5
www.cybersecurity-asia.com Register online and receive full information on all of SMi’s conferences Alternatively fax your registration to +65 664 990 94 or +44 (0) 870 9090 712 or call +65 664 990 95/96 or +44 (0) 870 9090 711 Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer, Ministry of Defence, UK OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES: Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell, Indian Army Bernie Trudel, Chairman, Asia Cloud Computing Association Xundi Zhang, Founder, XFocus, China Iftekharul Bashar, Senior Analyst, International Centre for Political Violence and Terrorism Research, Singapore Neelabh Rai, Independent Cyber Security Researcher, Cyber Cops, India Ammar Jaffri, Chief Executive, Pakistan Information Security Association (PISA) Michael Rothery, First Assistant Secretary, National Security Resilience Division, Australian Government Dr Goh Shen Tat, Assistant Department Head, Cryptography and Security Research Group, Institute for Infocomm Research (I2R), Agency for Science Technology and Research (A*STAR), Singapore Sazali Sukardi, Head, Strategic Policy Research, CyberSecurity Malaysia Introducing the leading forum for Cyber Security Professionals in Asia CONFERENCE HIGHLIGHTS: C ase studies from International Cyber Commands Y our chance to assess how Cyber Terrorism and Radicalisation through social networking is being used across Asia Pacific B e involved in our interactive panel discussions and working groups and get your opinion across to the people that matter E nter into sessions focusing on National Capabilities and Protecting Critical National Infrastructure R each out and network with your industry peers and leave having forged new working relationships and strengthened your current ones! PLUS ONE FULL DAY PRE-CONFERENCE WORKSHOP AND ONE FULL DAY POST-CONFERENCE WORKSHOP: Preparing for the Next Cyber Attack… Friday 11th November Cyber Games and the Operational Application to Cyber Security Tuesday 8th November In Association with: In Association with: Cyber Security ASIA 9th & 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR Lead Sponsor: Sponsored by: Conference Knowledge Partners: A B

Cyber Security Asia, Singapore

Embed Size (px)

DESCRIPTION

The latest brochure of the International Conference of Cyber Security Asia, Singapore (8 - 11 November, 2011).The last page of registration is intentionally removed from the brochure. For that one, please download it from http://www.cybersecurity-asia.com/On 8 November, 2011 and 11 November, 2011 there are two full-day workshops (pre-conference and post-conference, respectively) organized by Cyber Security Forum Initiative (CSFI), US and Microsoft.If someone is interested to attend the conference, then do not delay anymore as the dates are now too close. Just send an email to LAURA GREEN:lgreen AT smi-online DOT sg

Citation preview

Page 1: Cyber Security Asia, Singapore

www.cybersecurity-asia.com Register online and receive full information on all of SMi’s conferences

Alternatively fax your registration to +65 664 990 94 or +44 (0) 870 9090 712 or call +65 664 990 95/96 or +44 (0) 870 9090 711

Wing Commander Tom Parkhouse,Cyber Security Strategy Staff Officer,Ministry of Defence, UK

OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES:

Major (Ret’d) Manik M Jolly, Commander

Cyber Security Cell, Indian Army

Bernie Trudel, Chairman, Asia Cloud ComputingAssociation

Xundi Zhang, Founder, XFocus, China

Iftekharul Bashar, Senior Analyst,International Centre for PoliticalViolence and Terrorism Research,Singapore

Neelabh Rai, Independent Cyber Security

Researcher, Cyber Cops, India

Ammar Jaffri, Chief Executive, PakistanInformation Security Association(PISA)

Michael Rothery, First AssistantSecretary, National Security ResilienceDivision, Australian Government

Dr Goh Shen Tat, Assistant DepartmentHead, Cryptography and Security ResearchGroup, Institute for Infocomm Research(I2R), Agency for Science Technology andResearch (A*STAR), Singapore

Sazali Sukardi, Head, Strategic PolicyResearch, CyberSecurity Malaysia

• Introducing the leading forum for Cyber Security Professionals in Asia

CONFERENCE HIGHLIGHTS:

C ase studies fromInternational CyberCommands

Your chance to assess howCyber Terrorism andRadicalisation throughsocial networking is beingused across Asia Pacific

B e involved in ourinteractive paneldiscussions and workinggroups and get youropinion across to thepeople that matter

E nter into sessions focusingon National Capabilitiesand Protecting CriticalNational Infrastructure

R each out and networkwith your industry peersand leave having forgednew working relationshipsand strengthened yourcurrent ones!

PLUS ONE FULL DAY PRE-CONFERENCE WORKSHOP AND ONE FULL DAY POST-CONFERENCE WORKSHOP:

Preparing for the Next Cyber Attack…Friday 11th November

Cyber Games and the Operational Application toCyber SecurityTuesday 8th November

In Association with: In Association with:

Cyber Security ASIA

9th & 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore

GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FORSERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR

Lead Sponsor: Sponsored by:

ConferenceKnowledgePartners:

A B

Page 2: Cyber Security Asia, Singapore

DAY ONE Wednesday 9th November 2011

8:30 Registration and Coffee

9:00 Chairman's Opening Remarks

Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,

Ministry of Defence, UK

9:10 GUEST OF HONOUR OPENING ADDRESS

Building a Secure and Connected Future

• Investing in information security competencies/expertise

• Qualified information security professionals for Singapore

• Everyone has a part to play

• Conclusions

Senior Representative, Agency for Science, Technology and Research

(A*STAR), Singapore

9:40 KEYNOTE ADDRESS

The Global Cyber Security Challenge

Michael Wilks, Regional Director, Public Safety and National Security

APAC, Microsoft

10:20 SCENARIO CYBER ATTACK

Cyber Attack – Is it an Act of War?

This session will be run by Microsoft – a large multinational

company/government is being hit by a Cyber Attack what are the

options to respond to this attack? This is the opportunity for the

audience to engage with each other to discuss potential counter

measures to a cyber attack.

Michael Wilks, Regional Director, Public Safety and National Security

APAC, Microsoft

11:00 Networking Coffee Break

INTERNATIONAL CYBER COMMANDS AND NATIONAL CAPABILITIES

11:30 SPECIAL ADDRESS

Military Cyber Commands – An Overview

Many nations have been surging their efforts to meet the national

security challenges, still largely unknown, of conflict in cyber space. This

presentation will survey and compare these national efforts with a focus

on military cyber commands: which nations have them, what missions

they are likely to engage in, and the implications for the rest of us.

Jason Healy, Executive Director, Cyber Conflict Studies Association

12:00 KEYNOTE ADDRESS

USCYBERCOM – An Insight

• The US CYBERCOM - An overview

• Conducting full spectrum military cyberspace operations in order to

enable actions in all domains

• Ensuring US/Allied freedom of action in cyberspace

• Training at the centre

• Recent operations and lessons learned

Colonel Robert Morris, Director, 24 AF (AF CYBER) Air Component

Coordination Element to US Cyber Command (USCYBERCOM)*

12:30 Update on the UK’s National Cyber Security Programme

• The UK’s National Cyber Crime Strategy

• The UK’s ability to detect and defend against cyber attacks from

terrorists, states, and other hostile actors

• Emerging threat of cyber-attacks against Britain’s infrastructure

• An insight into the UK Defence Cyber Operations Group

• Interoperability and collaboration with industry to address weaknesses

in cyber security defence of critical infrastructure

• Cooperation in cyber security defence with the United States and other

“like-minded nations”

Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,

Ministry of Defence, UK

1:00 Networking Lunch

2:00 The Chinese Cyber Security Strategy

• Overview and insight into activities into Chinese Security Team

• Cyber security, policies, standards and regulations in China

• Underground economy on the Chinese cyber programme

• The security landscape in China

Xundi Zhang, Founder, XFocus,

China

2:30 Best Practice Cyber Defence, Based on Network Intelligence and

Communications Metadata

• The challenges of government cyber defense

• Detecting cyber threats by scanning traffic

• Using DPI & Network Intelligence to build a second line of cyber

defense

• Examples of technical implementations

• Using communication metadata to detect suspicious traffic

Emmanuel Roger, Vice President Sales Asia Pacific & Japan,

Qosmos

3:00 Networking Coffee Break

STRATEGIES AND PROGRAMMES

3:30 Analysing Open Source Cyber Intelligence

• The importance of open source intelligence

• Information sharing among professionals involved in corporate security,

information security, and the intelligence community

• Utilisation of open source data to protect physical assets and individuals

• Identify sensitive information that has been compromised, malware,

phishing, identity theft, and related subject matter

Paul de Souza, Owner, Cyber Security Forum Initiative (CSFI)

4:00 Cloud Computing in Asia – An Introduction

• Regional issues of regulation and policy

• Security infrastructure and awareness

• Collaboration and innovation

Bernie Trudel, Chairman, Asia Cloud Computing Association

4:30 Cloud Reality – Dispelling the Myths

• The cold hard facts of cloud computing today

• Defining the private cloud vs public vs hybrid

• How secure is cloud?

Aloysius Cheang, APAC Strategy Advisor, Cloud Security Alliance

5:00 Conclusions and Key Talking Points from Day One

Michael Wilks, Regional Director, Public Safety and National Security

APAC, Microsoft

5:15 Chairman’s Closing Remarks and Close of Day One

5:30 Networking Drinks Reception

Sponsored by

Register online at www.cybersecurity-asia.com • Alternatively fax your registration

Page 3: Cyber Security Asia, Singapore

DAY TWO Thursday 10th November 2011

*subject to final confirmation

8:30 Registration and Coffee

9:00 Chairman's Opening Remarks

Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,

Ministry of Defence, UK

9:10 KEYNOTE ADDRESS

Australia’s Cyber Security Capabilities

• Coordinating operational responses to cyber events of national

importance across government and critical infrastructure

• An overview of operations in the CSOC – Cyber Security Operations

Centre

• Creating an integrated whole-of-government approach on cyber

security

• Information Security (InfoSec) role

Michael Rothery, First Assistant Secretary, National Security Resilience

Division, Australian Government

CYBER TERRORISM

9:50 PANEL DISCUSSION

What Constitutes Cyber Terrorism? Fact vs. Fiction

Chairman:

Michael Wilks, Regional Director, Public Safety and National Security

APAC, Microsoft

Panellists:

Neelabh Rai, Independent Cyber Security Researcher,

Cyber Cops, India

Ammar Jaffri, Chief Executive,

Pakistan Information Security Association (PISA)

Sazali Sukardi, Head, Strategic Policy Research,

CyberSecurity Malaysia

Iftekharul Bashar, Senior Analyst, International Centre for Political

Violence and Terrorism Research, Singapore

Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,

Indian Army

10:50 Networking Coffee Break

11:20 Cyber Cops at the Crossroads of Cyber Hypnotism and Cyber Warfare –

Indian Perspective

• An overview of the Indian Cyber Cops

• Cyber terrorism in India – Tackling the asymmetric threat

• Comprehensive Online Proactive Security

• Liberty is the price of vigilance

Neelabh Rai, Independent Cyber Security Researcher,

Cyber Cops, India

11:50 Cyber Warfare and Pakistan – An Operational Assessment

• The cyber security programme in Pakistan

• The internet as a tool for radicalisation

• Organisational set up to counter the threat

• The Facebook explosion in Pakistan – Terrorist threats and implications

• Understanding the challenges and overcoming them

• Lessons learned and aims for the future

Ammar Jaffri, Chief Executive, Pakistan Information Security Association

(PISA)

12:20 The Cyber Defence Cell in Malaysia

• The current cyber security threat in Malaysia

• Terrorism vs. Cyber terrorism

• Malaysia’s critical national information infrastructure

• The use of ICT and cyberspace by terrorist

Sazali Sukardi, Head, Strategic Policy & Research Department,

CyberSecurity Malaysia

12:50 Networking Lunch

1:50 The Facebook Jihad - Radicalisation through Social Networking

• A social network for jihad?

• The newest face of terrorist and extremist use of the internet

• The potential for misuse

• Cyber radicalisation vs. Social networking

• The Power of Facebook

• Facing the new challenge

Iftekharul Bashar, Senior Analyst, International Centre for Political

Violence and Terrorism Research, Singapore

2:20 Social Engineering – Context and Update

• Meaning and implications in current scenario

• Threat as a victim

• Advantages as a user

• Corporate lessons to be learnt

• Successful cases with modus operandi explained in detail

Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,

Indian Army

2:50 Networking Coffee Break

PROTECTING CRITICAL NATIONAL INFRASTRUCTURE

3:10 Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare

• The first recognised cyber weapon

• Designed to target critical national infrastructure

• Operating through external Programmable Logic Controllers (PLCs)

• Operational case studies – Attacks against Iran, Russia and Kazakhstan

• Identifying the perpetrators

• A new era in which cyber warfare is no longer theoretical and action

and discussion is vital to ensure the protection of critical infrastructure

on a global scale

Speaker Details to be Announced

3:40 The Possible Risks and Protection needed for Smart Grid Communication

• Advance Smart Security Research and Development

• Gaining access to grid-controlling networks

• Intelligence required: HUMINT (human intelligence), IMINT (imagery

intelligence), SIGINT (signals intelligence) and MASINT (measurement

and signature intelligence)

• Countering the threat - A strong intelligence presence inside our critical

infrastructure systems

Dr Goh Shen Tat, Assistant Department Head, Cryptography and Security

Research Group, Institute for Infocomm Research (I2R), Agency for Science

Technology and Research (A*STAR), Singapore

4:10 Chairman's Closing Remarks and Close of Conference

n to +65 664 990 94 or call +65 664 990 95/96 • GROUP DISCOUNTS AVAILABLE •

Page 4: Cyber Security Asia, Singapore

Cyber Games and the Operational Applicationto Cyber Security

About your workshop leaders:

Colonel (Ret’d) Marc Jamison graduated fromTexas A&M and was commissioned into the USAF.He is a combat aviator, having flown the B-52 andB-1 bombers. Col Jamison is a USAF weapon schoolgraduate and has led multiple divisions in AirOperations Centers. He holds 4 Master degrees toinclude one from the School of Advanced Air andSpace Studies and the US Army War College.Recently, he was the Director of Operations forJoint Functional Component Command NetworkWarfare, Director of Future Operations and Chiefof Modeling and Simulation for US CYBERCommand.

Paul de Souza is the Founder/President/Director ofCSFI (Cyber Security Forum Initiative) and itsdivisions CSFI-CWD (Cyber Warfare Division) andCSFI-LPD (Law and Policy Division). CSFI is a non-profit organization with headquarters in Omaha,NE and offices in the DC area. Paul has over 12years of cyber security experience and has workedas a Chief Security Engineer for AT&T where hedesigned and approved secure networks for MSS.Paul has also consulted for several governments,military and private institutions on best networksecurity practices and cyber warfare capabilities,leading a group of more than 9000 cyber securityprofessionals.

In association with:

Preparing for the Next Cyber Attack…

POST-CONFERENCE WORKSHOP B 11TH NOVEMBER 2011

In association with:

PRE-CONFERENCE WORKSHOP A 8TH NOVEMBER 2011

In association with:

Benefits of Attending:• Recognise how information systems can be subjected to

cyber attacks and the impact of these attacks ongovernment services, economy and social aspects of society

• Enhance your knowledge of potential security controls orcountermeasures that can be implemented to mitigate therisk of a potential cyber attack

• Be aware of the actions that can be performed once asystem is compromised

Benefits of Attending:This hands-on interactive workshop is designed to helpthe audience members understand the value of cybergames and how to develop a customized cyber gamesprogram in their organizations. The workshop will givethe attendees the ability to follow a cyber gamesframework, which can greatly improve the cybersecurity posture of any organization or cyber command.

Programme08.30 Registration and Coffee09.00 History of war games09.30 Definitions and differences between an

exercise, training, war game, etc.10.00 History of cyber games10.30 Morning Coffee11.00 Definitions and differences between cyber

games, cyber exercises, etc.12.00 Current cyber games platforms and the

applicability to organizations13.00 Networking Lunch14.00 Creating a cyber game culture (boosting

hands-on skills of your IT security team)15.00 Cyber games operations and framework

(hands-on group exercise)15.30 Afternoon Tea16.00 US Department of Defense and NATO cyber

games initiatives16.30 Q & A sessions17.00 Close of Workshop

Why Attend this Workshop?• Learn about how to protect critical information

systems and network infrastructure from cyber attacksand fully understand which can be launched againstthe industrial control systems used to protect criticalinfrastructure

• See how cyber attacks are launched against criticalinformation systems and network infrastructure

• Understand how to apply technical and administrativecontrols to mitigate critical systems and networksfrom future attacks

Workshop Key Objectives:• Analyse the key aspects of the cyber security as it

relates to protection, detection, respond and recovery • Discuss how cyber attackers exploit current system

vulnerabilities • Review what Microsoft and other vendors have done

to identify and attempt to prevent cyber attacks onsystems

• Evaluate various administrative and technical securitycontrols that can be used to mitigate future cyberattacks

8:30 Registration and Coffee9:00 Session 110:30 Networking Coffee Break11:00 Session 212:30 Networking Lunch Break1:30 Session 33:00 Networking Coffee Break3:30 Session 45:00 Q&A5:30 Close of Workshop

Register online at www.cybersecurity-asia.com

Page 5: Cyber Security Asia, Singapore

Microsoft provides software and services that help people communicate, do their work, beentertained, and manage their personal lives. Over the past 30 years, innovative technology hastransformed how we access and share information, changed the way businesses and institutionsoperate, and made the whole smaller by giving us instant access to people and resourceseverywhere. Microsoft works closely with public and private sector partners throughout AsiaPacific to help enterprise customers, governments, educational institutions and nongovernmentalbodies meet business, social and economic challenges and realize the potential of theirorganizations and their people. Our commitment to the region is reflected by the thousands ofdevelopers, resellers, independent software vendors, and small and medium-sized enterpriseswhose goals for growth and greater business efficiency has been made possible by Microsofttechnology. www.microsoft.com

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha,NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, andsecurity solutions through collaboration, education, volunteer work, and training to assist the USGovernment, US Military, Commercial Interests, and International Partners." CSFI was born out ofthe collaboration of dozens of experts, and today CSFI is comprised of a large community of nearly5000 Cyber Security and Cyber Warfare professionals from the government, military, private sector,and academia. Our amazing members are the core of all of our activities, and it is for them thatwe are pushing forward our mission. www.csfi.us

The Agency for Science, Technology and Research (A*STAR) is the lead agency for fostering world-class scientific research and talent for a vibrant knowledge-based and innovation-drivenSingapore. A*STAR supports Singapore's key economic clusters by providing intellectual, humanand industrial capital to its partners in industry. It also supports extramural research in theuniversities, hospitals, research centres, and with other local and international partners. www.a-star.edu.sg

Conference and Exhibition Supported By:

Lead Sponsor:

Conference KnowledgePartners: