CONFERENCE SPEAKERS

  • Ziv Mador
    Vice President, Security Research, SpiderLabs
    Trustwave
    Date: 2 October 2019
    Time: 1600 – 1640 hrs
    Venue: MR300 - 301, Level 3
    Biography

    Ziv Mador manages the global security research team at Trustwave, covering research areas such as vulnerability assessment and scanning, malware reverse engineering, and spam and phishing research.

    Ziv was recently acclaimed as the “Threat Seeker” by SC Media. He’s regularly diving into the underground world to find out how criminals are monetising the latest exploit kits and botnets. His team investigated the Petya and WannaCry ransomware malware attacks, and have recently been exploring cryptojacking, ATM Heists and new zero-day vulnerabilities. He speaks security conferences such as RSA and Gartner Security Summits, the Microsoft Digital Cybercrime Consortium and OWASP Global Appsec conferences. Prior to his current role, Ziv worked at Microsoft developing a variety of security technologies including antimalware capabilities, IDS/IPS, enterprise firewalls, Windows security and managing the response to zero day malware. Ziv is a 20 year veteran of the security industry and a leading authority on the topic of Internet threats and cybercrime.

    Track

    Darkweb, Cybercrime, Cyberwarfare

    Presentation Title

    Understanding the Gangs of the Cyber Underground

    Abstract

    The darkweb is a jungle of criminal activity, much of it uses various cyber capabilities which Ziv Mador, Trustwave’s VP of Security Research, investigates for years. In this talk, Ziv will show the rules of conduct that these underground forums follow, how these cybercriminals collaborate and run their business, how they attract talent and compensate them, and how they use multiple underground services for money laundering. The talk will describe recent attacks, such as the massive Magecart attacks that skim credit card information from users of tens of thousands of eCommerce sites, cases of government services that were recently breached and, in particular, examples of cyber attacks that are taking place in Singapore. Lastly, learn how the security research community collaborates behind the scenes to help combat this criminal activity. As the recent acclaimer of SC Magazine’s “Threat Seeker” leadership award and a frequent speaker on these topics, Ziv will demonstrate, through recent examples, the modern hacker's modus operandi.

  • John McClurg
    Vice President, Ambassador-At-Large
    BlackBerry Cylance
    Date: 1 October 2019
    Time: 1300 - 1340 hrs
    Venue: MR300 - 302, Level 3
    Biography

    John McClurg is VP & Ambassador-At-Large at Cylance. He came to Cylance from Dell, where he served as its CSO, advancing responsibilities that included the strategic focus and tactical operations of Dell’s internal global security services, both physical and cyber. He was also charged with the advocacy of business resilience and general security prowess.

    Before joining Dell, McClurg served at Honeywell International; Lucent Technologies/Bell Laboratories; and in the Federal Bureau of Investigation (FBI), where he held an assignment with the US Department of Energy (DOE) as a Branch Chief charged with establishing a Cyber-Counterintelligence program within the DOE’s newly created Office of Counterintelligence.

    Track

    Leveraging Machine Learning, Automation and AI in Next Gen Cyber Security.

    Presentation Title

    The Future of Security - How AI Will Liberate Us

    Abstract

    Over 20 years ago, John helped build the FBI’s InfraGard Program. Although its original intention was to be proactively preventative against cyber threats, it operated in the world of the reactive, despite best efforts. Faced with 'Defense in Depth' complexity and cost, proactive prevention eluded them. So what is 'Proactive Prevention' in the world of cybersecurity and how does AI play a role?

    For decades, the security profession has relied upon the best technology we had at the time to deflect the onslaught of daily virus and malware attacks. The security industry has profited quite nicely from the insecurity of the world and this reactive paradigm.

    The effectiveness of that anti-virus (AV) technology was always based on having the latest signatures on hand, which the adversaries could easily defeat with just the slightest modification. That signature-based paradigm required downstream resources and expense and usually at least one “sacrificial lamb” - and no business wants to be that case study.

    As predicted 50 years ago by Thomas Kuhn in his book the Structure of Scientific Revolutions, we’re seeing the dawn of a new day where AI’s machine learning and advance mathematical algorithms now offer validated deflection rates, pre-execution, in the realm of 99%.

    Our discussion will explore John’s generation’s journey toward this emerging new paradigm, its challenges, what it means for the future as our homes, enterprises and cities become hyperconnected and automated.

  • Rob McNutt
    Chief Technology Officer
    Forescout Technologies
    Date: 3 October 2019
    Time: 1405 – 1440 hrs
    Venue: MR300 - 301, Level 3
    Biography

    As CTO, Rob McNutt evangelizes Forescout’s technology and leverages customer feedback to help shape future product direction. He also advises customers on how to build a cybersecurity strategy to best protect against today’s cybersecurity risks and threats. Rob brings more than 15 years of experience to the role, including leading Forescout’s emerging technology teams and multiple technology leadership roles at other companies.

    Track

    Industrial Control Systems (ICS): Vulnerabilities & Resiliency

    Presentation Title

    Tearing Down a Building Network Using IoT Devices

    Abstract

    Information Technology and Operational Technology were, for a long time, regarded as two distinct areas of an organization. Nowadays, these two domains are converging with the rise of connected embedded devices in the Internet of Things (IoT) and industrial control systems. Consequently, IT security teams are increasingly responsible not only for protecting the information of business but also its cyber-physical systems.

    Government agencies within Asia have stated that the buildings and systems are becoming ‘smarter’ so the risk of them being attacked for ransom or to be exploited to spread malware are increasing.

    Recent research conducted by Forescout Technologies uses a smart building as a case study of a network where legacy OT assets, IT systems and IoT devices share the same network. Join us to learn about -

    • The cybersecurity landscape and impacts of IoT in the networks of modern organizations, focusing on the interplay between modern IoT and legacy OT devices.
    • The cyber risks to which these networks are exposed by evaluating their security posture.
    • How to implement a network monitoring solution that improves network resilience via device visibility and control.