As Head, Technical Services - Justin is responsible for helping customers adopt Checkmarx’s Application Security Solutions in the Asia Market. His primary responsibilities is to lead the Technical Services Team in Asia Pacific to define and develop solutions to customers to assist them with their Application Security Concerns.
Prior to joining Checkmarx, Justin has held roles in other AppSec companies as well as leading the Security Consulting Business for Symantec South East Asia, specifically a team of Security Consultants performing Business Advisory Services, through to Security Consulting, and implementation.
He also has held roles in a Cloud Access Security Broker – Leading their Asia Pacific Sales and Delivery organization, and has also held end user roles, such as the IT Infrastructure Security Manager for a large regional bank in Asia Pacific.
With over 20 years in IT Security domain, Justin has a diverse and deep IT Security background, working in areas such as IT Security Risk and Governance, IT Infrastructure Security Solutions, Application Security, as well as Security Consulting Services such as Pen Testing, Security Assessment Services and Process/Policy Development and Review.
In his free time, Justin is active in Open Source, and is currently leading a project providing a Open Source Library for application to leverage to interface with the Home Automation Protocol Z-Wave. This project incorporates many aspects of Application Security into it, namely encryption, Secure Code implementation and review, and License Compliance activities.
Leveraging Machine Learning, Automation and AI in Next Gen Cyber Security
Rise of the Machines - Artificial Intelligence and its Impact on Security
Artificial Intelligence (AI) software is everywhere, leveraged by the largest companies in healthcare, fintech, and e-commerce. But how does AI impact the security space? Using AI to their advantage, attackers abuse these capabilities, and today, they have the upper hand by employing AI to exponentially scale their attacks. AI is being used in an array of attacks including whaling, whereby attackers use AI for social network phishing recon to improve their success rates daily.
Join Justin Hammond, Checkmarx Head of Technical Services, Asia Pacific to hear a white hat and black hat perspective on AI, and what it means to the future of security. Here you’ll discover how:
For the defenders, self-learning cyber AI is transforming complex and vulnerable organizations into resilient, self-defending digital businesses. Those that fail to deploy AI-based cyber defenses today may find themselves unable to detect the attacks of tomorrow. And crucially, these AI defenses can not only detect threats as they emerge but also autonomously respond to attacks in real time, stopping a cyber-threat every three seconds around the world. As the shortage of trained cyber analysts worsens, the future of security is inevitably autonomous.
In this presentation, learn about how autonomous response AI can augment human security teams through:
Asha is founder and CEO of visioclara.tech and a member of Div0, a cybersecurity community in Singapore.
She was formerly a member of the Board of Directors and Chair of the Finance Committee at the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is a global organization that manages and coordinates Internet resources for the public benefit and whose mission is to ensure the stable and secure operation of the Internet’s unique identifier systems.
Prior to her board position at ICANN, she spent more than 20 years in the mobile communications industry in network engineering, marketing, sales, strategy and regulatory functions. Her roles included that of Global Head of Sales for the 3G network infrastructure business line as well as global 4G business development.
Asha has a degree in Electrical Engineering and multiple certificates and diplomas from Stanford Business School, the MIT Sloan School of Business and the Singapore Institute of Directors.
Cybersecurity and 5G
Security Challenges in 5G
As new verticals such as IoT and autonomous vehicles continue to grow, it has become clear that network access that enjoys low latency, is fast and always available will be needed in order to sustain these verticals. These attributes are promised by 5G networks.
The architecture of and the services provided by 5G networks will present security vulnerabilities, both endpoint as well as network, which need to be addressed for the sake of 5G business continuity, specifically for the integrity of transactions and customers’ continued trust.
This presentation will describe the 5G landscape and the vulnerability surfaces.
As 5G will be tied to the core of legacy (3G/4G) networks, security vulnerabilities will include inherited risks such as vulnerabilities in signalling protocols. Others include those arising from network slicing, Network Function Virtualization (NFV) and Software Defined Networking (SDN).
From the endpoint perspective, 5G networks will create critical, connected and vulnerable data from IoT connections and devices, giving threat actors a large number of new targets to attempt to attack. This presentation will also examine what regulatory bodies globally are proposing in security by design and risk mitigation.
James Hennah joined BT in 1997, and was most recently CEO for BT’s global Media & Broadcast business and managing director of carrier, channel and MVNO sales in BT’s Wholesale & Ventures division. In that position, he oversaw a number of world firsts such as the first ever live broadcast of 4K television in March 2015. With more than 19 years of commercial experience within BT, James has a proven track record in the development and execution of innovative propositions and in the end-to-end management of complex customer relationships. James leads BT’s South East Asia team from Singapore, focusing mainly on Singapore, Malaysia, Indonesia, Vietnam, Thailand and the Philippines.
Cyber Threat Landscape & Intelligence
Using Cyber Intelligence to Stay Ahead of the Changing Threat Landscape; A User’s Perspective
BT plays a vital role in protecting multinational business and nation-states from cyber-attacks. We work behind the scenes to help our customers stay safe from both large scale attacks and more targeted attempts to steal data.
Our global scale, multi-national client base, and active relationships with leading law enforcement and cyber security authorities such as Interpol, Europol and the UK National Cyber Security Centre, means we’re often the first to correlate events and know of new attacks. For example, we were able to give our customers intelligence around Wannacry six weeks in advance.
James will give unique insight into the cyber threat landscape that BT observes, analyses and acts on. He’ll discuss what users can do to limit cyber risks and to make security integral to their business.
Dr Andrew Hutchison is CyberSecurity Specialist at T-Systems Switzerland, and part of the overall Telekom Security organization of Deutsche Telekom. In this capacity he advises customers regarding their security strategy, roadmap and solutions. Andrew has a PhD in Computer Science (Information Security), which he completed at the University of Zürich, Switzerland while working at the IBM Zürich Research Laboratory. He is an Adjunct Professor of Computer Science at University of Cape Town.
Industrial Control Systems (ICS): Vulnerabilities & Resiliency
To be advised
To be advised