• No results found

Introducing the leading forum for Cyber Security Professionals in Asia. Cyber Security ASIA

N/A
N/A
Protected

Academic year: 2021

Share "Introducing the leading forum for Cyber Security Professionals in Asia. Cyber Security ASIA"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

www.cybersecurity-asia.com

Register online and receive full information on all of SMi’s conferences

Alternatively fax your registration to +65 664 990 94 or +44 (0) 870 9090 712 or

call +65 664 990 95/96 or +44 (0) 870 9090 711

Wing Commander Tom Parkhouse,

Cyber Security Strategy Staff Officer,

Ministry of Defence, UK

OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES:

Major (Ret’d) Manik M Jolly,

Commander

Cyber Security Cell,

Indian Army

Bernie Trudel,

Chairman,

Asia Cloud Computing

Association

Xundi Zhang,

Founder,

XFocus, China

Iftekharul Bashar,

Senior Analyst,

International Centre for Political

Violence and Terrorism Research,

Singapore

Neelabh Rai,

Independent Cyber Security

Researcher,

Cyber Cops, India

Ammar Jaffri,

Chief Executive,

Pakistan

Information Security Association

(PISA)

Michael Rothery,

First Assistant

Secretary, National Security Resilience

Division,

Australian Government

Dr Goh Shen Tat,

Assistant Department

Head, Cryptography and Security Research

Group, Institute for Infocomm Research

(I2R),

Agency for Science Technology and

Research (A*STAR), Singapore

Sazali Sukardi,

Head, Strategic Policy

Research,

CyberSecurity Malaysia

Introducing the leading forum for Cyber Security Professionals in Asia

CONFERENCE HIGHLIGHTS:

C

ase studies from

International Cyber

Commands

Y

our chance to assess how

Cyber Terrorism and

Radicalisation through

social networking is being

used across Asia Pacific

B

e involved in our

interactive panel

discussions and working

groups and get your

opinion across to the

people that matter

E

nter into sessions focusing

on National Capabilities

and Protecting Critical

National Infrastructure

R

each out and network

with your industry peers

and leave having forged

new working relationships

and strengthened your

current ones!

PLUS ONE FULL DAY PRE-CONFERENCE WORKSHOP AND ONE FULL DAY POST-CONFERENCE WORKSHOP:

Preparing for the Next Cyber Attack…

Friday 11th November

Cyber Games and the Operational Application to

Cyber Security

Tuesday 8th November

In Association with:

In Association with:

Cyber Security

ASIA

9th & 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore

GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR

SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR

Lead Sponsor: Sponsored by:

Conference Knowledge Partners:

(2)

DAY ONE

Wednesday 9th November 2011

8:30 Registration and Coffee

9:00 Chairman's Opening Remarks

Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,

Ministry of Defence, UK

9:10 GUEST OF HONOUR OPENING ADDRESS

Building a Secure and Connected Future

• Investing in information security competencies/expertise • Qualified information security professionals for Singapore • Everyone has a part to play

• Conclusions

Senior Representative, Agency for Science, Technology and Research (A*STAR), Singapore

9:40 KEYNOTE ADDRESS

The Global Cyber Security Challenge

Michael Wilks,Regional Director, Public Safety and National Security APAC, Microsoft

10:20 SCENARIO CYBER ATTACK

Cyber Attack – Is it an Act of War?

This session will be run by Microsoft – a large multinational company/government is being hit by a Cyber Attack what are the options to respond to this attack? This is the opportunity for the audience to engage with each other to discuss potential counter measures to a cyber attack.

Michael Wilks, Regional Director, Public Safety and National Security APAC, Microsoft

11:00 Networking Coffee Break

INTERNATIONAL CYBER COMMANDS AND NATIONAL CAPABILITIES

11:30 SPECIAL ADDRESS

Military Cyber Commands – An Overview

Many nations have been surging their efforts to meet the national security challenges, still largely unknown, of conflict in cyber space. This presentation will survey and compare these national efforts with a focus on military cyber commands: which nations have them, what missions they are likely to engage in, and the implications for the rest of us.

Jason Healy,Executive Director, Cyber Conflict Studies Association

12:00 KEYNOTE ADDRESS

USCYBERCOM – An Insight

• The US CYBERCOM - An overview

• Conducting full spectrum military cyberspace operations in order to enable actions in all domains

• Ensuring US/Allied freedom of action in cyberspace • Training at the centre

• Recent operations and lessons learned

Colonel Robert Morris,Director, 24 AF (AF CYBER) Air Component Coordination Element to US Cyber Command (USCYBERCOM)*

12:30 Update on the UK’s National Cyber Security Programme

• The UK’s National Cyber Crime Strategy

• The UK’s ability to detect and defend against cyber attacks from terrorists, states, and other hostile actors

• Emerging threat of cyber-attacks against Britain’s infrastructure • An insight into the UK Defence Cyber Operations Group

• Interoperability and collaboration with industry to address weaknesses in cyber security defence of critical infrastructure

• Cooperation in cyber security defence with the United States and other “like-minded nations”

Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,

Ministry of Defence, UK

1:00 Networking Lunch

2:00 The Chinese Cyber Security Strategy

• Overview and insight into activities into Chinese Security Team • Cyber security, policies, standards and regulations in China • Underground economy on the Chinese cyber programme • The security landscape in China

Xundi Zhang, Founder, XFocus, China

2:30 Best Practice Cyber Defence, Based on Network Intelligence and Communications Metadata

• The challenges of government cyber defense • Detecting cyber threats by scanning traffic

• Using DPI & Network Intelligence to build a second line of cyber defense

• Examples of technical implementations

• Using communication metadata to detect suspicious traffic

Emmanuel Roger, Vice President Sales Asia Pacific & Japan,

Qosmos

3:00 Networking Coffee Break

STRATEGIES AND PROGRAMMES

3:30 Analysing Open Source Cyber Intelligence

• The importance of open source intelligence

• Information sharing among professionals involved in corporate security, information security, and the intelligence community

• Utilisation of open source data to protect physical assets and individuals • Identify sensitive information that has been compromised, malware,

phishing, identity theft, and related subject matter

Paul de Souza, Owner, Cyber Security Forum Initiative (CSFI)

4:00 Cloud Computing in Asia – An Introduction

• Regional issues of regulation and policy • Security infrastructure and awareness • Collaboration and innovation

Bernie Trudel, Chairman, Asia Cloud Computing Association

4:30 Cloud Reality – Dispelling the Myths

• The cold hard facts of cloud computing today • Defining the private cloud vs public vs hybrid • How secure is cloud?

Aloysius Cheang, APAC Strategy Advisor,Cloud Security Alliance

5:00 Conclusions and Key Talking Points from Day One

Michael Wilks, Regional Director, Public Safety and National Security APAC, Microsoft

5:15 Chairman’s Closing Remarks and Close of Day One

5:30 Networking Drinks Reception

Sponsored by

(3)

DAY TWO Thursday 10th November 2011

*subject to final confirmation

8:30 Registration and Coffee

9:00 Chairman's Opening Remarks

Wing Commander Tom Parkhouse,Cyber Security Strategy Staff Officer,

Ministry of Defence, UK

9:10 KEYNOTE ADDRESS

Australia’s Cyber Security Capabilities

• Coordinating operational responses to cyber events of national importance across government and critical infrastructure

• An overview of operations in the CSOC – Cyber Security Operations Centre

• Creating an integrated whole-of-government approach on cyber security

• Information Security (InfoSec) role

Michael Rothery, First Assistant Secretary, National Security Resilience Division, Australian Government

CYBER TERRORISM

9:50 PANEL DISCUSSION

What Constitutes Cyber Terrorism? Fact vs. Fiction

Chairman:

Michael Wilks, Regional Director, Public Safety and National Security APAC,Microsoft

Panellists:

Neelabh Rai, Independent Cyber Security Researcher,

Cyber Cops, India

Ammar Jaffri,Chief Executive,

Pakistan Information Security Association (PISA) Sazali Sukardi, Head, Strategic Policy Research,

CyberSecurity Malaysia

Iftekharul Bashar, Senior Analyst, International Centre for Political Violence and Terrorism Research, Singapore

Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,

Indian Army

10:50 Networking Coffee Break

11:20 Cyber Cops at the Crossroads of Cyber Hypnotism and Cyber Warfare – Indian Perspective

• An overview of the Indian Cyber Cops

• Cyber terrorism in India – Tackling the asymmetric threat • Comprehensive Online Proactive Security

• Liberty is the price of vigilance

Neelabh Rai,Independent Cyber Security Researcher,

Cyber Cops, India

11:50 Cyber Warfare and Pakistan – An Operational Assessment

• The cyber security programme in Pakistan • The internet as a tool for radicalisation • Organisational set up to counter the threat

• The Facebook explosion in Pakistan – Terrorist threats and implications • Understanding the challenges and overcoming them

• Lessons learned and aims for the future

Ammar Jaffri,Chief Executive, Pakistan Information Security Association (PISA)

12:20 The Cyber Defence Cell in Malaysia

• The current cyber security threat in Malaysia • Terrorism vs. Cyber terrorism

• Malaysia’s critical national information infrastructure • The use of ICT and cyberspace by terrorist

Sazali Sukardi, Head, Strategic Policy & Research Department,

CyberSecurity Malaysia

12:50 Networking Lunch

1:50 The Facebook Jihad - Radicalisation through Social Networking

• A social network for jihad?

• The newest face of terrorist and extremist use of the internet • The potential for misuse

• Cyber radicalisation vs. Social networking • The Power of Facebook

• Facing the new challenge

Iftekharul Bashar,Senior Analyst,International Centre for Political Violence and Terrorism Research, Singapore

2:20 Social Engineering – Context and Update

• Meaning and implications in current scenario • Threat as a victim

• Advantages as a user • Corporate lessons to be learnt

• Successful cases with modus operandi explained in detail

Major (Ret’d) Manik M Jolly,Commander Cyber Security Cell,

Indian Army

2:50 Networking Coffee Break

PROTECTING CRITICAL NATIONAL INFRASTRUCTURE

3:10 Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare

• The first recognised cyber weapon

• Designed to target critical national infrastructure

• Operating through external Programmable Logic Controllers (PLCs) • Operational case studies – Attacks against Iran, Russia and Kazakhstan • Identifying the perpetrators

• A new era in which cyber warfare is no longer theoretical and action and discussion is vital to ensure the protection of critical infrastructure on a global scale

Speaker Details to be Announced

3:40 The Possible Risks and Protection needed for Smart Grid Communication

• Advance Smart Security Research and Development • Gaining access to grid-controlling networks

• Intelligence required: HUMINT (human intelligence), IMINT (imagery intelligence), SIGINT (signals intelligence) and MASINT (measurement and signature intelligence)

• Countering the threat - A strong intelligence presence inside our critical infrastructure systems

Dr Goh Shen Tat, Assistant Department Head, Cryptography and Security Research Group, Institute for Infocomm Research (I2R), Agency for Science Technology and Research (A*STAR), Singapore

4:10 Chairman's Closing Remarks and Close of Conference

(4)

Cyber Games and the Operational Application

to Cyber Security

About your workshop leaders:

Colonel (Ret’d) Marc Jamison

graduated from

Texas A&M and was commissioned into the USAF.

He is a combat aviator, having flown the B-52 and

B-1 bombers. Col Jamison is a USAF weapon school

graduate and has led multiple divisions in Air

Operations Centers. He holds 4 Master degrees to

include one from the School of Advanced Air and

Space Studies and the US Army War College.

Recently, he was the Director of Operations for

Joint Functional Component Command Network

Warfare, Director of Future Operations and Chief

of Modeling and Simulation for US CYBER

Command.

Paul de Souza

is the Founder/President/Director of

CSFI (Cyber Security Forum Initiative) and its

divisions CSFI-CWD (Cyber Warfare Division) and

CSFI-LPD (Law and Policy Division). CSFI is a

non-profit organization with headquarters in Omaha,

NE and offices in the DC area. Paul has over 12

years of cyber security experience and has worked

as a Chief Security Engineer for AT&T where he

designed and approved secure networks for MSS.

Paul has also consulted for several governments,

military and private institutions on best network

security practices and cyber warfare capabilities,

leading a group of more than 9000 cyber security

professionals.

In association with:

Preparing for the Next Cyber Attack…

POST-CONFERENCE WORKSHOP B 11TH NOVEMBER 2011

In association with:

PRE-CONFERENCE WORKSHOP A 8TH NOVEMBER 2011

In association with:

Benefits of Attending:

• Recognise how information systems can be subjected to

cyber attacks and the impact of these attacks on

government services, economy and social aspects of society

• Enhance your knowledge of potential security controls or

countermeasures that can be implemented to mitigate the

risk of a potential cyber attack

• Be aware of the actions that can be performed once a

system is compromised

Benefits of Attending:

This hands-on interactive workshop is designed to help

the audience members understand the value of cyber

games and how to develop a customized cyber games

program in their organizations. The workshop will give

the attendees the ability to follow a cyber games

framework, which can greatly improve the cyber

security posture of any organization or cyber command.

Programme

08.30

Registration and Coffee

09.00

History of war games

09.30

Definitions and differences between an

exercise, training, war game, etc.

10.00

History of cyber games

10.30

Morning Coffee

11.00

Definitions and differences between cyber

games, cyber exercises, etc.

12.00

Current cyber games platforms and the

applicability to organizations

13.00

Networking Lunch

14.00

Creating a cyber game culture (boosting

hands-on skills of your IT security team)

15.00

Cyber games operations and framework

(hands-on group exercise)

15.30

Afternoon Tea

16.00

US Department of Defense and NATO cyber

games initiatives

16.30

Q & A sessions

17.00

Close of Workshop

Why Attend this Workshop?

• Learn about how to protect critical information

systems and network infrastructure from cyber attacks

and fully understand which can be launched against

the industrial control systems used to protect critical

infrastructure

• See how cyber attacks are launched against critical

information systems and network infrastructure

• Understand how to apply technical and administrative

controls to mitigate critical systems and networks

from future attacks

Workshop Key Objectives:

• Analyse the key aspects of the cyber security as it

relates to protection, detection, respond and recovery

• Discuss how cyber attackers exploit current system

vulnerabilities

• Review what Microsoft and other vendors have done

to identify and attempt to prevent cyber attacks on

systems

• Evaluate various administrative and technical security

controls that can be used to mitigate future cyber

attacks

8:30

Registration and Coffee

9:00

Session 1

10:30 Networking Coffee Break

11:00 Session 2

12:30 Networking Lunch Break

1:30

Session 3

3:00

Networking Coffee Break

3:30

Session 4

5:00

Q&A

5:30

Close of Workshop

(5)

Microsoft

provides software and services that help people communicate, do their work, be

entertained, and manage their personal lives. Over the past 30 years, innovative technology has

transformed how we access and share information, changed the way businesses and institutions

operate, and made the whole smaller by giving us instant access to people and resources

everywhere. Microsoft works closely with public and private sector partners throughout Asia

Pacific to help enterprise customers, governments, educational institutions and nongovernmental

bodies meet business, social and economic challenges and realize the potential of their

organizations and their people. Our commitment to the region is reflected by the thousands of

developers, resellers, independent software vendors, and small and medium-sized enterprises

whose goals for growth and greater business efficiency has been made possible by Microsoft

technology.

www.microsoft.com

The Cyber Security Forum Initiative (CSFI)

is a non-profit organization headquartered in Omaha,

NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and

security solutions through collaboration, education, volunteer work, and training to assist the US

Government, US Military, Commercial Interests, and International Partners." CSFI was born out of

the collaboration of dozens of experts, and today CSFI is comprised of a large community of nearly

5000 Cyber Security and Cyber Warfare professionals from the government, military, private sector,

and academia. Our amazing members are the core of all of our activities, and it is for them that

we are pushing forward our mission.

www.csfi.us

The Agency for Science, Technology and Research (A*STAR)

is the lead agency for fostering

world-class scientific research and talent for a vibrant knowledge-based and innovation-driven

Singapore. A*STAR supports Singapore's key economic clusters by providing intellectual, human

and industrial capital to its partners in industry. It also supports extramural research in the

universities, hospitals, research centres, and with other local and international partners.

www.a-star.edu.sg

Conference and Exhibition Supported By:

Lead Sponsor:

Conference Knowledge

Partners:

(6)

If you have any further queries please call the Events Team on tel +65 66 4990 95/+65 66 4990 96 or you can email them at events@smi-online.sg

CYBER SECURITY ASIA

Conference: 9th – 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore Workshops: 8th & 11th November 2011

4 WAYS TO REGISTER

ONLINE at www.cybersecurity-asia.com

+65 664 990 95/96 or +44 (0) 870 9090 711

Email: events@smi-online.sg FAX your booking form to +65 664 990 94 or +44 (0) 870 9090 712

GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR

SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR

Payment: Payments must be made with the order.

Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another delegate to take your place at any time prior to the start of the event. Two or more delegates may not ‘share’ a place at an event. Please make separate bookings for each delegate.

Cancellation: If you wish to cancel your attendance at an event and you are unable to send a substitute, then we will refund/credit 50% of the due fee less a S$100 administration charge, providing that cancellation is made in writing and received at least 28 days prior to the start of the event. Regretfully cancellation after this time cannot be accepted. We will however provide the conferences documentation via the Document Portal to any delegate who has paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to provide documentation in these circumstances. We cannot accept cancellations of orders placed for Documentation or the Document Portal as these are reproduced specifically to order. If we have to cancel the event for any reason, then we will make a full refund immediately, but disclaim any further liability.

Alterations: It may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event compared to the advertised programme.

Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to tell you about other products and services. Unless you tick here □we may also share your data with third parties offering complementary products or services. If you have any queries or want to update any of the data that we hold then please contact our Database Manager databasemanager@smi-online.co.uk or visit our website www.smi-online.co.uk/updates quoting the URN as detailed above your address on the attached letter.

Unique Reference Number

Our Reference LV SGS-001

Terms and Conditions of Booking

DELEGATE DETAILS

Please complete fully and clearly in capital letters. Please photocopy for additional delegates. Title: Forename: Surname: Job Title: Department/Division: Company/Organisation: Email: Address: Town/City:

Post/Zip Code: Country: Direct Tel: Direct Fax: Mobile:

Switchboard:

Signature: Date:

I agree to be bound by SMi's Terms and Conditions of Booking. ACCOUNTS DEPT

Title: Forename: Surname:

Email:

Address (if different from above):

Town/City:

Post/Zip Code: Country: Direct Tel: Direct Fax:

CARD PAYMENT ONLY - TO BE RECEIVED WITH THE ORDER.

An invoice will be supplied for your records on receipt of the order/payment.

Please fill in your credit card details below:

Visa

MasterCard

American Express

All credit card payments will be subject to standard credit card charges.

Card No:

□□□□ □□□□ □□□□ □□□□

Valid From

□□

/

□□

Expiry Date

□□

/

□□

CVV Number

□□□□

3 digit security on reverse of card, 4 digits for AMEX card

Cardholder’s Name:

Signature:

Date:

I agree to be bound by SMi's Terms and Conditions of Booking.

Card Billing Address

(If different from above):

CONFERENCE PRICES

DOCUMENTATION

(Shipped 10-14 days after the event)

I cannot attend but would like to purchase access to the following Document

Portal/paper copy documentation:

Price

Total

Access to the conference documentation

on the Document Portal

s$999

+VAT

S$1198.80

The Conference Presentations - paper copy

s$999

(or only S$300 if ordered with the Document Portal)

PAYMENT

VENUE

Grand Copthorne Waterfront Hotel, 392 Havelock Road, Singapore 169663

Book your accommodation at SMi discounted rates by calling the hotel directly

on tel: +65 67330880, Fax: +65 67378880 email: enquiry@grandcopthorne.com.sg

and make sure to refer to your attendance at this conference.

NON SINGAPORE SINGAPORE CLIENTS CLIENTS INCLUDING VAT

MILITARY, GOVERNMENT & PUBLIC SECTOR RATE

Conference & Interactive Workshop A and B S$2897 S$3100

Conference & Interactive Workshop A S$2198 S$2352

Conference & Interactive Workshop B S$2198 S$2352

Conference only S$1499 S$1604

Interactive Workshop A only S$699 S$748

Interactive Workshop B only S$699 S$748 COMMERCIAL ORGANISATIONS

Conference & Interactive Workshop A and B S$5497 S$5882

Conference & Interactive Workshop A S$4298 S$4599

Conference & Interactive Workshop B S$4298 S$4599

Conference only S$3099 S$3316

Interactive Workshop A only S$1199 S$1283

Interactive Workshop B only S$1199 S$1283 PROMOTIONAL LITERATURE DISTRIBUTION

Distribution of your company’s promotional

literature to all conference attendees S$1999 S$2139 The conference fee includes refreshments, lunch, conference papers and access to the Document Portal containing all of the presentations.

VAT

Clients from Singapore will need to pay 7% VAT, those outside of Singapore

will not need to pay VAT.

References

Related documents

• Discover how media representations structure our perception of reality, often through unnoticed communications. • Evaluate the reliability of sources of

For example, according to Armstrong (2006, p.8), “the overall purpose of human resource management is to ensure that the organization is able to achieve success

The recent release of the National Immunization Survey (NIS) has made a national study possible. The NIS is a yearly population-based survey of more than 30,000 households per

Offensive performance assessment comprised (i) effectiveness (successful ball possessions: when the offensive team scored a 2- or a 3-point ield-goal, secured a rebound, or

In addition, the Euclidean distance among these objects as well as among objects and clusters in figure 4 can be correctly measured, since the space shown in figure 4 is a

They offer a full range of telephony services, including Voice Mail, Caller ID, ISDN, Frame Relay, Wireless, T1 and DS3 connectivity.. Sprint also provides dedicated Internet

Studying the phase of the oscillators, we calculate the parameter value for which we obtain the antiphase lag synchronization of the system and also the bifurcation values for which

Important are behaviors associated with and interrelated with the many different plastics materials (thermoplastics, thermosets, elastomers, reinforced plastics) and the