Programme
Tracks

  • Big Data Analytics & Deep Machine Learning
    20 September 2018
    MR300 - 302, Level 3
    1030 – 1110
    AI for Next Generation Cyber Defence
    Walter Lee, NEC Corporation
    1110 – 1150
    SecOps in a World of Wirearchy: Security Automation & Machine Learning Across Organisational Boundaries
    Dr Lars ROSSEN, Micro Focus
    1150 – 1230
    Know Your Enemy: How to Build a Proactive Cyber Threat Intelligence and Threat Hunting Program
    Sidney PEARL, IBM Security
  • Cyber Operations & Response
    20 September 2018
    MR303 - 304, Level 3
    1600 - 1640
    Incident Response at the Board Level; Or How to Wrangle Executives
    Nick Savvides, Symantec
    1640 - 1720
    SOC How-To
    Gavin Reid, Recorded Future
  • Cyber Threat Landscape & Intelligence
    19 September 2018
    MR300 - 302, Level 3
    1120 - 1200
    Conquering Threat Actors with Automated Incident Response and Threat Intelligence
    Richard SOROSINA, LogRhythm
    1200 - 1240
    Insights on Threat Intelligence-Driven Network Security at Scale
    Dr Ruo ANDO, National Institute of Informatics
    Allan Thomson, LookingGlass Cyber Solutions
    1340 - 1420
    A Hit on One of Us, Is a Hit on All of Us: Threat Intelligence Sharing – Your How to Guide
    Sean Duca, Palo Alto Networks
    1420 - 1500
    BGP Route Hijacking - What Can Be Done Today?
    Barry Greene, Akamai Technologies
    1500 - 1540
    Organised Syndicates, the Defenders Way
    Nicky Fang, Arctic Security
  • Cybersecurity in the Cloud
    20 September 2018
    MR300 - 302, Level 3
    1330 - 1410
    Security or Cloud - Can You Have Both?
    1410 – 1450
    Securing the Cloud WITH the Cloud
    Jagdish MAHAPATRA, CrowdStrike Asia
    1450 – 1530
    Losing Money in the Cloud Without AI
    Justin PETERS, Deep Instinct
    1600 - 1640
    A Global View of Vulnerability Management
    1640 - 1720
    7 Steps to Addressing Your Cloud Risks
  • Cybersecurity Ops Centre: Methodologies & Operations
    18 September 2018
    MR303 - 304, Level 3
    1300 - 1340
    Collaborating with the Attackers: An Approach to Upgrade and Validate your SOC
    Vivek Chudgar, FireEye
    Atul Kanwal, FireEye
    1340 - 1420
    Advanced Cyber Security Operations - Lessons Learnt and Case Studies
    Colin Robertson, BAE Systems Applied Intelligence
    1420 - 1500
    Securing the Connected Citizen & Public Sector Digital Transformation
    1530 - 1610
    Creating the Agile SOC: Lessons Learned and What Does Good Look Like?
    Christopher Schueler, Trustwave, a Singtel company
    1610 – 1650
    The Artificial Reality of Cyber Defence
  • Darkweb, Cybercrime, Cyberwarfare
    19 September 2018
    MR300 - 302, Level 3
    1600 - 1640
    Best Practices in Public/Private Sector Collaboration to Fight Global Cybercrime
    Jon Clay, Trend Micro Inc.
    1640 - 1720
    Past, Present & Future of Credentials Theft
    Lavi Lazarovitz, CyberArk
  • Emerging Security Technology
    19 September 2018
    MR303 - 304, Level 3
    1120 - 1200
    How AI is Fueling the Cyber Security Revolution
    John Bloomer, Check Point Software Technologies
    1200 - 1240
    Software Supply Chain Management: Reducing Attack Vectors and Enabling Enterprise Cybersecurity
    Joe Jarzombek, Synopsys
    1340 - 1420
    Will AI Save or Kill Us in Cyber Security?
    Jonathan Phua, InsiderSecurity
    1420 - 1500
    Challenges of Blockchain Technology for the Enterprise
    Eugene Aseev, Chainstack
    1500 - 1540
    Goodbye Passwords and Keys in New Cloud Era
    Markku Rossi, SSH.COM
    1600 – 1640
    Future of Authentication
    Alex WILSON, Yubico
    1640 - 1720
    Communications Privacy in the Quantum Era
    Dr Alexander LING, Centre for Quantum Technologies, National University of Singapore
  • Enterprise Security & Data Protection: Trends & Technology
    18 September 2018
    MR300 - 302, Level 3
    1300 – 1340
    CNNVD: The Tangled Web of China's Veiled Vulnerability Database and How the CNNVD Is Actively Manipulated for Intelligence Operations
    Dr Christopher AHLBERG, Recorded Future
    1340 – 1420
    Countering Cyber Threats with Artificial Intelligence and Blockchain for Full Cyber Protection
    John Zanni, Acronis
    1420 – 1500
    Creation of a Global AV Super-Structure Incentivised via Blockchain Technologies
    Ken Soh, Athena Dynamics Pte Ltd
    1530 – 1610
    Let's Talk about Accelerating DevOps with SECURITY
    Jeff Williams, Contrast Security, Inc.
    1610 - 1650
    Proactive Actionable Defence in the Age of IoT-based Threats
    Boonchareon CHONG, A10 Networks
    1650 - 1730
    Applying AI to Practical Cyber Security
    Sean PEA, Darktrace
  • Internet of Things (IoT) Security
    20 September 2018
    MR303 - 304, Level 3
    1030 – 1110
    The Enterprise of Things, Hyper-connectivity Requires Ultra-security
    Nigel THOMPSON, BlackBerry
    1110 – 1150
    The Internet – Built to Outlast Nuclear War but Fails at Smart Toasters
    Florian Lukavsky, SEC Technologies GmbH
    1150 – 1230
    Snooping on Cellular Gateways and Their Critical Role in ICS
    Justin SHATTUCK, F5 Networks
    1330 - 1410
    AI Techniques for Cyber Intelligence Analytics
    Prof Kwok Yan LAM, Nanyang Technological University
    1410 - 1450
    Measuring Systemic Risk Level of IoT Adaption - Maintaining National Level IoT Inventory to Address the Common Mode Failure Risks
    Yurie ITO, CyberGreen Institute
    1450 - 1530
    IoT Security - Operational Perspectives
    Chuan Wei HOO, ST Electronics
  • Proactive Cyber Defence
    19 September 2018
    Auditorium, Hall 406, Level 4
    1120 – 1200
    How to Prevent Successful Cyber Attacks
    1200 - 1240
    Extending UEBA to Risk Adaptive Insight & Enforcement
    Homayun YAQUB, Forcepoint
    1340 - 1420
    Why Cyber Risk is the Key to Cyber Resilience
    Ian Yip, McAfee
    1420 - 1500
    Defending Infrastructure is Critical
    Kowsik Guruswamy, Menlo Security, Inc.
    1500 - 1540
    Ready to Discuss Approaches to Incident Response in the 4 Industries of Public Sector
    1600 – 1640
    Levelling the Cyber Playing Field with Proactive Cyber Defence
    Siang-tse FOO, Chief Executive Officer
    1640 - 1720
    Defending Against Modern Cyber Threats
    Drew SCHUIL, Imperva
  • Practical Perspectives and Insights from Real World Implementation in an End User Environment
    19 September 2018
    MR311, Level 3
    1340 - 1420
    Security Incident Response for the Cloud
    Ian LOE, Government Technology Agency
    1420 - 1500
    Deploying a Security Solution
    Michael GREGG, International Container Terminal Services Inc
    1500 - 1540
    Connecting & Protecting What Matters Most:  How Technology is No Longer Enough
  • Smart Nation
    18 September 2018
    Auditorium, Hall 406, Level 4
    1300 – 1340
    Combating Cyberthreats and Securing the Digital Nation
    1340 – 1420
    Cyber-physical Resilience and Security in Our Connected Digital Societies
    1420 – 1500
    Smart Nation Meets Privacy-preserving Analytics
    Dr Sanjeev SOLANKI, Acronis Asia Pte Ltd
  • Strengthening the Resiliency of the Cyberspace
    18 September 2018
    Auditorium, Hall 406, Level 4
    1530 - 1610
    Building a Foundation for Strengthened Cyber Resilience Through a More Globally Coordinated Approach
    Dr Gregory RATTRAY, JPMorgan Chase
    1610 - 1650
    Using Machine Learning and Threat Intelligence to Detect What You Can’t See
    Dr David MCGREW, Cisco - Advanced Security Research & Government
    1650 - 1730
    Business Resilience in Digital Transformation Through Security
    Malcolm Bailie, NTT Security

Note: Programme is accurate at time of publication and subject to change.