SPEAKERS
CONFERENCE SPEAKERS

  • Nick Savvides
    Chief Technology Officer, Asia Pacific
    Symantec
    Date: 20 September 2018
    Time: 1600 – 1640 hrs
    Venue: MR303 - 304, Level 3
    Biography

    Nick Savvides is responsible for Symantec’s Cyber Security Strategy across Asia Pacific and Japan.  In this role, Savvides’ charter is to provide local market insights that influence global strategic planning and product development. Savvides works also with organisations and governments to develop their cyber security strategies and solve complex business problems. He has worked on some of the largest business information security projects in Australia, affecting the way many Australian’s interact with their employers, banks and governments

    Abstract

    Effective Incident Response (IR) can determine whether a company survives a security event. With the costs of recovery and remediation racking up into the millions and the media savaging companies, executives and business leaders expect Cyber Security to understand and manage incident response; but how much do they understand themselves?

    While a recognised requirement to train executives, it often goes overlooked. This talk will examine how to effectively improve Cyber Security Incident Response readiness by involving executives in planning activities. It will look at how to conduct effective interviews and how to create relevant exercise scenarios not only educate executives, but train security staff in communicating executives during an incident.

  • Christopher Schueler
    Senior Vice President, Managed Security Services
    Trustwave, a Singtel company
    Date: 18 September 2018
    Time: 1530 – 1610 hrs
    Venue: MR303 - 304, Level 3
    Biography

    Chris Schueler is Senior Vice President of Managed Security Services at Trustwave where he is responsible for Managed Security Services, the global network of Trustwave Advanced Security Operations Centers and Trustwave SpiderLabs Incident Response. Chris joined Trustwave from IBM where he held multiple roles including Vice President of Global Cloud Development and Operations (DevOps), Director of Applications on Demand and Director of Global Security Operations Centers. While at IBM, Chris built successful businesses in the cloud industry with a specialisation in managed services and was instrumental in many technology and service acquisitions. Prior to IBM, he was at Internet Security Systems, the Department of Defence and in the U.S. Army Special Operations Command. Chris received his master's degree in business administration from Auburn University and has a bachelor's degree in computer science from Northern Illinois University.

    Abstract

    The modern SOC has evolved tremendously over the last 10 years. Fusion Center, Cyber Security Defence Center, and others are trending titles are becoming more popular to provide the optics that the SOC is no longer capable of the modern mission. Agnostic of the name, the core mission is prevention, detection and response. How do we become more agile? Do we have the right tools (or overlapping tools) and where are the gaps? Will the operating model scale? What is the right sourcing model? Large and small enterprise’s cyber teams face similar challenges when creating or optimising their threat prevention, detection and response operations. The business continues to innovate and pushing for growth while the bad actors and the TTPs continually challenge the cyber security operations to maintain pace.

  • Drew Schuil
    Vice President of Global Product Strategy
    Imperva
    Date: 19 September 2018
    Time: 1640 – 1720 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Over the last ten years Drew has held a number of key leadership positions at Imperva. In his current role, he serves as product evangelist and customer advisor. He speaks at industry events around the globe and at last count has met with Imperva customers in 37 countries.

    Abstract

    Network, end-point, cloud, on-premise, database, file server, etc... The list of targets for bad actors is endless and changes around your security efforts. In this session, I will share the priorities of global CISOs today and how they are using technology collaboration to make intelligent decisions to proactively prevent todays attacks and prepare for tomorrow’s.

  • Justin Shattuck
    Principal Threat Researcher
    F5 Networks, Inc.
    Date: 20 September 2018
    Time: 1150 – 1230 hrs
    Venue: MR303 - 304, Level 3
    Biography

    Justin Shattuck is a Principal Threat Researcher for F5 Labs. He has been an avid threat hunter for most of his life and continually tracks attack campaigns and threat actors. He routinely participates in takedowns and helps to inform various law enforcement agencies of nefarious cyber activity. Justin has been a security product developer and researcher for over 15 years. Most recently he was the Manager of Product Development for F5 Silverline where he was responsible for developing features and enhancements to F5 Silverline's managed security services including Web Application Firewall and DDoS attack mitigation.

    Abstract

    To keep up with the growing demand of always-on and available-anywhere connectivity, the use of cellular, in comparison to its wireless mobile connectivity counterpart in the electromagnetic spectrum, is rapidly expanding. My research in the IoT space led me down the path of discovering a variety of vulnerabilities related to cellular devices manufactured by Sierra Wireless and many others. Proper disclosures have occurred; however, many manufactures have been slow to respond. This led into examining numerous publicly disclosed vulnerabilities that were considered "low-hanging-fruit" against cellular devices and other cellular-based network modems that are often deployed as out of band management interfaces. The research expanded through the details provided in configuration templates available by each device including the following:

    • Wireless Network Information
    • IPSec Tunnel Authentication Details
    • Connected devices and services

    Focusing on an obfuscated series of examples to protect the organizations, people, and companies identified; this presentation focuses on the services and systems information of the following, commonly deployed cellular-connected devices to provide an in-depth look at what is easily possible:

    • Emergency Response systems
    • Resource collection systems
    • Transportation Safety
    • Out of band management
  • Ken Soh
    Chief Executive Officer
    Athena Dynamics Pte Ltd
    Date: 18 September 2018
    Time: 1420 – 1500 hrs
    Venue: MR300 - 302, Level 3
    Biography

    Ken Soh holds concurrent appoints as Group CIO of mainboard listed BH Global Corporation Limited since 3 Mar 2014 and as the founding CEO of the group subsidiary cyber security company Athena Dynamics Pte Ltd.

    Ken has more than 27 years of working experience in the ICT industry. Prior to joining BH Global, Ken held various senior positions in public and private sectors at CxO and business leader levels with Master Planning and P&L responsibilities.

    Ken has been an avid industry speaker and writer. Since 2015, he has contributed to more than 80 industry speaking and published articles. Ken holds a Master of Science in Computer Studies from the University of Essex; and a Master of Business Administration (eMBA) from the Nanyang Business School (a Nanyang Technological University and University of California, Berkeley joint programme).

    Abstract

    Despite the fact that the cybersecurity market is quite extensive, it is associated with the unfortunate fragmentation of antivirus software providers. Modern antivirus companies are characterised by a lack of flexibility and limited resources to provide more flexible and effective solutions. This is justified by the fact that developers are focused on eliminating existing viruses and not on prevention of future threats. Because of that virus databases update occurs with a significant delay and thus, undoubtedly, jeopardizes the users' computers security throughout the time until the update finally comes out.

    In this presentation, Ken Soh will share how blockchain technologies could be leveraged to address the above indicated issue and build a global AV mega platform in fulfilment of an unprecedented AV orchestration. Such innovation would bring about a constantly up-to-date distributed protection super-structure that is not just accessible to all but affordable and swift in addressing new threats and challenges, from home-based users to enterprises.

  • Dr Sanjeev Solanki
    Senior Researcher
    Acronis Asia Pte Ltd
    Date: 18 September 2018
    Time: 1420 – 1500 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Sanjeev Solanki is a Senior Researcher at Acronis Asia R&D with decade's long experience in data storage, protection and security technologies. He has led research into secure optical storage technologies and has acted as consultant on various data storage and security technologies and their application at cloud scale. Sanjeev as part of his work has been actively engaged in applied data science (AI) work in the areas of text mining, intelligent data storage, privacy-preserving learning and malware detection. Sanjeev is currently focusing on secure handling of digital data. In this regard, he is working with his team to realize a platform for "Secure and Privacy-Preserving Multi-party computation".

    Track

    Smart Nation

    Abstract

    Unconcealed data is necessary for computation today, but poses a nightmare since the number and sophistication of hacking events are growing. Enterprises have been extremely reluctant to share their private data online and rather keep valued and insightful data in safe silos.

    In coming years with Internet becoming deeply connected as efforts on IoT, SmartNation and Industry4.0 grows, how can we securely exchange and make use of the data with privacy-preserving measures in place? SMPC is an enabler technology that breaks these silos and facilitates collaborative computation (analytics) on the internet.

    Secure, privacy-preserving computation over concealed data market is expected to grow larger than the malware protection industry within the next decade.

  • Richard Sorosina
    Director of Solutions Architecture and Sales Engineering
    LogRhythm
    Date: 19 September 2018
    Time: 1120 – 1200 hrs
    Venue: MR300 - 302, Level 3
    Biography

    A veteran security technology expert, Richard Sorosina architects and delivers compelling solution designs to solve complex security challenges, while meeting end user organizations’ technical and business needs. With over a decade of security information and event management experience under his belt as well as fifteen years in the IT security industry, Richard is well-regarded as a security technology expert in the Asia Pacific region by his peers. Richard regularly speaks at security events, offering insights to both the end-user and partner communities on managing risks, incident response and compliance issues.

    Abstract

    The year 2017 has been dubbed the year of ransomware, and understandably so.  Hackers were both wide-reaching and fast in their infection of corporate systems with ransomware, disrupting not only business operations but also delaying healthcare treatment in hospitals worldwide.

    With malware still making up more than half of breaches according to a recent report, incident response teams find themselves needing to be all the more effective in detection, containment and remediation.

    Richard will discuss the types of attacks, nature of breaches and detection times of the past 12 months and provide insight into the maturity of incident response processes and functions spanning a variety of environments. He will also share ways enterprises can overcome hurdles faced to increase the efficiency of incident response teams and beat new tactics used by attackers.