CONFERENCE SPEAKERS

  • Niel Pandya
    Enterprise Security Lead, APJ
    Micro Focus
    Date: 2 October 2019
    Time: 1340 - 1420 hrs
    Venue: MR303 - 304, Level 3
    Biography

    Niel has over 20 years’ experience in IT with half of that focused on Security, initially with Government Agency Projects in the UK such as MOD, MOJ and Benefits Agency and later with a technology vendor in ASEAN – where he was Business Development and Pre-sales lead for Data Security, IAM and System Management.

    Niel contributes regularly at several forums including GovWare, ISACA, Protect Philippines and Cloud Expo - sharing his passion for Security and Data Privacy.

    Track

    Cybersecurity Ops Centre: Methodologies & Operations

    Presentation Title

    Maturity of Security Operations Centre and Analytics for Insider Threat Detection

    Abstract

    With advances in User Behaviour Analytics, Machine Learning and Artificial Intelligence, what does this mean for identifying threat, improving SOC maturity and efficiencies and further reducing risk? In this session we will examine existing trends in how SOC have matured and role that data security and user bahavior have become an integral part of their day to day operations.

  • Alberto Pelliccione
    Chief Executive Officer
    ReaQta
    Date: 1 October 2019
    Time: 1530 - 1610 hrs
    Venue: MR300 - 302, Level 3
    Biography

    Alberto Pelliccione has been active in the field of malware research since 1998, he’s been a cyber security trainer for governmental institutions and a researcher at the National Council of Research on Artificial Intelligence and Autonomous Collaborative Agents. He later moved on to the intelligence sector, where he led a team of high profile cyber security experts to develop attack tools, used by governmental agencies worldwide to conduct cyber intelligence operations. Since 2014 he’s Founder and CEO at ReaQta, providing a next-generation Endpoint Security Platform capable of addressing the most sophisticated cyber threats.

    Track

    Strengthening the Resiliency of the Cyberspace

    Presentation Title

    Fileless and Silent: The Threat Actors Moving Through your Supply Chain

    Abstract

    The most insidious threat actors have upgraded their tools and modus operandi in order to become more silent and effective. On one hand, they moved into the realm of fileless attacks, where everything happens in memory with little to no aid from external software parts. On the other, they are exploiting the supply-chain in order to target their victims indirectly. These two approaches combined are resulting in stealthy operations, extremely hard to detect and with high impact. We will analyse the evolution of such threats and understand why the supply-chain is a promising route for attackers and a tough spot to defend for the victims.

  • Chris Petersen
    Chief Technology Officer and Co-Founder
    LogRhythm
    Date: 2 October 2019
    Time: 1200 - 1240 hrs
    Venue: MR303 - 304, Level 3
    Biography

    Chris Petersen co-founded LogRhythm in March 2003 and has served as a member of our board of directors and Chief Technology Officer (CTO) since our inception. Mr Petersen currently serves as LogRhythm’s Chief Product and Technology Officer (CPO/CTO). In his current role, he is responsible for product from concept to delivery as the executive leader for Product Management, Engineering, and LogRhythm Labs. Mr Petersen has served in a variety of other executive roles at LogRhythm including SVP of Products, SVP of Research & Development and SVP of Customer Care.

    Track

    Cybersecurity Ops Centre: Methodologies & Operations

    Presentation Title

    Measure and Mature: Security Operations under the Spotlight

    Abstract

    Effective security operations are the first line of defense when it comes to preventing cyber attacks. To accomplish this, organizations need mature and measurable programs that leverage people, process, and technology to rapidly detect and respond to sophisticated attacks. This presentation will outline a model for Security Operations maturity.
    Organizations can use this model as a basis to evaluate their current security operations maturity level and develop a roadmap to achieve the level that is appropriate in the light of their specific resources, budget, and risk tolerance.