CONFERENCE SPEAKERS

  • Mohamed Ibrahim
    Director, Sales Engineering - Asia-Pacific & Japan
    Exabeam
    Date: 1 October 2019
    Time: 1650 - 1730 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Mohamed is currently the Director of Sales Engineering for the Asia Pacific and Japan regions Texabeam. He has 15+ years experience in IT, Systems Admin, Messaging Specialist & now as a Security Presales Engineer. Moham brings with him an entrepreneurial mindset for helping young startups and emerging technologies to get established in APJ.

    Track

    Leveraging Machine Learning, Automation and AI in Next Gen Cyber Security.

    Presentation Title

    How Machine Learning is Changing the SOC

    Abstract

    The last decade has seen numerous devastating breaches at large, reputable brands - including the theft of 40 million credit and debit card numbers using POS malware at Target in 2013, and more recently in 2018, when Marriott fell victim to a breach that exposed the private details of up to 500 million customers. With the average enterprise logging between 160 million and 200 million events a day - and 150,000 security events daily - sifting through the big data noise to prevent these incidents has become more difficult than ever.

    Recently, machine learning has emerged as a key technology in solving this and other cybersecurity issues - and its benefits are indisputable. It not only has the ability to become smarter about and adjust to the activity that flows through your SOC, it can also make your SOC analysts themselves work smarter.

    Join Moe Ibrahim, Director, Sales Engineering at Exabeam, for a talk discussing how machine learning is reshaping the cybersecurity industry.

    Audience takeaways from this session will include learning:

    • Why major breaches happened and what the companies were missing
    • Today’s security monitoring best practices
    • How to use machine learning to trace alerts in SIEM
    • The ability to identify identities and assets and their relationships to the organization
    • How to apply machine learning to user behavior, analyze activity changes and comprehend user and entity behavior analytics

  • Oleg Ishanov
    Director of Information Security
    Acronis
    Date: 3 October 2019
    Time: 1155 – 1230 hrs
    Venue: MR302, Level 3
    Biography

    Oleg is an expert in the development of cyber protection technology and the study of modern cyber threats. He has more than 10 years of successful experience in the field of information security. Oleg began his career in 2006 as a malware analyst and started leading an anti-malware research laboratory after several years. Under his leadership, outstanding results were achieved in the quality of malware detection and new protection technologies were developed to combat new threats.

    Oleg joined Acronis as Director of Information Security in 2017 where he is responsible for the information security of the company's services and products and ensuring internal security complies with regulatory and legal requirements. In addition, he also participates in the development of protection technologies in the company’s products.

    Oleg has a degree in Computational Mathematics and Cybernetics from the Moscow State University.

    Track

    Incident Response, Investigations, Forensics and Recovery.

    Presentation Title

    Hidden Treasures in your Backups: Novel Approach to Complex Attacks Detection

    Abstract

    The malware attacks on endpoints are increasing exponentially and security companies are exploring novel solutions to detect these advanced threats. At the same time, many copies of the same endpoints are usually available as backup in private datacenters or on cloud which are sleeping/idle with no potential use other than waiting to be restored or to be replaced by new version of the backup. These data, if examined thoroughly can reveal complex attack traces. These could be used to identify malicious files, event or activity going on the endpoint or has taken place in the history. In our presentation, we will demonstrate a number of practical backup analysis techniques, including running a virtual machine from the backup, anomalies detection, and enriching backups with data helpful for investigation.