Blackarrow Conferences
  • Home
  • Past Events
  • Contact Us
Picture
​Conference Agenda: 23 July 2020, starts 9am Jakarta time, GMT +7
08:30 - 09:00

Online Login Starts
​09:00 - 09:15
Opening Address:  The Ever-Challenging Threat to the National Economy​
Speaker: Leading Association Speaker
about session
While government administrations have taken some steps to improve the overall security of the nation’s networks, it has not been enough. One of the main points of contention is the degree to which regulatory powers should play a role in cybersecurity. Many seem to think reflexively that this 19th-century solution is the answer. Those with a little more understanding of the dynamic and fast-moving nature of cyber threats see regulation as far too slow and clumsy, and recognize that it might actually hinder security by building a culture of mere compliance with regulations and a false sense of security against enemies who are agile, motivated, and clever.
​09:20 - 09:30
Keynote: Minister Address
Speaker: to be advised
​09:30 - 10:10
Government Panel Discussion: Cybersecurity Legislation, Standards & Best Practice
Moderator: to be advised 
Panelists:
1. Colonel Dr. Ir. Arwin D. W. Sumari - Sr Officer Comm. & Electr. , Indonesian Air Force  Polinema/Defense University
about panel
Key to cybersecurity compliance and the audit process is to recognize the cybersecurity framework approach as common sense — a matter of security and executive management best practices. It’s about having a carefully thought-out plan about your risks, how your organization will respond to a threat or breach and the team responsible for action. Best practice encourages standard policies, procedures and processes that place us in the position of being proactive and responsive, rather than reactive, and having to shut down operations.
​10:15 - 10:55
USA Panel: Who is Threatening your Critical Infrastructure & Why
Moderator: Chris Cubbage CPP, CISA, GAICD - Director & Executive Editor, My Security Media
Panelists:
1. 
Scott N. Schober - President / CEO, Berkeley Varitronics Systems, Inc.
2. Joseph Saunders - Founder & CEO, RunSafe Security Inc.
3. Atif Ghauri, CISSP, CCSA, CISM - Principal, Cybersecurity Practice Leader, Mazars USA
4. 
Geanie Umberger, PhD, MSPH, RPh - Executive Director, Purdue University
about panel
As governments and corporations seek to leverage AI and big data analytics to drive efficiencies in their operations through “smart networks,” IT and OT networks are converging. Hence, these complex control systems are now connected to the internet, making them vulnerable to hacking. Because many of these control systems were not designed with cybersecurity in mind, it’s true they draw hackers’ attention when these older systems are connected to the internet. Throw in the exponential growth of the internet of things (IoT), and it’s clear the threat vector faced by critical infrastructure operators has grown substantially.
​11:00 - 11:30
Cybersecurity for Network-Connected Devices:  Mitigating IoT Software Risks in Critical Infrastructure
Speaker: Joe Jarzombek, CSSLP - Director for Government & Critical Infrastructure Programs, Synopsys
about session
​As the cyber threat landscape evolves and external dependencies grow more complex, managing risks to critical infrastructure requires organizations to proactively reduce their attack surfaces in their cyber supply chains and in assets being targeted for exploitation. 
  • Addressing cyber supply chain dependencies enables enterprises to comprehensively identify exploit targets and provide more responsive mitigations.
  • Software and IT asset management should leverage automated means for detecting weaknesses and vulnerabilities. 
Security automation provide means to reduce risk exposures attributable to exploitable software; enabling organizations to proactively harden their assets and become more resilient to evolving threats and asymmetric attacks.
​11:30 - 11:50
Emerging Threats For Critical Infrastructure
​Speaker: To be advised
about session
Critical Infrastructure Protection is the need to protect a country's vital infrastructures such as Defense, telecommunications, Power & water services, food and agriculture or transportation. Every government in every nation has a responsibility to protect these essential critical infrastructureagainst natural disasters, terrorist activities and now cyber threats.
​11:50 - 12:10
Sponsor Presentation : A Case Study in Hacking Critical Infrastructure
Speaker: To be advised
about session
to be advised
Prayer & Networking Break
​13:00 - 13:25
Securing the Cyberspace: Issues and Challenges
or
Infrastructure Attack Modeling and Detection
Speaker: to be advised
about session
Ensuring cybersecurity is becoming tougher every year as cybercriminals perform new attacks, exploit new vulnerabilities, and execute new attacks constantly. As the dynamics of cyber warfare continue to change, it is very important to be aware of the issues currently confronting cyberspace. One threat which continues to grow in the danger it poses to cyber security are botnets. Botnets can launch massive Distributed Denial of Service (DDoS) attacks against internet connected hosts anonymously, undertake intricate spam campaigns, launch mass financial fraud campaigns, and even manipulate public opinion via social media bots.
​13:30 - 13:55
E-Investigations of the Digital World through Cyber Forensics ​​
or
Maintaining Security & Counterintelligence by Invading your DNS Infrastructure
Speaker: To be advised
about session
Digital forensic investigation is a branch of cyber forensics in which scientific methods and tools are used ,that allows the prevention and analysis of digital evidence, that to be produced in a court of law.
DNS hijacking and other man-in-the-middle attacks, such as DNS cache poisoning and border gateway protocol (BGP) hijacking can go undetected for extended periods of time. A basic, layered approach to DNS security can dramatically reduce the chances of DNS and BGP-related compromise.
​14:00 - 14:40
Europe Panel: Continuous Threat Monitoring:  Collate, Correlate & Investigate
Moderator: Biljana Cerin - CEO, Ostendo Consulting
Panelists
:
1. DaMon A Ross Sr - CEO, Cyber Defense International, LLC 2 
2. Jorge Sebastiao, CISSP - CTO, Confidential | Advisor, XRSI
3. Fernando Martinho - Co-Founder & CTO, Naoris
4. 
Sandip Patel QC FCIArb - Managing Partner London, Aliant Law
about panel
Build an effective cyber security monitoring process and learn about where and how you can get help.
  • Identify potential indicators of compromise (IOC) at an early stage
  • Investigate them effectively
  • Take appropriate action to reduce the frequency and impact of cyber security incidents
​14:45 - 15:10
Identifying and Estimating the Cascading Effects in Cyber-Physical Critical Infrastructures
Speaker: Stefan Schauer - Senior Scientist, Austrian Institute of Technology (AIT)
about session
Due to the ongoing digitalization in the industrial sector, the interdependencies among the physical and cyber systems within today's critical infrastructures have increased drastically. A clear distinction between physical systems and cyber systems, or rather between the Operation Technology (OT) network and the Information and Communication Technology (ICT) network is no longer possible. These extensive interconnections give cyber criminals the opportunity to hack and compromise crucial systems without big technological or financial effort. Hence, a comprehensive approach to identify and estimate the potential cascading effects an incident at some system can have on the overall infrastructure is required.
​15:15 - 15:40
Sponsor Presentation : Protecting against Downtime with Hardened Backup & Disaster Recovery
or
The Emerging Role of Modeling and Simulation in Security Assessments and Design
Speaker: To be advised
about session
to be advised
Prayer & Networking Break
​16:10 - 16:40
Asia Panel: Cybersecurity Threat Landscape in South East Asia
​
Moderator: Jeff Paine - Managing Director, Asia Internet Coalition (AIC)
Panelists: To be advised
about panel
Just as south east asia has become the most dynamic venue for global economic activity, it has also become the locus of cyber risk. The significance of Asian cyber risk is rooted in technology’s role in fuelling and shaping Asia’s rise. The significant cyber threats to business interests in Asia and the cyber challenges of a rouge nation demand a comprehensive prioritization of Asian cyber risk.
Through cooperation with other regional governments as well as a variety of significant non-state actors, the local governments have the potential to comprehensively rebalance cyber risk to the center of regional strategic and economic efforts.
​16:45 - 17:05
Promoting Resilience through Critical Infrastructure Protection Diplomacy
Speaker:
1. Carmen Elena CIRNU PhD, Senior Researcher - VP of Scientific Council & Head of Cyber Security and Critical Infrastructure Department, National Institute for Research and Development in Informatics ICI

2. ​Adrian Victor VEVERA PhD, Eng.,Senior Researcher - General Director, National Institute for Research and Development in Informatics ICI 
about session
to be updated
​17:10 - 17:30
​Mobile Application Security – Proven Methodology & Effective Testing 
or
Cyber Attack Incident Reporting & Incident Handling Guidelines

or
Vulnerability Analysis: Revealing Defects with Fuzzing
Speaker:  To be advised
about session
Many organisations may not have the necessary in house expertise and skills to respond adequately to a cyber security incident. Cyber security incident management is not a linear process; it’s a cycle that consists of a preparation phase, an incident detection phase and a phase of incident containment, mitigation and recovery.
Fuzz testing (fuzzing) is a quality assurance technique used to discover coding errors and security loopholes in software, operating systems or networks. It involves inputting massive amounts of random data, called fuzz, to the test subject in an attempt to make it crash. If a vulnerability is found, a software tool called a fuzzer can be used to identify potential causes.
Contacts:
Registrations - register@blackarrowconferences.com
Exhibit & Speaking Opportunities - sarfraz@blackarrowconferences.com 

Whatsapp +91-9833487628   |   Telegram - sarfraz_blackarrow
Picture
About
Picture
Established in 2010, Blackarrow Conferences produces cross industry conferences and training programs, delivering knowledge and networking opportunities
Vertical Divider
Connect with Us
Picture
Picture
Picture
Picture
Vertical Divider
Contact Us
Blackarrow Conferences  (A division of BA Business Services)
602, Royal Heritage, Yari Road, Mumbai 61, India


Email: enquiry@blackarrowconferences.com
Tel/Whatsapp: +91-9833487628
​
www.blackarrowconferences.com
​
Hosted by: BA Business Services - Mumbai, India
  • Home
  • Past Events
  • Contact Us