Knowledge Partners: www.cybersecurity-asia.com Register online and receive full information on all of SMi’s conferences Alternatively fax your registration to +65 664 990 94 or +44 (0) 870 9090 712 or call +65 664 990 95/96 or +44 (0) 870 9090 711
  • 2. DAY ONE Wednesday 9th November 2011 8:30 Registration and Coffee 2:00 The Chinese Cyber Security Strategy • Overview and insight into activities into Chinese Security Team 9:00 Chairman's Opening Remarks • Cyber security, policies, standards and regulations in China Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer, Ministry of Defence, UK • Underground economy on the Chinese cyber programme • The security landscape in China 9:10 GUEST OF HONOUR OPENING ADDRESS Xundi Zhang, Founder, XFocus, Building a Secure and Connected Future • Investing in information security competencies/expertise China • Qualified information security professionals for Singapore • Everyone has a part to play 2:30 Best Practice Cyber Defence, Based on Network Intelligence and • Conclusions Senior Representative, Agency for Science, Technology and Research Communications Metadata (A*STAR), Singapore • The challenges of government cyber defense • Detecting cyber threats by scanning traffic 9:40 KEYNOTE ADDRESS The Global Cyber Security Challenge • Using DPI & Network Intelligence to build a second line of cyber Michael Wilks, Regional Director, Public Safety and National Security defense APAC, Microsoft • Examples of technical implementations 10:20 SCENARIO CYBER ATTACK • Using communication metadata to detect suspicious traffic Cyber Attack – Is it an Act of War? Emmanuel Roger, Vice President Sales Asia Pacific & Japan, This session will be run by Microsoft – a large multinational Qosmos company/government is being hit by a Cyber Attack what are the options to respond to this attack? This is the opportunity for the audience to engage with each other to discuss potential counter 3:00 Networking Coffee Break measures to a cyber attack. Michael Wilks, Regional Director, Public Safety and National Security STRATEGIES AND PROGRAMMES APAC, Microsoft 11:00 Networking Coffee Break 3:30 Analysing Open Source Cyber Intelligence • The importance of open source intelligence INTERNATIONAL CYBER COMMANDS AND NATIONAL CAPABILITIES • Information sharing among professionals involved in corporate security, 11:30 SPECIAL ADDRESS information security, and the intelligence community Military Cyber Commands – An Overview • Utilisation of open source data to protect physical assets and individuals Many nations have been surging their efforts to meet the national security challenges, still largely unknown, of conflict in cyber space. This • Identify sensitive information that has been compromised, malware, presentation will survey and compare these national efforts with a focus phishing, identity theft, and related subject matter on military cyber commands: which nations have them, what missions Paul de Souza, Owner, Cyber Security Forum Initiative (CSFI) they are likely to engage in, and the implications for the rest of us. Jason Healy, Executive Director, Cyber Conflict Studies Association 4:00 Cloud Computing in Asia – An Introduction 12:00 KEYNOTE ADDRESS • Regional issues of regulation and policy USCYBERCOM – An Insight • Security infrastructure and awareness • The US CYBERCOM - An overview • Conducting full spectrum military cyberspace operations in order to • Collaboration and innovation enable actions in all domains Bernie Trudel, Chairman, Asia Cloud Computing Association • Ensuring US/Allied freedom of action in cyberspace • Training at the centre • Recent operations and lessons learned 4:30 Cloud Reality – Dispelling the Myths Colonel Robert Morris, Director, 24 AF (AF CYBER) Air Component • The cold hard facts of cloud computing today Coordination Element to US Cyber Command (USCYBERCOM)* • Defining the private cloud vs public vs hybrid 12:30 Update on the UK’s National Cyber Security Programme • How secure is cloud? • The UK’s National Cyber Crime Strategy Aloysius Cheang, APAC Strategy Advisor, Cloud Security Alliance • The UK’s ability to detect and defend against cyber attacks from terrorists, states, and other hostile actors • Emerging threat of cyber-attacks against Britain’s infrastructure 5:00 Conclusions and Key Talking Points from Day One • An insight into the UK Defence Cyber Operations Group Michael Wilks, Regional Director, Public Safety and National Security • Interoperability and collaboration with industry to address weaknesses APAC, Microsoft in cyber security defence of critical infrastructure • Cooperation in cyber security defence with the United States and other “like-minded nations” 5:15 Chairman’s Closing Remarks and Close of Day One Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer, Ministry of Defence, UK 5:30 Networking Drinks Reception 1:00 Networking Lunch Sponsored by Register online at www.cybersecurity-asia.com • Alternatively fax your registration
  • 3. DAY TWO Thursday 10th November 2011 8:30 Registration and Coffee 12:50 Networking Lunch 9:00 Chairman's Opening Remarks 1:50 The Facebook Jihad - Radicalisation through Social Networking Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer, Ministry of Defence, UK • A social network for jihad? • The newest face of terrorist and extremist use of the internet 9:10 KEYNOTE ADDRESS • The potential for misuse Australia’s Cyber Security Capabilities • Coordinating operational responses to cyber events of national • Cyber radicalisation vs. Social networking importance across government and critical infrastructure • The Power of Facebook • An overview of operations in the CSOC – Cyber Security Operations • Facing the new challenge Centre • Creating an integrated whole-of-government approach on cyber Iftekharul Bashar, Senior Analyst, International Centre for Political security Violence and Terrorism Research, Singapore • Information Security (InfoSec) role Michael Rothery, First Assistant Secretary, National Security Resilience Division, Australian Government 2:20 Social Engineering – Context and Update • Meaning and implications in current scenario CYBER TERRORISM • Threat as a victim 9:50 PANEL DISCUSSION • Advantages as a user What Constitutes Cyber Terrorism? Fact vs. Fiction • Corporate lessons to be learnt Chairman: • Successful cases with modus operandi explained in detail Michael Wilks, Regional Director, Public Safety and National Security APAC, Microsoft Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell, Panellists: Indian Army Neelabh Rai, Independent Cyber Security Researcher, Cyber Cops, India Ammar Jaffri, Chief Executive, 2:50 Networking Coffee Break Pakistan Information Security Association (PISA) Sazali Sukardi, Head, Strategic Policy Research, PROTECTING CRITICAL NATIONAL INFRASTRUCTURE CyberSecurity Malaysia Iftekharul Bashar, Senior Analyst, International Centre for Political Violence and Terrorism Research, Singapore 3:10 Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell, • The first recognised cyber weapon Indian Army • Designed to target critical national infrastructure 10:50 Networking Coffee Break • Operating through external Programmable Logic Controllers (PLCs) • Operational case studies – Attacks against Iran, Russia and Kazakhstan 11:20 Cyber Cops at the Crossroads of Cyber Hypnotism and Cyber Warfare – Indian Perspective • Identifying the perpetrators • An overview of the Indian Cyber Cops • A new era in which cyber warfare is no longer theoretical and action • Cyber terrorism in India – Tackling the asymmetric threat and discussion is vital to ensure the protection of critical infrastructure • Comprehensive Online Proactive Security • Liberty is the price of vigilance on a global scale Neelabh Rai, Independent Cyber Security Researcher, Speaker Details to be Announced Cyber Cops, India 11:50 Cyber Warfare and Pakistan – An Operational Assessment 3:40 The Possible Risks and Protection needed for Smart Grid Communication • The cyber security programme in Pakistan • Advance Smart Security Research and Development • The internet as a tool for radicalisation • Gaining access to grid-controlling networks • Organisational set up to counter the threat • The Facebook explosion in Pakistan – Terrorist threats and implications • Intelligence required: HUMINT (human intelligence), IMINT (imagery • Understanding the challenges and overcoming them intelligence), SIGINT (signals intelligence) and MASINT (measurement • Lessons learned and aims for the future and signature intelligence) Ammar Jaffri, Chief Executive, Pakistan Information Security Association (PISA) • Countering the threat - A strong intelligence presence inside our critical infrastructure systems 12:20 The Cyber Defence Cell in Malaysia Dr Goh Shen Tat, Assistant Department Head, Cryptography and Security • The current cyber security threat in Malaysia • Terrorism vs. Cyber terrorism Research Group, Institute for Infocomm Research (I2R), Agency for Science • Malaysia’s critical national information infrastructure Technology and Research (A*STAR), Singapore • The use of ICT and cyberspace by terrorist Sazali Sukardi, Head, Strategic Policy & Research Department, CyberSecurity Malaysia 4:10 Chairman's Closing Remarks and Close of Conference *subject to final confirmation n to +65 664 990 94 or call +65 664 990 95/96 • GROUP DISCOUNTS AVAILABLE •
  • 4. PRE-CONFERENCE WORKSHOP A 8TH NOVEMBER 2011 In association with: In association with: Cyber Games and the Operational Application to Cyber Security Benefits of Attending: This hands-on interactive workshop is designed to help the audience members understand the value of cyber games and how to develop a customized cyber games About your workshop leaders: program in their organizations. The workshop will give the attendees the ability to follow a cyber games Colonel (Ret’d) Marc Jamison graduated from framework, which can greatly improve the cyber Texas A&M and was commissioned into the USAF. security posture of any organization or cyber command. He is a combat aviator, having flown the B-52 and B-1 bombers. Col Jamison is a USAF weapon school graduate and has led multiple divisions in Air Programme Operations Centers. He holds 4 Master degrees to 08.30 Registration and Coffee include one from the School of Advanced Air and 09.00 History of war games Space Studies and the US Army War College. 09.30 Definitions and differences between an Recently, he was the Director of Operations for exercise, training, war game, etc. Joint Functional Component Command Network 10.00 History of cyber games Warfare, Director of Future Operations and Chief 10.30 Morning Coffee of Modeling and Simulation for US CYBER 11.00 Definitions and differences between cyber Command. games, cyber exercises, etc. Paul de Souza is the Founder/President/Director of 12.00 Current cyber games platforms and the applicability to organizations CSFI (Cyber Security Forum Initiative) and its divisions CSFI-CWD (Cyber Warfare Division) and 13.00 Networking Lunch CSFI-LPD (Law and Policy Division). CSFI is a non- 14.00 Creating a cyber game culture (boosting profit organization with headquarters in Omaha, hands-on skills of your IT security team) NE and offices in the DC area. Paul has over 12 15.00 Cyber games operations and framework years of cyber security experience and has worked (hands-on group exercise) as a Chief Security Engineer for AT&T where he 15.30 Afternoon Tea designed and approved secure networks for MSS. 16.00 US Department of Defense and NATO cyber Paul has also consulted for several governments, games initiatives military and private institutions on best network 16.30 Q & A sessions security practices and cyber warfare capabilities, 17.00 Close of Workshop leading a group of more than 9000 cyber security professionals. POST-CONFERENCE WORKSHOP B 11TH NOVEMBER 2011 In association with: Preparing for the Next Cyber Attack… Why Attend this Workshop? • Learn about how to protect critical information 8:30 Registration and Coffee systems and network infrastructure from cyber attacks 9:00 Session 1 and fully understand which can be launched against 10:30 Networking Coffee Break the industrial control systems used to protect critical 11:00 Session 2 infrastructure 12:30 Networking Lunch Break • See how cyber attacks are launched against critical 1:30 Session 3 information systems and network infrastructure 3:00 Networking Coffee Break • Understand how to apply technical and administrative 3:30 Session 4 controls to mitigate critical systems and networks 5:00 Q&A from future attacks 5:30 Close of Workshop Workshop Key Objectives: • Analyse the key aspects of the cyber security as it relates to protection, detection, respond and recovery Benefits of Attending: • Discuss how cyber attackers exploit current system • Recognise how information systems can be subjected to vulnerabilities cyber attacks and the impact of these attacks on • Review what Microsoft and other vendors have done government services, economy and social aspects of society to identify and attempt to prevent cyber attacks on • Enhance your knowledge of potential security controls or systems countermeasures that can be implemented to mitigate the • Evaluate various administrative and technical security risk of a potential cyber attack controls that can be used to mitigate future cyber • Be aware of the actions that can be performed once a attacks system is compromised Register online at www.cybersecurity-asia.com
  • 5. Microsoft provides software and services that help people communicate, do their work, be entertained, and manage their personal lives. Over the past 30 years, innovative technology has Lead Sponsor: transformed how we access and share information, changed the way businesses and institutions operate, and made the whole smaller by giving us instant access to people and resources everywhere. Microsoft works closely with public and private sector partners throughout Asia Pacific to help enterprise customers, governments, educational institutions and nongovernmental bodies meet business, social and economic challenges and realize the potential of their organizations and their people. Our commitment to the region is reflected by the thousands of developers, resellers, independent software vendors, and small and medium-sized enterprises whose goals for growth and greater business efficiency has been made possible by Microsoft technology. www.microsoft.com The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, Conference Knowledge NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and Partners: security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners." CSFI was born out of the collaboration of dozens of experts, and today CSFI is comprised of a large community of nearly 5000 Cyber Security and Cyber Warfare professionals from the government, military, private sector, and academia. Our amazing members are the core of all of our activities, and it is for them that we are pushing forward our mission. www.csfi.us The Agency for Science, Technology and Research (A*STAR) is the lead agency for fostering world- class scientific research and talent for a vibrant knowledge-based and innovation-driven Singapore. A*STAR supports Singapore's key economic clusters by providing intellectual, human and industrial capital to its partners in industry. It also supports extramural research in the universities, hospitals, research centres, and with other local and international partners. www.a-star.edu.sg Conference and Exhibition Supported By: