Conference Agenda: 23 July 2020, starts 9am Jakarta time, GMT +7
08:30 - 09:00 |
Online Login Starts |
09:00 - 09:15 |
Opening Address: The Ever-Challenging Threat to the National Economy
Speaker: Leading Association Speaker about session
While government administrations have taken some steps to improve the overall security of the nation’s networks, it has not been enough. One of the main points of contention is the degree to which regulatory powers should play a role in cybersecurity. Many seem to think reflexively that this 19th-century solution is the answer. Those with a little more understanding of the dynamic and fast-moving nature of cyber threats see regulation as far too slow and clumsy, and recognize that it might actually hinder security by building a culture of mere compliance with regulations and a false sense of security against enemies who are agile, motivated, and clever. |
09:20 - 09:30 |
Keynote: Minister Address Speaker: to be advised |
09:30 - 10:10 |
Government Panel Discussion: Cybersecurity Legislation, Standards & Best Practice
Moderator: to be advised Panelists: 1. Colonel Dr. Ir. Arwin D. W. Sumari - Sr Officer Comm. & Electr. , Indonesian Air Force Polinema/Defense University about panel
Key to cybersecurity compliance and the audit process is to recognize the cybersecurity framework approach as common sense — a matter of security and executive management best practices. It’s about having a carefully thought-out plan about your risks, how your organization will respond to a threat or breach and the team responsible for action. Best practice encourages standard policies, procedures and processes that place us in the position of being proactive and responsive, rather than reactive, and having to shut down operations. |
10:15 - 10:55 |
USA Panel: Who is Threatening your Critical Infrastructure & Why
Moderator: Chris Cubbage CPP, CISA, GAICD - Director & Executive Editor, My Security Media Panelists: 1. Scott N. Schober - President / CEO, Berkeley Varitronics Systems, Inc. 2. Joseph Saunders - Founder & CEO, RunSafe Security Inc. 3. Atif Ghauri, CISSP, CCSA, CISM - Principal, Cybersecurity Practice Leader, Mazars USA 4. Geanie Umberger, PhD, MSPH, RPh - Executive Director, Purdue University about panel
As governments and corporations seek to leverage AI and big data analytics to drive efficiencies in their operations through “smart networks,” IT and OT networks are converging. Hence, these complex control systems are now connected to the internet, making them vulnerable to hacking. Because many of these control systems were not designed with cybersecurity in mind, it’s true they draw hackers’ attention when these older systems are connected to the internet. Throw in the exponential growth of the internet of things (IoT), and it’s clear the threat vector faced by critical infrastructure operators has grown substantially. |
11:00 - 11:30 |
Cybersecurity for Network-Connected Devices: Mitigating IoT Software Risks in Critical Infrastructure
Speaker: Joe Jarzombek, CSSLP - Director for Government & Critical Infrastructure Programs, Synopsys about session
As the cyber threat landscape evolves and external dependencies grow more complex, managing risks to critical infrastructure requires organizations to proactively reduce their attack surfaces in their cyber supply chains and in assets being targeted for exploitation.
|
11:30 - 11:50 |
Emerging Threats For Critical Infrastructure
Speaker: To be advised about session
Critical Infrastructure Protection is the need to protect a country's vital infrastructures such as Defense, telecommunications, Power & water services, food and agriculture or transportation. Every government in every nation has a responsibility to protect these essential critical infrastructureagainst natural disasters, terrorist activities and now cyber threats. |
11:50 - 12:10 |
Sponsor Presentation : A Case Study in Hacking Critical Infrastructure
Speaker: To be advised about session
to be advised |
Prayer & Networking Break
13:00 - 13:25 |
Securing the Cyberspace: Issues and Challenges
or Infrastructure Attack Modeling and Detection Speaker: to be advised about session
Ensuring cybersecurity is becoming tougher every year as cybercriminals perform new attacks, exploit new vulnerabilities, and execute new attacks constantly. As the dynamics of cyber warfare continue to change, it is very important to be aware of the issues currently confronting cyberspace. One threat which continues to grow in the danger it poses to cyber security are botnets. Botnets can launch massive Distributed Denial of Service (DDoS) attacks against internet connected hosts anonymously, undertake intricate spam campaigns, launch mass financial fraud campaigns, and even manipulate public opinion via social media bots. |
13:30 - 13:55 |
E-Investigations of the Digital World through Cyber Forensics
or Maintaining Security & Counterintelligence by Invading your DNS Infrastructure Speaker: To be advised about session
Digital forensic investigation is a branch of cyber forensics in which scientific methods and tools are used ,that allows the prevention and analysis of digital evidence, that to be produced in a court of law. DNS hijacking and other man-in-the-middle attacks, such as DNS cache poisoning and border gateway protocol (BGP) hijacking can go undetected for extended periods of time. A basic, layered approach to DNS security can dramatically reduce the chances of DNS and BGP-related compromise. |
14:00 - 14:40 |
Europe Panel: Continuous Threat Monitoring: Collate, Correlate & Investigate
Moderator: Biljana Cerin - CEO, Ostendo Consulting Panelists: 1. DaMon A Ross Sr - CEO, Cyber Defense International, LLC 2 2. Jorge Sebastiao, CISSP - CTO, Confidential | Advisor, XRSI 3. Fernando Martinho - Co-Founder & CTO, Naoris 4. Sandip Patel QC FCIArb - Managing Partner London, Aliant Law about panel
Build an effective cyber security monitoring process and learn about where and how you can get help.
|
14:45 - 15:10 |
Identifying and Estimating the Cascading Effects in Cyber-Physical Critical Infrastructures
Speaker: Stefan Schauer - Senior Scientist, Austrian Institute of Technology (AIT) about session
Due to the ongoing digitalization in the industrial sector, the interdependencies among the physical and cyber systems within today's critical infrastructures have increased drastically. A clear distinction between physical systems and cyber systems, or rather between the Operation Technology (OT) network and the Information and Communication Technology (ICT) network is no longer possible. These extensive interconnections give cyber criminals the opportunity to hack and compromise crucial systems without big technological or financial effort. Hence, a comprehensive approach to identify and estimate the potential cascading effects an incident at some system can have on the overall infrastructure is required. |
15:15 - 15:40 |
Sponsor Presentation : Protecting against Downtime with Hardened Backup & Disaster Recovery
or The Emerging Role of Modeling and Simulation in Security Assessments and Design Speaker: To be advised about session
to be advised |
Prayer & Networking Break
16:10 - 16:40 |
Asia Panel: Cybersecurity Threat Landscape in South East Asia
Moderator: Jeff Paine - Managing Director, Asia Internet Coalition (AIC) Panelists: To be advised about panel
Just as south east asia has become the most dynamic venue for global economic activity, it has also become the locus of cyber risk. The significance of Asian cyber risk is rooted in technology’s role in fuelling and shaping Asia’s rise. The significant cyber threats to business interests in Asia and the cyber challenges of a rouge nation demand a comprehensive prioritization of Asian cyber risk. Through cooperation with other regional governments as well as a variety of significant non-state actors, the local governments have the potential to comprehensively rebalance cyber risk to the center of regional strategic and economic efforts. |
16:45 - 17:05 |
Promoting Resilience through Critical Infrastructure Protection Diplomacy
Speaker: 1. Carmen Elena CIRNU PhD, Senior Researcher - VP of Scientific Council & Head of Cyber Security and Critical Infrastructure Department, National Institute for Research and Development in Informatics ICI 2. Adrian Victor VEVERA PhD, Eng.,Senior Researcher - General Director, National Institute for Research and Development in Informatics ICI about session
to be updated |
17:10 - 17:30 |
Mobile Application Security – Proven Methodology & Effective Testing
or Cyber Attack Incident Reporting & Incident Handling Guidelines or Vulnerability Analysis: Revealing Defects with Fuzzing Speaker: To be advised about session
Many organisations may not have the necessary in house expertise and skills to respond adequately to a cyber security incident. Cyber security incident management is not a linear process; it’s a cycle that consists of a preparation phase, an incident detection phase and a phase of incident containment, mitigation and recovery. Fuzz testing (fuzzing) is a quality assurance technique used to discover coding errors and security loopholes in software, operating systems or networks. It involves inputting massive amounts of random data, called fuzz, to the test subject in an attempt to make it crash. If a vulnerability is found, a software tool called a fuzzer can be used to identify potential causes. |
Contacts:
Registrations - register@blackarrowconferences.com Exhibit & Speaking Opportunities - sarfraz@blackarrowconferences.com Whatsapp +91-9833487628 | Telegram - sarfraz_blackarrow |