CONFERENCE SPEAKERS

  • Dr Abdul Rahman
    Chief Scientist
    Fidelis Cybersecurity
    Date: 1 October 2019
    Time: 1300 – 1340 hrs
    Venue: MR311, Level 3
    Biography

    Dr Rahman is a subject matter expert in the design and implementation of cloud analytics and architectures for Cyber Network Defense (CND). He has recently been responsible for managing consulting practices centered around development of leading-edge Cyber SA operational capabilities and cloud computing integration enabling technologies. Prior to this Dr Rahman lead a large-scale world-wide program on implementing CND capabilities where his role was to lead, research, design, develop, test and implement capabilities (including end user / analyst visualizations) related to: 'big data' analytics (cloud computing), software development (thin client and rest services against a cell- level security model NoSQL database), security, and system engineering.

    Track

    Cyber Operations & Response

    Presentation Title

    Deception Affinity: The Science of Attacker Seduction

    Abstract

    Deception affinity concerns configuring decoys in such a manner that will entice and seduce attackers to connect to them. Sun Tzu has stated that “All warfare is based on deception.” We expand upon this principle of warfare by adding the words ‘properly designed’. Deception is of no effect if it cannot fulfil a critical aim: to mis-direct, confuse, and lure attackers into traps and dead-ends. In this talk we shall discuss how to seduce attackers to connect to decoys in an organization’s deception layer that is instrumented with the intent to protect an enterprise’s unmanaged host terrain. Finally, deception affinity, when examined through the C-suite’s eyes, provides a measure of risk management scoring that is critical to both SOC teams and executives to determine optimal risk acceptance strategies that inform effective cyber posture.

  • Steve Redman
    Chief Revenue Officer
    Forescout Technologies
    Date: 2 October 2019
    Time: 1120 – 1200 hrs
    Venue: MR303 - 304, Level 3
    Biography

    With more than 25 years of computer and network security experience, Steve leads global sales and marketing. Steve has vast experience running marketing and sales organizations in both global and emerging markets. Prior to joining Forescout, he was Vice President, APAC at Palo Alto Networks. In addition, Steve has served as Executive Vice President, Global Sales and Field Ops at McAfee as well as Vice President of APAC and Japan at EMC. Steve earned an MBA from the Macquarie Graduate School of Management.

    Track

    Cybersecurity Ops Centre: Methodologies & Operations

    Presentation Title

    Essential Considerations When Developing a Cybersecurity Visibility and Control Strategy

    Abstract

    There’s no shortage of questions to consider when developing a network visibility and control strategy. For example,

    • Does a pre-connect approach make more sense than post-connect?
    • How should you discover and control agentless Internet of Things (IoT) devices?
    • Should you manage operational technologies (OT) given their business-critical performance requirements?
    • To what extent should you automate response actions in light of false-positive alerts?
    • How ‘valuable’ is your Data? And to what extent do you need to have visibility of it and protect it?
    • How do you know with certainty that you’re asking the right questions and arriving at the answers that will make a tangible, measurable difference?

    This session will address fundamental, yet commonly overlooked questions that are critical to evaluating technologies and solutions to meet your security needs. It is designed to be an objective, educational session and will NOT include a vendor pitch.

  • Darran Rolls
    Chief Technology Officer
    SailPoint Technologies
    Date: 2 October 2019
    Time: 1640 - 1720 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Mr Darran Rolls is the Chief Technology Officer at SailPoint, where he is responsible for directing the company’s technology strategy. Mr Rolls has a long history in identity management and security at companies ranging from Tivoli Systems, IBM, Waveset Technologies, Sun Microsystems and now SailPoint, Mr Rolls has helped design, build and deliver innovative, ground-breaking technology solutions that have defined and shaped the identity and access management industry.

    Mr Rolls frequently speaks at industry events and to customers about identity and access management, and next generation enterprise security solutions.

    Track

    Advanced Identity Management and the Zero Trust Environment in Perimeter Security and Access Management

    Presentation Title

    Identity at the Center of a Zero Trust Network: Taking a Governance-Based Approach to Security

    Abstract

    Securing today’s complex application and data ecosystem possess a significant challenge for organisations large and small. The repeated success of the adversary has clearly proven that we must take a different approach if we are to change this trajectory. “Adopting a Zero Trust Approach” has become the new buzz word is security architecture. Building systems that take a user-centric approach is now the norm and deploying a security model that puts strong authentication, authorisation and governance at the center is considered by many a basic best practice.

    In this session, SailPoint’s CTO Darran Rolls with explain in simple terms how to take a Zero Trust Approach to security, and how to put identity governance at the center of your security architecture. Drawing from over 25 years of Identity & Access Management experience, Mr Rolls will highlight the importance of strong identity management architecture and will detail how to avoid common pitfalls when first taking an identity-centric approach.

  • Markku Rossi
    Chief Technology Officer
    SSH.COM
    Date: 2 October 2019
    Time: 1600 - 1640 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Markku Rossi brings close to 25 years of software engineering and architecture experience to the company. He is responsible for R&D and directs the company’s technology strategy. Markku has extensive knowledge and experience with SSH Communications Security products, having served the company from 1998 through 2005 as Chief Engineer and a major contributor to the SSH software architecture. Prior to rejoining the company in 2015, he co-founded several companies such as Codento and ShopAdvisor and served as CTO at Navicore and Chief Architect at Nokia. He has a Master of Science degree in Computer Science from Aalto University.

    Track

    Advanced Identity Management and the Zero Trust Environment in Perimeter Security and Access Management

    Presentation Title

    Seven Deadly Sins of Access Management in Cyber Security

    Abstract

    This session will illustrate seven deadly, but common mistakes made in managing privileged accesses.

    According to the latest Hong Kong Enterprise Cyber Security Readiness Index, a reference study for Singapore government and enterprises, over one-third of the respondents are using third party IT services which allows access to their critical systems and networks. Unfortunately, less than half of them can react real time when they find out suspicious activities in their system.

    Securing privileged access is a crucial task to enterprises, people are well aware of it. However, numerous nerve-racking cyber security incidents have been forcing the industry to clutch at straws on finding ways to keep their environment safe, which might made themselves vulnerable to nowadays cyber security risks.

    We will study cases over APAC. Find out the mistakes and tell you what to do to eliminate those risks.