CONFERENCE SPEAKERS

  • Steven D'Sa
    Director, Mandiant Consulting Services
    FireEye
    Date: 3 October 2019
    Time: 1120 – 1155 hrs
    Venue: MR302, Level 3
    Biography

    • Mandiant Director for South East Asia
    • Based in Singapore, born in a land far far away
    • 20 years of Information Security and Advisory
    • Product developer, engineer, consultant, business leader
    • Involved in supporting executives through incident response or advisory for verticals involving banking, aviation, manufacturing, insurance, gaming etc.
    • Delivered engagements in every country in APJ except Laos, Bhutan and Nepal*
    Track

    Incident Response, Investigations, Forensics and Recovery

    Presentation Title

    Premediation: The Art of Proactive Remediation

    Abstract

    Remediation is a crucial step when recovering from an incident. Many organizations invest considerable time, money, and resources when executing remediation actions. Proactively implementing various security controls and hardening an environment doesn’t need to wait until AFTER an incident has occurred. This presentation will detail common containment and remediation strategies that are used when responding to targeted breaches. It will also highlight key wins that organizations can achieve if they proactively apply a remediation strategy prior to an incident.

  • Stephen Dane
    Managing Director, Cybersecurity, Asia Pacific, Japan and Greater China
    Cisco Systems
    Date: 1 October 2019
    Time: 1610 – 1650 hrs
    Venue: MR303 - 304, Level 3
    Biography

    Stephen Dane is the Managing Director of Cybersecurity for Asia Pacific, Japan and Greater China at Cisco. He is responsible for the strategy and growth of Cisco's security business in the region.

    With more than two decades of expertise in the IT and Telecom industry, Stephen is focused on developing and positioning cybersecurity strategy as an integral foundation for all businesses. He has been with Cisco the past 10 years, following the acquisition of ScanSafe, a cloud-based web security company, at which he was the EMEA Vice President. Stephen led the integration of ScanSafe's business into Cisco and went on to lead the UK Network and Content Security team.

    Prior to joining Cisco, Stephen worked at BT in the UK and across Asia Pacific, managing teams focusing on the Financial Services industry and the Energy sector. He has also held leadership positions at cloud and mobile software start-ups such as MessageLabs and iPass.

    Track

    Cybersecurity in the Cloud

    Presentation Title

    Adopting a Trust-centric Approach in a Hybrid and Multicloud Environment

    Abstract

    There's been a shift in the IT landscape, as users, devices and cloud move outside of the traditional network, and hybrid and multicloud environments are the new majority enterprise IT model. Organizations today have different types of users - contractors, third-party vendors and remote workers connecting to their corporate network. They're increasingly using their own devices to connect to applications and networks. Meanwhile, applications, servers, containers and other workloads can be found communicating to each other across both cloud infrastructure (like AWS & Azure) and data centers. With your workforce on the go, workloads in many clouds, and devices outside your control--knowing who and what to trust is the big IT security challenge. This can be achieved by taking a zero trust, identity-centric approach to verify identity and trustworthiness of users and devices across your applications and environment. This presentation will discuss how businesses can effectively secure their workforce, workloads and workplace against threats.

  • Colby DeRodeff
    Chief Technology Officer
    Verodin
    Date: 3 October 2019
    Time: 1230 – 1305 hrs
    Venue: MR302, Level 3
    Biography

    Colby DeRodeff is Chief Technology Officer at Verodin, where he is responsible for driving the company’s technology strategy and supporting the rapid expansion of its Security Instrumentation Platform (SIP). Prior to joining Verodin, Colby co-founded the threat intelligence and analysis platform, Anomali where he led strategic initiatives, business development, and worldwide field operations. Additionally, Colby has held senior leadership positions with both Arcsight and Silver Tail Systems, where he played an instrumental role in the successful IPO of ArcSight as well as the acquisition of both companies by HP and RSA/EMC, respectively.

    Track

    Incident Response, Investigations, Forensics and Recovery

    Presentation Title

    The Industrialization of Red and Blue Teaming

    Abstract

    The industrial revolution was brought on by purpose-built machinery and automation. A similar revolution has occurred in security, leading to the industrialization of red and blue teaming. In large part, this industrialization has been realized through security instrumentation platforms.

    By leveraging security instrumentation platforms, you are bringing together red and blue teaming initiatives with greater symbiotic mutualism across three major areas. First, you can validate the efficacy of security controls such as firewalls, WAFs, DLPs, EDRs, and SIEMs. If those controls aren’t working as needed, you can leverage perspective analytics to instrument them. Second, you can apply configuration assurance to verify that a change that has been made actually does what’s desired. You can also determine if that change negatively impacts other facets of security. Third, you can utilize automated, ongoing checks to ensure that what was working continues working in perpetuity. Should something stop functioning, blocking, detecting, correlating, etc., as needed, alerts will be generated in response to the environmental drift.

    The money you spend on security plus the level of effort isn’t resulting in security effectiveness. You hire security professionals, deploy security controls, and build processes. You make this investment of time, money, and resources so when an attack occurs, you can fight and be able to prevent the attack--or at least detect and respond. Two groups are critical in this fight. They include: security penetration testers (red teams that are tasked with offensive actions to evaluate defenses) and security operations (blue teams that focus on operating these security defenses).

    Yes, red teams can add tremendous value. But the legacy, manual, and expensive process of scanning, penetrating, reporting, and hoping the blue team will act on the findings largely isn’t resulting in value or reduced risk. For the blue team, you invest millions in endpoint, network, email, and cloud security controls, but organizationally you are probably spending painfully few cycles to determine if this complex mix of solutions is actually working.

    We need to readjust so that we are focusing on security effectiveness and the efficacy of our security controls. We need to industrialize our approach to red and blue teaming with security instrumentation through automation, environmental drift detection, prescriptive actions, and analytics that enable us to finally and empirically manage, measure, and improve security effectiveness.

  • Edwin Doyle
    Global Security Strategist
    Check Point Software Technology
    Date: 3 October 2019
    Time: 1155 – 1230 hrs
    Venue: MR300 - 301, Level 3
    Biography

    As Global Security Strategist for Check Point Research, Edwin communicates with international leaders in cyber security, cyber forensics & cyber law enforcement, across the world. Taking best-practices for threat mitigation from the industry’s finest CISOs & from police & military cyber command, Edwin’s responsibilities include sharing cyber defense tactics with media, government agencies & enterprise corporations, via keynote & panel discussions.

    Edwin’s unconventional background in education allows him to clearly explain technical topics to a diverse audience. With over 20 years’ experience in I.T. & over 15yrs in cyber security, Edwin holds a holistic understanding of the security risks and challenges that organizations must overcome.

    Track

    Leveraging Machine Learning, Automation and AI in Next Gen Cyber Security

    Presentation Title

    Hacker’s Coding Ethics Cracked via the DNA of Malware

    Abstract

    Machines will soon make ethical decisions!
    In a survey across 200 countries to answer just one question, MIT’s Dept. of Computers, Robotics & Philosophy assembled over 40 million data points, to solve the dilemma of when a driverless car is facing an unavoidable crash, but must decide who should live & who should die!

    Humans are teaching machines to do the unthinkable... decide our fate!
    With many millions of additional variables for road safety, engineers are achieving the impossible... a zero tolerance for false-positives when human life lies in the balance!
    Machines must also make critical security decisions, affecting real world events, with just as many variables; surely therefore, we can teach machines to PREVENT cyber breaches with no false-positives!

    Using big data, algorithms can now identify hacker code, based on their work ethic.
    Come & be inspired to prevent cyber-crime, relying on the advancements A.I. has made in identifying unknown threats through sequencing the DNA of Malware.

  • Abhishek Dujari
    Security Specialist
    Splunk
    Date: 3 October 2019
    Time: 1230 – 1305 hrs
    Venue: MR300 - 301, Level 3
    Biography

    Abhishek is a Security Specialist at Splunk advising customers in SecOps and Incidence response with Automation. He is an active contributor to Open source projects and maintains his own honeypot network. Abhishek brings 15 years of Software Engineering and Cloud architect experience having created IoT Cloud for millions of gamers. Abhishek's move into Security started with leading Emergency response to cyberwars and breaches where he defended networks and recovered organizations from major breaches.

    Track

    Leveraging Machine Learning, Automation and AI in Next Gen Cyber Security

    Presentation Title

    Practical Journey to Building a Scalable, Data-driven Cybersecurity Strategy with Automation and Orchestration

    Abstract

    Security operations are often dealing with lack of people, too many products and alert fatigue. Automation is the obvious path and how we approach it will determine the level of success and speed with which SOC and CIRT can scale to meet these challenges. We will explore the strategies that have been succesful and the common pitfalls to avoid when developing a plan to automate SecOps as well as our Automated Response to threats. Machine learning has found a lot of practical use-cases in Fraud and unknown Threat detection. We will analyze the succesful use-cases and how they can be built with data you may already have and the challenges with false positives.

  • JP Dunning
    Principal Security Consultant, Foundstone Asia-Pacific Practice Lead
    McAfee
    Date: 1 October 2019
    Time: 1610 - 1650 hrs
    Venue: MR300 - 302, Level 3
    Biography

    JP Dunning is a Principal Security Consultant and APAC Lead of the Foundstone practice of McAfee. He regularly evaluates the security of Fortune 500 companies. JP specializes in Wireless, Hardware, Social Engineering, IoT/ICS. Physical, and Network Penetration Testing. He is the primary maintainer and instructor for multiple Ultimate Hacking training courses.

    JP has over 10 years of experience in the security field. He has worked on a number of opensource software and hardware projects over the years, including some loaded in Kali linux. His reseach and open source projects have been fetured in books such as Dissecting the Hack: The F0rb1dd3n Network and Open Source Security Tools: Practical Guide to Security Applications

    JP regularly contributes to the security community by speaking and performing training at industry events all over the world; such as BlackHat Asia, DefCon, GovWare, MHCon, ShmooCon, DerbyCon, ISSA, H.O.P.E., B-Sides, Hack3rCon, and ToorCamp.

    Track

    Strengthening the Resiliency of the Cyberspace

    Presentation Title

    Hacker or Hollywood?

    Abstract

    So many movies now seems to include a hacker as part of the team. But is it just Hollywood trying to sensationalize effects for bigger profits or are these hacks really possible. The answer to some of the tools and tricks used in hacking on the big screen may surprise you.

    In this presentation we will talk though a few famous movie hacks and discuss what is fact and what is fiction. We will show some of the real work spy gadgets you though just existed in James Bond films. The cheap cost of purchase or DIYing hacker gadgets is shockingly low compared to the cost spends defending from them. See this hacker gadgets up close and learn what they can really do.