Tracks

  • Advanced Identity Management and the Zero Trust Environment in Perimeter Security and Access Management
    2 October 2019
    1340 - 1420
    Win the Cyberwar with Zero Trust
    Auditorium, Hall 406, Level 4
    Sean DUCA, Palo Alto Networks
    1420 - 1500
    With Great Connectivity Comes Great Responsibility
    Auditorium, Hall 406, Level 4
    John Walsh, BlackRidge Technology
    1500 - 1540
    Building Trust, in the Age of Deceit
    Auditorium, Hall 406, Level 4
    1600 - 1640
    Seven Deadly Sins of Access Management in Cyber Security
    Auditorium, Hall 406, Level 4
    Markku Rossi, SSH.COM
    1640 - 1720
    Identity at the Center of a Zero Trust Network: Taking a Governance-based Approach to Security
    Auditorium, Hall 406, Level 4
    Darran Rolls, SailPoint Technologies
  • Cyber Operations & Response
    1 October 2019
    1300 – 1340
    Deception Affinity: The Science of Attacker Seduction
    MR311, Level 3
    Dr Abdul Rahman, Fidelis Cybersecurity
    1340 – 1420
    Using SOAR Technology to Enable Efficient Incident Response Collaboration
    MR311, Level 3
    Dan Sarel, Palo Alto Networks
    1420 - 1500
    Attacker Campaign Identification
    MR311, Level 3
  • Cyber Threat Landscape & Intelligence
    2 October 2019
    1120 - 1200
    Developing Real-time Hyper-localised Threat Intelligence to Counter Advanced and Targeted Threats
    MR300 - 301, Level 3
    Dr Woo Lip Lim, Ensign InfoSecurity
    1200 - 1240
    Autonomous Response AI: The Machine Fights Back
    MR300 - 301, Level 3
    Huili Wang, Darktrace
    1340 - 1420
    A Closer Look at Magecart and Browser Based Attacks
    MR300 - 301, Level 3
    Hans Barré, RiskIQ
    1420 - 1500
    Cyber Threat Intelligence Frameworks
    MR300 - 301, Level 3
    Dr Irving Lachow, The MITRE Corporation
    1500 - 1540
    Using Cyber Intelligence to Stay Ahead of the Changing Threat Landscape; A User's Perspective
    MR300 - 301, Level 3
  • Cybersecurity and 5G
    1 October 2019
    1300 - 1340
    Securing the 5th Dimension - 5G and Industry 4.0
    MR303 - 304, Level 3
    Walter Lee, NEC Corporation
    1340 - 1420
    Security Challenges in 5G
    MR303 - 304, Level 3
    Asha Hemrajani, visioclara.tech
    1420 - 1500
    Protecting Our National Networks and CNI
    MR303 - 304, Level 3
    Rohit Singh, Telesoft Technologies Ltd
  • Cybersecurity in the Cloud
    1 October 2019
    1530 - 1610
    Secure Cloud Transformation with Network Isolation
    MR303 - 304, Level 3
    Kowsik Guruswamy, Menlo Security
    1610 - 1650
    Adopting a Trust-centric Approach in a Hybrid and Multicloud Environment
    MR303 - 304, Level 3
    Stephen Dane, Cisco Systems
    1650 - 1730
    Managing Your Risk in the Cloud
    MR303 - 304, Level 3
  • Cybersecurity Ops Centre: Methodologies & Operations
    2 October 2019
    1120 - 1200
    Essential Considerations When Developing a Cybersecurity Visibility and Control Strategy?
    MR303 - 304, Level 3
    Steve Redman, Forescout Technologies
    1200 - 1240
    Measure and Mature: Security Operations Under the Spotlight
    MR303 - 304, Level 3
    Chris Petersen, LogRhythm
    1340 - 1420
    Maturity of Security Operations Centre and Analytics for Insider Threat Detection
    MR303 - 304, Level 3
    Niel Pandya, Micro Focus
    1420 - 1500
    Building a World Class Threat Hunting Team
    MR303 - 304, Level 3
    Michael Sentonas, CrowdStrike
    1500 - 1540
    Securing the Connected Citizen and Public Sector Digital Transformation
    MR303 - 304, Level 3
  • Darkweb, Cybercrime, Cyberwarfare
    2 October 2019
    1600 - 1640
    Understanding the Gangs of the Cyber Underground
    MR300 - 301, Level 3
    Ziv Mador, Trustwave
    1640 - 1720
    Automated Attribution of Cybercrime Using Bitcoin Distributed Ledgers
    MR300 - 301, Level 3
  • Enterprise Security and Data Protection: Trends & Technologies
    2 October 2019
    1600 - 1640
    Cross Domain Solutions Quo Vadis?
    MR303 - 304, Level 3
    1640 - 1720
    Protect Your Critical Assets from the Ever-changing Attacks of Cybercriminals
    MR303 - 304, Level 3
    Kunal Anand, Imperva
  • Incident Response, Investigations, Forensics and Recovery
    3 October 2019
    1120 - 1155
    Premediation: The Art of Proactive Remediation
    MR308, Level 3
    Steven D'SA, Fireye
    1155 - 1230
    Hidden Treasures In Your Backups: Novel Approach to Complex Attacks Detection
    MR308, Level 3
    Oleg Ishanov, Acronis
    1230 - 1305
    The Industrialisation of Red and Blue Teaming
    MR308, Level 3
    Brian Contos, Verodin
  • Industrial Control Systems (ICS): Vulnerabilities & Resiliency
    3 October 2019
    1405 - 1440
    Tearing Down a Building Network Using IoT Devices
    Auditorium, Hall 406, Level 4
    Ellen Sundra, Forescout Technologies
    1440 - 1515
    Cyber Security in Perspective: The Intertwined Disciplines of SecOps, DevOps and ITOps
    Auditorium, Hall 406, Level 4
    Ken Soh, Athena Dynamics Pte Ltd
    1515 - 1550
    Analytics and Threat Intelligence for Innovative Cybersecurity Solutions
    Auditorium, Hall 406, Level 4
    1610 - 1645
    IT-OT Convergence in ICS Cyber Defense
    Auditorium, Hall 406, Level 4
    Dr Terence Liu, Trend Micro
    1645 - 1720
    The Unique Risks of Industrial Control Systems
    Auditorium, Hall 406, Level 4
    Kevin O'Leary, Palo Alto Networks
  • Leveraging Machine Learning, Automation and AI in Next Gen Cybersecurity
    1 October 2019
    1300 – 1340
    The Future of Security - How AI Will Liberate Us
    MR300 - 302, Level 3
    John McClurg, BlackBerry Cylance
    1340 – 1420
    Rise of the Machines - Artificial Intelligence and Its Impact on Security
    MR300 - 302, Level 3
    Justin Hammond, Checkmarx
    1420 – 1500
    How Data Science Turns Human Behaviour Research into Cybersecurity Trust
    MR300 - 302, Level 3
    Nicolas Fischbach, Forcepoint
    1530 – 1610
    Root of Trust or Chain of Trust for Critical Cyber Systems
    Auditorium, Hall 406, Level 4
    Prof. Kwok Yan Lam, Nanyang Technological University
    1610 - 1650
    Using Machine Learning to Uncover Threats and Risk in Privileged Access
    Auditorium, Hall 406, Level 4
    Serkan Cetin, One Identity
    1650 - 1730
    How Machine Learning is Changing the SOC
    Auditorium, Hall 406, Level 4
    3 October 2019
    1120 - 1155
    A.I.: Cybersecurity Friend or Foe?
    Auditorium, Hall 406, Level 4
    1155 - 1230
    Hacker’s Coding Ethics Cracked via the DNA of Malware
    Auditorium, Hall 406, Level 4
    Edwin Doyle, Check Point Software Technologies Ltd
    1230 - 1305
    Practical Journey to Building a Scalable, Data-driven Cybersecurity Strategy with Automation and Orchestration
    Auditorium, Hall 406, Level 4
  • Proactive Cyber Defence
    1 October 2019
    1530 - 1610
    Patching Makes Perfect: How Patch Management and Good Cyberhygiene Can Help Keep Your Data Secure
    MR311, Level 3
    Tim Brown, SolarWinds
    1610 - 1650
    Active Defence – Empowering Cyber Resilience
    MR311, Level 3
    Eng Choon Goh, ST Engineering Electronics
    1650 - 1730
    What Ails My Peers Today Could be My Ailments Tomorrow
    MR311, Level 3
    Marc Light, BitSight Technologies
  • Security by Design: Risk Assessment, Avoidance and Mitigation
    3 October 2019
    1405 - 1440
    Why a Transformation in Security Ops is Needed to Get Ahead in Combating Cybersecurity Risk
    MR308, Level 3
    Yair BarTouv, CyberProof Inc.
    1440 - 1515
    A Tactical Approach to Risk Management
    MR308, Level 3
    Hugh Barrett, Telos Corporation
    1515 - 1550
    Secretless – A New Approach to Application Credentials
    MR308, Level 3
  • Strengthening the Resiliency of the Cyberspace
    1 October 2019
    1530 - 1610
    Fileless and Silent: The Threat Actors Moving Through Your Supply Chain
    MR300 - 302, Level 3
    1610 - 1650
    Hacker or Hollywood?
    MR300 - 302, Level 3
    JP Dunning, McAfee
    1650 - 1730
    A Robust and Flexible Regulatory Framework for the Management of Aviation Information Security Risks
    MR300 - 302, Level 3
    Juan Anton, European Union Aviation Safety Agency
  • Supply Chain Cybersecurity
    2 October 2019
    1120 - 1200
    The Hidden Threat: Compromised Supply Chains
    Auditorium, Hall 406, Level 4
    1200 - 1240
    DevOps and Supply Chain Security in the Modern World
    Auditorium, Hall 406, Level 4
    Nick Savvides, Symantec
  • Talent & Capability Development
    3 October 2019
    1610 - 1645
    How to be Awesome at Your Job and Get Paid More – A Study of Cyber Responsibility and Talent
    MR308, Level 3
    Ian Yip, Avertro
    1645 - 1720
    Future of Cyber Security Talent
    MR308, Level 3
    Juliana Lim, SGInnovate
  • Vulnerability and Exploit Management in An Age of Increasing Zero Day Attacks
    2 October 2019
    1120 - 1200
    Is Your Tuesday Patched Enough? An Analysis of Microsoft Security Updates in 2018
    MR302, Level 3
    Brian Chappell, BeyondTrust
    1200 - 1240
    Prioritising Risk in an Age of Exploding Modern Assets
    MR302, Level 3
    Dick Bussiere, Tenable

Note: Programme is accurate at time of publication and subject to change.