CONFERENCE SPEAKERS

  • Ziv Mador
    Vice President, Security Research, SpiderLabs
    Trustwave
    Date: 2 October 2019
    Time: 1600 – 1640 hrs
    Venue: MR300 - 301, Level 3
    Biography

    Ziv Mador manages the global security research team at Trustwave, covering research areas such as vulnerability assessment and scanning, malware reverse engineering, and spam and phishing research.

    Ziv was recently acclaimed as the “Threat Seeker” by SC Media. He’s regularly diving into the underground world to find out how criminals are monetising the latest exploit kits and botnets. His team investigated the Petya and WannaCry ransomware malware attacks, and have recently been exploring cryptojacking, ATM Heists and new zero-day vulnerabilities. He speaks security conferences such as RSA and Gartner Security Summits, the Microsoft Digital Cybercrime Consortium and OWASP Global Appsec conferences. Prior to his current role, Ziv worked at Microsoft developing a variety of security technologies including antimalware capabilities, IDS/IPS, enterprise firewalls, Windows security and managing the response to zero day malware. Ziv is a 20 year veteran of the security industry and a leading authority on the topic of Internet threats and cybercrime.

    Track

    Darkweb, Cybercrime, Cyberwarfare

    Presentation Title

    Understanding the Gangs of the Cyber Underground

    Abstract

    The darkweb is a jungle of criminal activity, much of it uses various cyber capabilities which Ziv Mador, Trustwave’s VP of Security Research, investigates for years. In this talk, Ziv will show the rules of conduct that these underground forums follow, how these cybercriminals collaborate and run their business, how they attract talent and compensate them, and how they use multiple underground services for money laundering. The talk will describe recent attacks, such as the massive Magecart attacks that skim credit card information from users of tens of thousands of eCommerce sites, cases of government services that were recently breached and, in particular, examples of cyber attacks that are taking place in Singapore. Lastly, learn how the security research community collaborates behind the scenes to help combat this criminal activity. As the recent acclaimer of SC Magazine’s “Threat Seeker” leadership award and a frequent speaker on these topics, Ziv will demonstrate, through recent examples, the modern hacker's modus operandi.

  • John McClurg
    Vice President, Ambassador-At-Large
    BlackBerry Cylance
    Date: 1 October 2019
    Time: 1300 - 1340 hrs
    Venue: MR300 - 302, Level 3
    Biography

    John McClurg is VP & Ambassador-At-Large at Cylance. He came to Cylance from Dell, where he served as its CSO, advancing responsibilities that included the strategic focus and tactical operations of Dell’s internal global security services, both physical and cyber. He was also charged with the advocacy of business resilience and general security prowess.

    Before joining Dell, McClurg served at Honeywell International; Lucent Technologies/Bell Laboratories; and in the Federal Bureau of Investigation (FBI), where he held an assignment with the US Department of Energy (DOE) as a Branch Chief charged with establishing a Cyber-Counterintelligence program within the DOE’s newly created Office of Counterintelligence.

    Track

    Leveraging Machine Learning, Automation and AI in Next Gen Cybersecurity.

    Presentation Title

    The Future of Security - How AI Will Liberate Us

    Abstract

    Over 20 years ago, John helped build the FBI’s InfraGard Program. Although its original intention was to be proactively preventative against cyber threats, it operated in the world of the reactive, despite best efforts. Faced with 'Defense in Depth' complexity and cost, proactive prevention eluded them. So what is 'Proactive Prevention' in the world of cybersecurity and how does AI play a role?

    For decades, the security profession has relied upon the best technology we had at the time to deflect the onslaught of daily virus and malware attacks. The security industry has profited quite nicely from the insecurity of the world and this reactive paradigm.

    The effectiveness of that anti-virus (AV) technology was always based on having the latest signatures on hand, which the adversaries could easily defeat with just the slightest modification. That signature-based paradigm required downstream resources and expense and usually at least one “sacrificial lamb” - and no business wants to be that case study.

    As predicted 50 years ago by Thomas Kuhn in his book the Structure of Scientific Revolutions, we’re seeing the dawn of a new day where AI’s machine learning and advance mathematical algorithms now offer validated deflection rates, pre-execution, in the realm of 99%.

    Our discussion will explore John’s generation’s journey toward this emerging new paradigm, its challenges, what it means for the future as our homes, enterprises and cities become hyperconnected and automated.