Upload
neelabh-rai
View
1.544
Download
8
Tags:
Embed Size (px)
DESCRIPTION
The latest brochure of the International Conference of Cyber Security Asia, Singapore (8 - 11 November, 2011).The last page of registration is intentionally removed from the brochure. For that one, please download it from http://www.cybersecurity-asia.com/On 8 November, 2011 and 11 November, 2011 there are two full-day workshops (pre-conference and post-conference, respectively) organized by Cyber Security Forum Initiative (CSFI), US and Microsoft.If someone is interested to attend the conference, then do not delay anymore as the dates are now too close. Just send an email to LAURA GREEN:lgreen AT smi-online DOT sg
Citation preview
www.cybersecurity-asia.com Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +65 664 990 94 or +44 (0) 870 9090 712 or call +65 664 990 95/96 or +44 (0) 870 9090 711
Wing Commander Tom Parkhouse,Cyber Security Strategy Staff Officer,Ministry of Defence, UK
OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES:
Major (Ret’d) Manik M Jolly, Commander
Cyber Security Cell, Indian Army
Bernie Trudel, Chairman, Asia Cloud ComputingAssociation
Xundi Zhang, Founder, XFocus, China
Iftekharul Bashar, Senior Analyst,International Centre for PoliticalViolence and Terrorism Research,Singapore
Neelabh Rai, Independent Cyber Security
Researcher, Cyber Cops, India
Ammar Jaffri, Chief Executive, PakistanInformation Security Association(PISA)
Michael Rothery, First AssistantSecretary, National Security ResilienceDivision, Australian Government
Dr Goh Shen Tat, Assistant DepartmentHead, Cryptography and Security ResearchGroup, Institute for Infocomm Research(I2R), Agency for Science Technology andResearch (A*STAR), Singapore
Sazali Sukardi, Head, Strategic PolicyResearch, CyberSecurity Malaysia
• Introducing the leading forum for Cyber Security Professionals in Asia
CONFERENCE HIGHLIGHTS:
C ase studies fromInternational CyberCommands
Your chance to assess howCyber Terrorism andRadicalisation throughsocial networking is beingused across Asia Pacific
B e involved in ourinteractive paneldiscussions and workinggroups and get youropinion across to thepeople that matter
E nter into sessions focusingon National Capabilitiesand Protecting CriticalNational Infrastructure
R each out and networkwith your industry peersand leave having forgednew working relationshipsand strengthened yourcurrent ones!
PLUS ONE FULL DAY PRE-CONFERENCE WORKSHOP AND ONE FULL DAY POST-CONFERENCE WORKSHOP:
Preparing for the Next Cyber Attack…Friday 11th November
Cyber Games and the Operational Application toCyber SecurityTuesday 8th November
In Association with: In Association with:
Cyber Security ASIA
9th & 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore
GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FORSERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR
Lead Sponsor: Sponsored by:
ConferenceKnowledgePartners:
A B
DAY ONE Wednesday 9th November 2011
8:30 Registration and Coffee
9:00 Chairman's Opening Remarks
Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
Ministry of Defence, UK
9:10 GUEST OF HONOUR OPENING ADDRESS
Building a Secure and Connected Future
• Investing in information security competencies/expertise
• Qualified information security professionals for Singapore
• Everyone has a part to play
• Conclusions
Senior Representative, Agency for Science, Technology and Research
(A*STAR), Singapore
9:40 KEYNOTE ADDRESS
The Global Cyber Security Challenge
Michael Wilks, Regional Director, Public Safety and National Security
APAC, Microsoft
10:20 SCENARIO CYBER ATTACK
Cyber Attack – Is it an Act of War?
This session will be run by Microsoft – a large multinational
company/government is being hit by a Cyber Attack what are the
options to respond to this attack? This is the opportunity for the
audience to engage with each other to discuss potential counter
measures to a cyber attack.
Michael Wilks, Regional Director, Public Safety and National Security
APAC, Microsoft
11:00 Networking Coffee Break
INTERNATIONAL CYBER COMMANDS AND NATIONAL CAPABILITIES
11:30 SPECIAL ADDRESS
Military Cyber Commands – An Overview
Many nations have been surging their efforts to meet the national
security challenges, still largely unknown, of conflict in cyber space. This
presentation will survey and compare these national efforts with a focus
on military cyber commands: which nations have them, what missions
they are likely to engage in, and the implications for the rest of us.
Jason Healy, Executive Director, Cyber Conflict Studies Association
12:00 KEYNOTE ADDRESS
USCYBERCOM – An Insight
• The US CYBERCOM - An overview
• Conducting full spectrum military cyberspace operations in order to
enable actions in all domains
• Ensuring US/Allied freedom of action in cyberspace
• Training at the centre
• Recent operations and lessons learned
Colonel Robert Morris, Director, 24 AF (AF CYBER) Air Component
Coordination Element to US Cyber Command (USCYBERCOM)*
12:30 Update on the UK’s National Cyber Security Programme
• The UK’s National Cyber Crime Strategy
• The UK’s ability to detect and defend against cyber attacks from
terrorists, states, and other hostile actors
• Emerging threat of cyber-attacks against Britain’s infrastructure
• An insight into the UK Defence Cyber Operations Group
• Interoperability and collaboration with industry to address weaknesses
in cyber security defence of critical infrastructure
• Cooperation in cyber security defence with the United States and other
“like-minded nations”
Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
Ministry of Defence, UK
1:00 Networking Lunch
2:00 The Chinese Cyber Security Strategy
• Overview and insight into activities into Chinese Security Team
• Cyber security, policies, standards and regulations in China
• Underground economy on the Chinese cyber programme
• The security landscape in China
Xundi Zhang, Founder, XFocus,
China
2:30 Best Practice Cyber Defence, Based on Network Intelligence and
Communications Metadata
• The challenges of government cyber defense
• Detecting cyber threats by scanning traffic
• Using DPI & Network Intelligence to build a second line of cyber
defense
• Examples of technical implementations
• Using communication metadata to detect suspicious traffic
Emmanuel Roger, Vice President Sales Asia Pacific & Japan,
Qosmos
3:00 Networking Coffee Break
STRATEGIES AND PROGRAMMES
3:30 Analysing Open Source Cyber Intelligence
• The importance of open source intelligence
• Information sharing among professionals involved in corporate security,
information security, and the intelligence community
• Utilisation of open source data to protect physical assets and individuals
• Identify sensitive information that has been compromised, malware,
phishing, identity theft, and related subject matter
Paul de Souza, Owner, Cyber Security Forum Initiative (CSFI)
4:00 Cloud Computing in Asia – An Introduction
• Regional issues of regulation and policy
• Security infrastructure and awareness
• Collaboration and innovation
Bernie Trudel, Chairman, Asia Cloud Computing Association
4:30 Cloud Reality – Dispelling the Myths
• The cold hard facts of cloud computing today
• Defining the private cloud vs public vs hybrid
• How secure is cloud?
Aloysius Cheang, APAC Strategy Advisor, Cloud Security Alliance
5:00 Conclusions and Key Talking Points from Day One
Michael Wilks, Regional Director, Public Safety and National Security
APAC, Microsoft
5:15 Chairman’s Closing Remarks and Close of Day One
5:30 Networking Drinks Reception
Sponsored by
Register online at www.cybersecurity-asia.com • Alternatively fax your registration
DAY TWO Thursday 10th November 2011
*subject to final confirmation
8:30 Registration and Coffee
9:00 Chairman's Opening Remarks
Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
Ministry of Defence, UK
9:10 KEYNOTE ADDRESS
Australia’s Cyber Security Capabilities
• Coordinating operational responses to cyber events of national
importance across government and critical infrastructure
• An overview of operations in the CSOC – Cyber Security Operations
Centre
• Creating an integrated whole-of-government approach on cyber
security
• Information Security (InfoSec) role
Michael Rothery, First Assistant Secretary, National Security Resilience
Division, Australian Government
CYBER TERRORISM
9:50 PANEL DISCUSSION
What Constitutes Cyber Terrorism? Fact vs. Fiction
Chairman:
Michael Wilks, Regional Director, Public Safety and National Security
APAC, Microsoft
Panellists:
Neelabh Rai, Independent Cyber Security Researcher,
Cyber Cops, India
Ammar Jaffri, Chief Executive,
Pakistan Information Security Association (PISA)
Sazali Sukardi, Head, Strategic Policy Research,
CyberSecurity Malaysia
Iftekharul Bashar, Senior Analyst, International Centre for Political
Violence and Terrorism Research, Singapore
Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,
Indian Army
10:50 Networking Coffee Break
11:20 Cyber Cops at the Crossroads of Cyber Hypnotism and Cyber Warfare –
Indian Perspective
• An overview of the Indian Cyber Cops
• Cyber terrorism in India – Tackling the asymmetric threat
• Comprehensive Online Proactive Security
• Liberty is the price of vigilance
Neelabh Rai, Independent Cyber Security Researcher,
Cyber Cops, India
11:50 Cyber Warfare and Pakistan – An Operational Assessment
• The cyber security programme in Pakistan
• The internet as a tool for radicalisation
• Organisational set up to counter the threat
• The Facebook explosion in Pakistan – Terrorist threats and implications
• Understanding the challenges and overcoming them
• Lessons learned and aims for the future
Ammar Jaffri, Chief Executive, Pakistan Information Security Association
(PISA)
12:20 The Cyber Defence Cell in Malaysia
• The current cyber security threat in Malaysia
• Terrorism vs. Cyber terrorism
• Malaysia’s critical national information infrastructure
• The use of ICT and cyberspace by terrorist
Sazali Sukardi, Head, Strategic Policy & Research Department,
CyberSecurity Malaysia
12:50 Networking Lunch
1:50 The Facebook Jihad - Radicalisation through Social Networking
• A social network for jihad?
• The newest face of terrorist and extremist use of the internet
• The potential for misuse
• Cyber radicalisation vs. Social networking
• The Power of Facebook
• Facing the new challenge
Iftekharul Bashar, Senior Analyst, International Centre for Political
Violence and Terrorism Research, Singapore
2:20 Social Engineering – Context and Update
• Meaning and implications in current scenario
• Threat as a victim
• Advantages as a user
• Corporate lessons to be learnt
• Successful cases with modus operandi explained in detail
Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,
Indian Army
2:50 Networking Coffee Break
PROTECTING CRITICAL NATIONAL INFRASTRUCTURE
3:10 Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare
• The first recognised cyber weapon
• Designed to target critical national infrastructure
• Operating through external Programmable Logic Controllers (PLCs)
• Operational case studies – Attacks against Iran, Russia and Kazakhstan
• Identifying the perpetrators
• A new era in which cyber warfare is no longer theoretical and action
and discussion is vital to ensure the protection of critical infrastructure
on a global scale
Speaker Details to be Announced
3:40 The Possible Risks and Protection needed for Smart Grid Communication
• Advance Smart Security Research and Development
• Gaining access to grid-controlling networks
• Intelligence required: HUMINT (human intelligence), IMINT (imagery
intelligence), SIGINT (signals intelligence) and MASINT (measurement
and signature intelligence)
• Countering the threat - A strong intelligence presence inside our critical
infrastructure systems
Dr Goh Shen Tat, Assistant Department Head, Cryptography and Security
Research Group, Institute for Infocomm Research (I2R), Agency for Science
Technology and Research (A*STAR), Singapore
4:10 Chairman's Closing Remarks and Close of Conference
n to +65 664 990 94 or call +65 664 990 95/96 • GROUP DISCOUNTS AVAILABLE •
Cyber Games and the Operational Applicationto Cyber Security
About your workshop leaders:
Colonel (Ret’d) Marc Jamison graduated fromTexas A&M and was commissioned into the USAF.He is a combat aviator, having flown the B-52 andB-1 bombers. Col Jamison is a USAF weapon schoolgraduate and has led multiple divisions in AirOperations Centers. He holds 4 Master degrees toinclude one from the School of Advanced Air andSpace Studies and the US Army War College.Recently, he was the Director of Operations forJoint Functional Component Command NetworkWarfare, Director of Future Operations and Chiefof Modeling and Simulation for US CYBERCommand.
Paul de Souza is the Founder/President/Director ofCSFI (Cyber Security Forum Initiative) and itsdivisions CSFI-CWD (Cyber Warfare Division) andCSFI-LPD (Law and Policy Division). CSFI is a non-profit organization with headquarters in Omaha,NE and offices in the DC area. Paul has over 12years of cyber security experience and has workedas a Chief Security Engineer for AT&T where hedesigned and approved secure networks for MSS.Paul has also consulted for several governments,military and private institutions on best networksecurity practices and cyber warfare capabilities,leading a group of more than 9000 cyber securityprofessionals.
In association with:
Preparing for the Next Cyber Attack…
POST-CONFERENCE WORKSHOP B 11TH NOVEMBER 2011
In association with:
PRE-CONFERENCE WORKSHOP A 8TH NOVEMBER 2011
In association with:
Benefits of Attending:• Recognise how information systems can be subjected to
cyber attacks and the impact of these attacks ongovernment services, economy and social aspects of society
• Enhance your knowledge of potential security controls orcountermeasures that can be implemented to mitigate therisk of a potential cyber attack
• Be aware of the actions that can be performed once asystem is compromised
Benefits of Attending:This hands-on interactive workshop is designed to helpthe audience members understand the value of cybergames and how to develop a customized cyber gamesprogram in their organizations. The workshop will givethe attendees the ability to follow a cyber gamesframework, which can greatly improve the cybersecurity posture of any organization or cyber command.
Programme08.30 Registration and Coffee09.00 History of war games09.30 Definitions and differences between an
exercise, training, war game, etc.10.00 History of cyber games10.30 Morning Coffee11.00 Definitions and differences between cyber
games, cyber exercises, etc.12.00 Current cyber games platforms and the
applicability to organizations13.00 Networking Lunch14.00 Creating a cyber game culture (boosting
hands-on skills of your IT security team)15.00 Cyber games operations and framework
(hands-on group exercise)15.30 Afternoon Tea16.00 US Department of Defense and NATO cyber
games initiatives16.30 Q & A sessions17.00 Close of Workshop
Why Attend this Workshop?• Learn about how to protect critical information
systems and network infrastructure from cyber attacksand fully understand which can be launched againstthe industrial control systems used to protect criticalinfrastructure
• See how cyber attacks are launched against criticalinformation systems and network infrastructure
• Understand how to apply technical and administrativecontrols to mitigate critical systems and networksfrom future attacks
Workshop Key Objectives:• Analyse the key aspects of the cyber security as it
relates to protection, detection, respond and recovery • Discuss how cyber attackers exploit current system
vulnerabilities • Review what Microsoft and other vendors have done
to identify and attempt to prevent cyber attacks onsystems
• Evaluate various administrative and technical securitycontrols that can be used to mitigate future cyberattacks
8:30 Registration and Coffee9:00 Session 110:30 Networking Coffee Break11:00 Session 212:30 Networking Lunch Break1:30 Session 33:00 Networking Coffee Break3:30 Session 45:00 Q&A5:30 Close of Workshop
Register online at www.cybersecurity-asia.com
Microsoft provides software and services that help people communicate, do their work, beentertained, and manage their personal lives. Over the past 30 years, innovative technology hastransformed how we access and share information, changed the way businesses and institutionsoperate, and made the whole smaller by giving us instant access to people and resourceseverywhere. Microsoft works closely with public and private sector partners throughout AsiaPacific to help enterprise customers, governments, educational institutions and nongovernmentalbodies meet business, social and economic challenges and realize the potential of theirorganizations and their people. Our commitment to the region is reflected by the thousands ofdevelopers, resellers, independent software vendors, and small and medium-sized enterpriseswhose goals for growth and greater business efficiency has been made possible by Microsofttechnology. www.microsoft.com
The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha,NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, andsecurity solutions through collaboration, education, volunteer work, and training to assist the USGovernment, US Military, Commercial Interests, and International Partners." CSFI was born out ofthe collaboration of dozens of experts, and today CSFI is comprised of a large community of nearly5000 Cyber Security and Cyber Warfare professionals from the government, military, private sector,and academia. Our amazing members are the core of all of our activities, and it is for them thatwe are pushing forward our mission. www.csfi.us
The Agency for Science, Technology and Research (A*STAR) is the lead agency for fostering world-class scientific research and talent for a vibrant knowledge-based and innovation-drivenSingapore. A*STAR supports Singapore's key economic clusters by providing intellectual, humanand industrial capital to its partners in industry. It also supports extramural research in theuniversities, hospitals, research centres, and with other local and international partners. www.a-star.edu.sg
Conference and Exhibition Supported By:
Lead Sponsor:
Conference KnowledgePartners: