Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber Security Asia, Singapore

The latest brochure of the International Conference of Cyber Security Asia, Singapore (8 - 11 November, 2011).

The last page of registration is intentionally removed from the brochure. For that one, please download it from

On 8 November, 2011 and 11 November, 2011 there are two full-day workshops (pre-conference and post-conference, respectively) organized by Cyber Security Forum Initiative (CSFI), US and Microsoft.

If someone is interested to attend the conference, then do not delay anymore as the dates are now too close. Just send an email to

lgreen AT smi-online DOT sg

  • Be the first to comment

Cyber Security Asia, Singapore

  1. 1. GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR• Introducing the leading forum for Cyber Security Professionals in Asia Cyber Security ASIA 9th & 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore CONFERENCE HIGHLIGHTS: OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES: C ase studies from International Cyber Wing Commander Tom Parkhouse, Iftekharul Bashar, Senior Analyst, Commands Cyber Security Strategy Staff Officer, International Centre for Political Y our chance to assess how Cyber Terrorism and Ministry of Defence, UK Violence and Terrorism Research, Singapore Radicalisation through social networking is being Major (Ret’d) Manik M Jolly, Commander Michael Rothery, First Assistant used across Asia Pacific Secretary, National Security Resilience Cyber Security Cell, Indian Army Division, Australian Government B e involved in our interactive panel Dr Goh Shen Tat, Assistant Department discussions and working Head, Cryptography and Security Research Bernie Trudel, Chairman, groups and get your Group, Institute for Infocomm Research Asia Cloud Computing opinion across to the (I2R), Agency for Science Technology and Association people that matter Research (A*STAR), Singapore E nter into sessions focusing on National Capabilities Xundi Zhang, Founder, XFocus, China Sazali Sukardi, Head, Strategic Policy and Protecting Critical Research, CyberSecurity Malaysia National Infrastructure R each out and network with your industry peers Neelabh Rai, Independent Cyber Security Ammar Jaffri, Chief Executive, Pakistan Information Security Association and leave having forged Researcher, Cyber Cops, India new working relationships (PISA) and strengthened your current ones! PLUS ONE FULL DAY PRE-CONFERENCE WORKSHOP AND ONE FULL DAY POST-CONFERENCE WORKSHOP: Cyber Games and the Operational Application to Preparing for the Next Cyber Attack… A B Cyber Security Friday 11th November Tuesday 8th November In Association with: In Association with: Lead Sponsor: Sponsored by: Conference Knowledge Partners: Register online and receive full information on all of SMi’s conferences Alternatively fax your registration to +65 664 990 94 or +44 (0) 870 9090 712 or call +65 664 990 95/96 or +44 (0) 870 9090 711
  2. 2. DAY ONE Wednesday 9th November 20118:30 Registration and Coffee 2:00 The Chinese Cyber Security Strategy • Overview and insight into activities into Chinese Security Team9:00 Chairmans Opening Remarks • Cyber security, policies, standards and regulations in China Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer, Ministry of Defence, UK • Underground economy on the Chinese cyber programme • The security landscape in China9:10 GUEST OF HONOUR OPENING ADDRESS Xundi Zhang, Founder, XFocus, Building a Secure and Connected Future • Investing in information security competencies/expertise China • Qualified information security professionals for Singapore • Everyone has a part to play 2:30 Best Practice Cyber Defence, Based on Network Intelligence and • Conclusions Senior Representative, Agency for Science, Technology and Research Communications Metadata (A*STAR), Singapore • The challenges of government cyber defense • Detecting cyber threats by scanning traffic9:40 KEYNOTE ADDRESS The Global Cyber Security Challenge • Using DPI & Network Intelligence to build a second line of cyber Michael Wilks, Regional Director, Public Safety and National Security defense APAC, Microsoft • Examples of technical implementations10:20 SCENARIO CYBER ATTACK • Using communication metadata to detect suspicious traffic Cyber Attack – Is it an Act of War? Emmanuel Roger, Vice President Sales Asia Pacific & Japan, This session will be run by Microsoft – a large multinational Qosmos company/government is being hit by a Cyber Attack what are the options to respond to this attack? This is the opportunity for the audience to engage with each other to discuss potential counter 3:00 Networking Coffee Break measures to a cyber attack. Michael Wilks, Regional Director, Public Safety and National Security STRATEGIES AND PROGRAMMES APAC, Microsoft11:00 Networking Coffee Break 3:30 Analysing Open Source Cyber Intelligence • The importance of open source intelligence INTERNATIONAL CYBER COMMANDS AND NATIONAL CAPABILITIES • Information sharing among professionals involved in corporate security,11:30 SPECIAL ADDRESS information security, and the intelligence community Military Cyber Commands – An Overview • Utilisation of open source data to protect physical assets and individuals Many nations have been surging their efforts to meet the national security challenges, still largely unknown, of conflict in cyber space. This • Identify sensitive information that has been compromised, malware, presentation will survey and compare these national efforts with a focus phishing, identity theft, and related subject matter on military cyber commands: which nations have them, what missions Paul de Souza, Owner, Cyber Security Forum Initiative (CSFI) they are likely to engage in, and the implications for the rest of us. Jason Healy, Executive Director, Cyber Conflict Studies Association 4:00 Cloud Computing in Asia – An Introduction12:00 KEYNOTE ADDRESS • Regional issues of regulation and policy USCYBERCOM – An Insight • Security infrastructure and awareness • The US CYBERCOM - An overview • Conducting full spectrum military cyberspace operations in order to • Collaboration and innovation enable actions in all domains Bernie Trudel, Chairman, Asia Cloud Computing Association • Ensuring US/Allied freedom of action in cyberspace • Training at the centre • Recent operations and lessons learned 4:30 Cloud Reality – Dispelling the Myths Colonel Robert Morris, Director, 24 AF (AF CYBER) Air Component • The cold hard facts of cloud computing today Coordination Element to US Cyber Command (USCYBERCOM)* • Defining the private cloud vs public vs hybrid12:30 Update on the UK’s National Cyber Security Programme • How secure is cloud? • The UK’s National Cyber Crime Strategy Aloysius Cheang, APAC Strategy Advisor, Cloud Security Alliance • The UK’s ability to detect and defend against cyber attacks from terrorists, states, and other hostile actors • Emerging threat of cyber-attacks against Britain’s infrastructure 5:00 Conclusions and Key Talking Points from Day One • An insight into the UK Defence Cyber Operations Group Michael Wilks, Regional Director, Public Safety and National Security • Interoperability and collaboration with industry to address weaknesses APAC, Microsoft in cyber security defence of critical infrastructure • Cooperation in cyber security defence with the United States and other “like-minded nations” 5:15 Chairman’s Closing Remarks and Close of Day One Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer, Ministry of Defence, UK 5:30 Networking Drinks Reception1:00 Networking Lunch Sponsored by Register online at • Alternatively fax your registration
  3. 3. DAY TWO Thursday 10th November 2011 8:30 Registration and Coffee 12:50 Networking Lunch 9:00 Chairmans Opening Remarks 1:50 The Facebook Jihad - Radicalisation through Social Networking Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer, Ministry of Defence, UK • A social network for jihad? • The newest face of terrorist and extremist use of the internet 9:10 KEYNOTE ADDRESS • The potential for misuse Australia’s Cyber Security Capabilities • Coordinating operational responses to cyber events of national • Cyber radicalisation vs. Social networking importance across government and critical infrastructure • The Power of Facebook • An overview of operations in the CSOC – Cyber Security Operations • Facing the new challenge Centre • Creating an integrated whole-of-government approach on cyber Iftekharul Bashar, Senior Analyst, International Centre for Political security Violence and Terrorism Research, Singapore • Information Security (InfoSec) role Michael Rothery, First Assistant Secretary, National Security Resilience Division, Australian Government 2:20 Social Engineering – Context and Update • Meaning and implications in current scenario CYBER TERRORISM • Threat as a victim 9:50 PANEL DISCUSSION • Advantages as a user What Constitutes Cyber Terrorism? Fact vs. Fiction • Corporate lessons to be learnt Chairman: • Successful cases with modus operandi explained in detail Michael Wilks, Regional Director, Public Safety and National Security APAC, Microsoft Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell, Panellists: Indian Army Neelabh Rai, Independent Cyber Security Researcher, Cyber Cops, India Ammar Jaffri, Chief Executive, 2:50 Networking Coffee Break Pakistan Information Security Association (PISA) Sazali Sukardi, Head, Strategic Policy Research, PROTECTING CRITICAL NATIONAL INFRASTRUCTURE CyberSecurity Malaysia Iftekharul Bashar, Senior Analyst, International Centre for Political Violence and Terrorism Research, Singapore 3:10 Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell, • The first recognised cyber weapon Indian Army • Designed to target critical national infrastructure 10:50 Networking Coffee Break • Operating through external Programmable Logic Controllers (PLCs) • Operational case studies – Attacks against Iran, Russia and Kazakhstan 11:20 Cyber Cops at the Crossroads of Cyber Hypnotism and Cyber Warfare – Indian Perspective • Identifying the perpetrators • An overview of the Indian Cyber Cops • A new era in which cyber warfare is no longer theoretical and action • Cyber terrorism in India – Tackling the asymmetric threat and discussion is vital to ensure the protection of critical infrastructure • Comprehensive Online Proactive Security • Liberty is the price of vigilance on a global scale Neelabh Rai, Independent Cyber Security Researcher, Speaker Details to be Announced Cyber Cops, India 11:50 Cyber Warfare and Pakistan – An Operational Assessment 3:40 The Possible Risks and Protection needed for Smart Grid Communication • The cyber security programme in Pakistan • Advance Smart Security Research and Development • The internet as a tool for radicalisation • Gaining access to grid-controlling networks • Organisational set up to counter the threat • The Facebook explosion in Pakistan – Terrorist threats and implications • Intelligence required: HUMINT (human intelligence), IMINT (imagery • Understanding the challenges and overcoming them intelligence), SIGINT (signals intelligence) and MASINT (measurement • Lessons learned and aims for the future and signature intelligence) Ammar Jaffri, Chief Executive, Pakistan Information Security Association (PISA) • Countering the threat - A strong intelligence presence inside our critical infrastructure systems 12:20 The Cyber Defence Cell in Malaysia Dr Goh Shen Tat, Assistant Department Head, Cryptography and Security • The current cyber security threat in Malaysia • Terrorism vs. Cyber terrorism Research Group, Institute for Infocomm Research (I2R), Agency for Science • Malaysia’s critical national information infrastructure Technology and Research (A*STAR), Singapore • The use of ICT and cyberspace by terrorist Sazali Sukardi, Head, Strategic Policy & Research Department, CyberSecurity Malaysia 4:10 Chairmans Closing Remarks and Close of Conference *subject to final confirmationn to +65 664 990 94 or call +65 664 990 95/96 • GROUP DISCOUNTS AVAILABLE •
  4. 4. PRE-CONFERENCE WORKSHOP A 8TH NOVEMBER 2011 In association with: In association with:Cyber Games and the Operational Applicationto Cyber Security Benefits of Attending: This hands-on interactive workshop is designed to help the audience members understand the value of cyber games and how to develop a customized cyber games About your workshop leaders: program in their organizations. The workshop will give the attendees the ability to follow a cyber games Colonel (Ret’d) Marc Jamison graduated from framework, which can greatly improve the cyber Texas A&M and was commissioned into the USAF. security posture of any organization or cyber command. He is a combat aviator, having flown the B-52 and B-1 bombers. Col Jamison is a USAF weapon school graduate and has led multiple divisions in Air Programme Operations Centers. He holds 4 Master degrees to 08.30 Registration and Coffee include one from the School of Advanced Air and 09.00 History of war games Space Studies and the US Army War College. 09.30 Definitions and differences between an Recently, he was the Director of Operations for exercise, training, war game, etc. Joint Functional Component Command Network 10.00 History of cyber games Warfare, Director of Future Operations and Chief 10.30 Morning Coffee of Modeling and Simulation for US CYBER 11.00 Definitions and differences between cyber Command. games, cyber exercises, etc. Paul de Souza is the Founder/President/Director of 12.00 Current cyber games platforms and the applicability to organizations CSFI (Cyber Security Forum Initiative) and its divisions CSFI-CWD (Cyber Warfare Division) and 13.00 Networking Lunch CSFI-LPD (Law and Policy Division). CSFI is a non- 14.00 Creating a cyber game culture (boosting profit organization with headquarters in Omaha, hands-on skills of your IT security team) NE and offices in the DC area. Paul has over 12 15.00 Cyber games operations and framework years of cyber security experience and has worked (hands-on group exercise) as a Chief Security Engineer for AT&T where he 15.30 Afternoon Tea designed and approved secure networks for MSS. 16.00 US Department of Defense and NATO cyber Paul has also consulted for several governments, games initiatives military and private institutions on best network 16.30 Q & A sessions security practices and cyber warfare capabilities, 17.00 Close of Workshop leading a group of more than 9000 cyber security professionals.POST-CONFERENCE WORKSHOP B 11TH NOVEMBER 2011 In association with:Preparing for the Next Cyber Attack…Why Attend this Workshop?• Learn about how to protect critical information 8:30 Registration and Coffee systems and network infrastructure from cyber attacks 9:00 Session 1 and fully understand which can be launched against 10:30 Networking Coffee Break the industrial control systems used to protect critical 11:00 Session 2 infrastructure 12:30 Networking Lunch Break• See how cyber attacks are launched against critical 1:30 Session 3 information systems and network infrastructure 3:00 Networking Coffee Break• Understand how to apply technical and administrative 3:30 Session 4 controls to mitigate critical systems and networks 5:00 Q&A from future attacks 5:30 Close of WorkshopWorkshop Key Objectives:• Analyse the key aspects of the cyber security as it relates to protection, detection, respond and recovery Benefits of Attending:• Discuss how cyber attackers exploit current system • Recognise how information systems can be subjected to vulnerabilities cyber attacks and the impact of these attacks on• Review what Microsoft and other vendors have done government services, economy and social aspects of society to identify and attempt to prevent cyber attacks on • Enhance your knowledge of potential security controls or systems countermeasures that can be implemented to mitigate the• Evaluate various administrative and technical security risk of a potential cyber attack controls that can be used to mitigate future cyber • Be aware of the actions that can be performed once a attacks system is compromised Register online at
  5. 5. Microsoft provides software and services that help people communicate, do their work, be entertained, and manage their personal lives. Over the past 30 years, innovative technology has Lead Sponsor: transformed how we access and share information, changed the way businesses and institutions operate, and made the whole smaller by giving us instant access to people and resources everywhere. Microsoft works closely with public and private sector partners throughout Asia Pacific to help enterprise customers, governments, educational institutions and nongovernmental bodies meet business, social and economic challenges and realize the potential of their organizations and their people. Our commitment to the region is reflected by the thousands of developers, resellers, independent software vendors, and small and medium-sized enterprises whose goals for growth and greater business efficiency has been made possible by Microsoft technology. The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha,Conference Knowledge NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and Partners: security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners." CSFI was born out of the collaboration of dozens of experts, and today CSFI is comprised of a large community of nearly 5000 Cyber Security and Cyber Warfare professionals from the government, military, private sector, and academia. Our amazing members are the core of all of our activities, and it is for them that we are pushing forward our mission. The Agency for Science, Technology and Research (A*STAR) is the lead agency for fostering world- class scientific research and talent for a vibrant knowledge-based and innovation-driven Singapore. A*STAR supports Singapores key economic clusters by providing intellectual, human and industrial capital to its partners in industry. It also supports extramural research in the universities, hospitals, research centres, and with other local and international partners. Conference and Exhibition Supported By: