Sie sind auf Seite 1von 12

7-8 August 2017, Sheraton Imperial Hotel Kuala Lumpur

Developing a Resilient Future Ready Organization

Each day, cyber threats become increasingly intricate and difficult to detect. The toll from attacks in Asia exceeded those
in North America and the EU by about $20bn each and accounted for more than a quarter of the $315bn cost of attacks
globally. Over the past year, we saw that with the rise of device connectivity came boundless opportunities for malicious
hackers to attack device vulnerabilities. With the support of forward-thinking security strategies and technology solutions
to match, the modern business can minimize potential risk and step confidently into a digital future.

Dato Dr. Haji Amirudin Abdul Wahab Dani Michaux


CEO Executive Director
CYBERSECURITY MALAYSIA KPMG MANAGEMENT & RISK CONSULTING

Ali Rebaie Dan Tentler


Data Science Anthropologist, Founder
REBAIE ANALYTICS GROUP PHOBOS GROUP

Jorge Sebastiao Casey Fleming


Cloud Practice Leader Chairman & CEO
HUAWEI TECHNOLOGIES BLACKOPS PARTNERS CORPORATION

Niclas Kjellin Eric Lam


Mobile System Architect & Security Expert Director, Enterprise Cyber Security
SIGMA SWEDEN MICROSOFT

David Graham Nitesh Dhanjani


Global Insider Threats Detection Leader Global Head, Information Security Researcher
GE CAPITAL UNITED STATES

Gajendran Kandasamy Chalee Vorakulpipat


SVP, Innovation & Security Head of Cyber Security
MATCHMOVE PAY INDONESIA NECTEC THAILAND

Ashutosh Kapse Michael Wright


Head of Cyber Security, Talent Acquisition Director
IOOF HOLDINGS LTD GRAB

Sumit Puri David Melndez


Global Chief Information Officer R&D Embedded Software Engineer
MAX HEALTHCARE ALBAL INGENIEROS, S.A.

Paul Craig Mustafa Al Bassam


Head of Offensive Security Information Security Advisor,
VANTAGE POINT SECURE TRADING UNITED KINGDOM

Angel T. Redoble
Choong - Fook Fong Chairman and Founding President
CEO PHILIPPINE INSTITUTE OF CYBER
LE GLOBAL SERVICES SECURITY PROFESSIONAL

KC Wong Manish Bahl


Chief Executive Officer Senior Director
CREDIT BUREAU MALAYSIA COGNIZANT

Shahmeer Amir Brett Williams


Bug Bounty Hunter Sales Engineering Head
VEILIUX PAKISTAN CARBON BLACK AUSTRALIA

Exclusively by: Platinum Sponsor: Supporting Organization: Media Partners:


Overview

Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included
cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the
National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the
massive data leaks as shown by the Yahoo data incidents. Large-scale ATM heists have taken place in Taiwan,
Malaysia and Thailand.

As evidenced by the above, cyber attacks can impact any industry at any time. In fact, as more industries become
increasingly connected to the Internet due to the Internet of Things, it is more essential than ever to consider if your
organisation is cyber ready for 2017 and beyond.

We look forward to welcoming you and your peers as we discuss topics ranging from incident response to applica-
tion security to business skills for the information security professional and top Management.

Join us at Cyber Security Asia 2017 Conference & we will help you navigate the Digital Danger Zone.

DID YOU KNOW?

Revenues Lost To Cyber Attacks in Asia Pacific (2016)

Asia Pacific Companies have been hit by some form of Cyber Attack

Asian Government & Corporate Clients suffered from Ransomware Demands

CEOs Not Fully Prepared for Cyber Crimes or Attacks

APAC Cyber Security Market Expected to grow to $32.9 billion by 2019

WHO SHOULD ATTEND

Chief Executive Officers Cyber Security Professionals


Chief Operating Officers Heads of Digital Transformation
Chief Information Security Officers Heads of Insights and Analytics
Chief Information Officers Operation Risk Heads and Managers
Chief Risk Officers Technology Risk Heads and Managers
Chief Technology Officers Cyber Security Experts

WHY SPONSOR OR EXHIBIT AT CYBER SECURITY ASIA 2017?


Gain preferential access to the senior executives in your target market and demonstrate your newest products.
Meet decision makers face-to-face to leverage your product and brand building.
Establish strong relationships and make proposals to potential customers.
Demonstrate your expertise and product excellence.

Delegates are attending to actively find solutions to revolutionize their security strategy in order to stay competitive.
Make sure that your company is there in front of them as they are assessing the best possible solutions to these issues.
For more details of sponsorship and exhibition packages, call us on +603 22606500 or email: tcharles@thomvell.com
DAY 1
7 AUGUST 2017 l MONDAY

7.45-8:45am Registration & Breakfast


8:45-9:00am Opening Address
Panel
9:00-9:30am Cyber Security Strategies & Policies: An APAC Perspective
The region has a greater share of the global economy than any other-and is poised to face some of
the greatest cyber security challenges. But the Asia-Pacific is many nation-states, not one, and they
are divided in both capacity and approach to how to prepare its businesses today for the cyber
challenges of tomorrow.
Hear from Asian experts on the challenges and opportunities that cyberspace presents, in terms
of governance structure, legislation, law enforcement, business and social engagement with
cyber policy and security issues.
An overview of cyber security policy throughout APAC
How can Governments work hand-in hand to combat cybercrime in APAC?

Panelist:
Dato Dr. Haji Amirudin Abdul Wahab, CEO, CYBERSECURITY MALAYSIA
Dani Michaux, Executive Director, KPMG MANAGEMENT & RISK CONSULTING
Chalee Vorakulpipat, Head of Cyber Security Laboratory, NECTEC THAILAND
Angel T. Redoble, Chairman & Founding President, PHILLIPINE INSTITUTE OF CYBER
SECURITY PROFESSIONALS

9:35-10:15am Practical Analytics: A Hands-on Approach to Detecting Cloud-and IoT- based Cyber
Threats

Our job as network and security professionals is to monitor and analyze systems for the unexpected.
Cloud and IoT-based networking solutions and devices are now part of the infrastructure we secure.
Lets take a deep dive into some of the tools, tips, tricks and traps that can help us identify how
todays hackers exploit our systems. In this presentation, Jorge will provide insights and stories
gathered throughout the world. He will discuss ways to identify and combat covert channels in
todays networks, as well as ways to analyze and report these issues to your boss.

Jorge Sebastiao, ICT Expert & Cloud Practice Leader, HUAWEI TECHNOLOGIES

10:20am Networking & Refreshments

10:35-11:40am Building a Successful Cyber Program


As security incidents accelerate in both frequency and severity, the transparency of the aftermath
increases as well. Employees, Boards of Directors, and even the public are more aware of the
potentially devastating nature of cyber attacks, and they want to know exactly what you're going to
do about it. In this session, Casey shares insights gleaned from almost two decades working in
cyber security for enterprise companies and the federal government. Casey Fleming explores the
critical lessons learned over the course of a remarkable career, including his tips on building a
world-class global Cyber Security program.

T. Casey Fleming, CEO, BLACKOPS PARTNERS CORPORATION


Former Founding Managing Director, IBM CYBER DIVISION

11:40-12:10pm Incident Response - Threats and Malware EverywhereNows the Time to ACT!
Security incidents are on the rise, both in volume and sophistication. Brett Williams has assisted
many organizations around the world that were victims of advanced, targeted attacks. Experience
has shown that organizations can detect and halt advanced attacks if they understand the threat and
prepare in advance. In incident response, the investigative team must understand digital evidence
collection, forensic analysis and how formulate a course of action to effectively bring the event to
closure. Gaps in investigative skills will delay the response and provide the attacker an opportunity
to steal data and further embed themselves in the network. This presentation is based on Bretts
extensive experience in investigating and remediating advanced attacks, and outlines key skills a
response team requires to quickly respond to and stop advanced attacks

Brett Williams, Sales Engineering Head, Asia Pacific & Japan, CARBON BLACK
12:10-12:35pm Strategies of Effective Advanced Threat Detection
The industry is beginning to move from a focus on prevention to detection of advanced threats, but
at this early stage, extravagant vendor marketing claims are obfuscating the path forward. This
session will lay out strategies and principles of an effective threat detection program that will help
organizations achieve success, regardless of the technologies they choose to achieve that success

David Graham, Global Insider Threat Detection Leader, GE CAPITAL, AUSTRALIA

12:35-1:00pm Filling The Void In The Cyber Security Talent Pool

The threat is clear. The security sector needs to immediately mobilize resources for bridging the gap
in numbers without compromising the quality in talent. Improvements in security technology may
offer a partial solution, but ultimately, its the people on the frontlinesand in the back officewho
are responsible for building and protecting information technology systems. Unfortunately, there just
arent enough qualified cybersecurity professionals. The only way for companies and government
organizations to fill this talent gap is to comprehensively groom and nourish future cyber warriors.
Hear from technologist expert how to unlock the next generation of cyber security talent.

Michael Wright, Director of Talent Acquisition & Technology, GRAB


1:00-2:00pm Networking Lunch

2:00-2:40pm The Mobile Workforce Threatscape


With cybercrime and espionage waiting around every digital corner, organisations should fear the
potential damage to brand and reputation from a security breach. With a mobile workforce, attack
surfaces and entry points are increasing with every device connected to the internal network. This
session takes us on a journey through the borderless security landscape of smart phones in the
workplace. From careless and unaware users via unintentional information leakage to advanced
persistent threats specifically crafted for our mobile lifestyle. Should we give up all hope? Or can we
do anything to protect our valuable assets? Join Niclas as he discusses and shares Mobile Threat
Defence solutions and the need of having real-time detection and on the possibilities we are seeing
with Artificial Intelligence.

Niklas Kjellin, Mobile System Architect & Security Expert, SIGMA SWEDEN
Panel
2:40-3:10pm Building a Secure & Modern Enterprise in a World of Growing Cyber Threats

It is well known that the Cyber world has been plagued by an increasing number and complexity of
threats in recent years. The commoditization of attack tools and methods have made securing the
journey into the Digital World one which is full of risks. So how do organizations create and execute
on their Digital Transformation Strategies, while at the same time ensuring the security and privacy
of their information assets? This presentation looks at some important areas of focus which will help
organizations build a secure and modern enterprise, and take the safer and more Cyber resilient
path to their new Digital Future.

Eric Lam, Director, Enterprise Cyber Security Group, MICROSOFT

3:15-3:45pm Does Blockchain Change How We Think About Security?

Blockchain technologies have caught the attention of the financial, supply chain, and IOT sectors
because of their hyped robustness, verification and authenticity properties, and decentralized
computer/storage.

Do these same qualities offer better security, authentication and penetration controls? To be
sure, blockchains transactions are secure in that they are processed at every node, but does
that raise new security concerns in storing all the data every node-and transmitting all the data
to and from them?
What about privacy and data sovereignty? And are these things truly new: Sharding, state
channels, ring signatures, additively homomorphic encryption, and zero-knowledge?
How do they apply here?
What are Smart Contracts and do they enhance security?
Do these qualities offer new paradigms of how we think about security, authentication and
penetration?
Finally, are blockchains a net plus or minus for cyber security?

Panelist:
Dr. Gajendran Kandasamy, SVP, Information Security, MATCHMOVE PAY INDONESIA
Mustafa Al Bassam, Information Security Advisor, SECURE TRADING UNITED KINGDOM
Neeraj Murarka, Chief Technology Officer, BLUZELLE SINGAPORE
3:45-4:10pm Tea Break

Panel
4:10-5:00pm Inside The Mind of The Hacker
In order to better anticipate how to protect our networks, we need to start thinking like a typical
hacker. In these hands-on sessions, well see how these top hackers breach databases, use the
dark web and penetrate our networks. This interactive and engaging session shares insights on the
Clear & Present danger enterprises face plus where they went wrong. Think like a hacker to prevent
the hack!
Panelist:
Dan Tentler, Founder, PHOBOS GROUP
Choong-Fook Fong, CEO, LE GLOBAL SERVICES
Paul Craig, Head Offensive Security, VANTAGE POINT
Mustafa Al Bassam, Information Security Advisor, SECURE TRADING UNITED KINGDOM

5:10-5:50pm Tackling Cybercrime : How To Defend Against Them


Panel What are the biggest cybercrime threats to Asia and how do they impact on business?
How can Government, the Police and businesses work together to limited cybercrime?
How underreported is cybercrime? How can we encourage organisations to be more open and
report it?
Tackling the rise in user friendly hacking tools
Moderator:
Krishnan Rajagopal, Information Security Advisor, AKATI MALAYSIA
Panelist:
T. Casey Fleming, CEO, BLACKOPS PARTNERS, UNITED STATES
Shahmeer Amir, Bug Bounty Hunter, VEILIUX PAKISTAN
Angel T. Redoble, Chairman, PHILIPPINE INSTITUTE OF CYBER SECURITY PROFESSIONAL
David Graham, Global Insider Threat Detection Leader, GE CAPITAL, AUSTRALIA

DAY 2
8 AUGUST 2017 l TUESDAY

9:00-9:35am Cyber Security Readiness Forget the Hype, Get Back to the Basics

The frequency of cybercrime news stories and successful cyber-attacks has resulted in a seemingly
continuous hype cycle around cyber security. Security vendors are riding the hype cycle to sell more
products in more categories that you can poke a stick at. Threat intelligence, log management, cloud
based security, Next Gen Firewall, APT detection are all touted as the must have products, without
which an organization is exposed. Ashutosh talks about getting back to the basics to effectively
tackle cyber threats. Presentation will be based on his real world experience in enhancing security
in a complex organization. He will show how increased security leadership, visibility of information
assets, data-centric approach and people centric maturity model of security helped him increase
security maturity in his organisation.

Ashutosh Kapse, Head of Cyber Security, IOOF HOLDINGS LTD, AUSTRALIA

9:35-10:10am Incentives in Information Security


This session will explore the human and economic motivations of information security. In order to
understand why people and organisations might employ good or poor security practices, it is
important to understand their motivations. Who is impacted when a breach happens, and who pays
the cost, whats the cost/benefit ratio for investing in security and how do customers react to
products that have poor security?

Mustafa Al Bassam, Information Security Advisor, SECURE TRADING UNITED KINGDOM


10:10-10:25am Networking & Refreshments

10:25-11:00am Understanding the Current Cyber Threat Landscape and Next Generation
Adversaries in Financial Services: What Do You Need To Be Prepared For?
Crucial insights: how cyber criminals conduct their business:
Facts and figures on current attacks against financial institutions
What are the new vulnerabilities that attract hackers?
How collaboration and Public Private Partnerships play a vital role in protecting every
organization
Moderated by:
KC Wong, CEO, CREDIT BUREAU MALAYSIA

11:00-11:50am INTERNET SAFARI : The Current Threat Landscape For Business


Security moves fast. Today one business suffers a compromise; tomorrow a new variant of
ransomware is discovered. How can you cope? Well, it turns out that all of this new terrain in the
security landscape is a repeat of historical problems businesses have had in the past, and is more
manageable than is immediately obvious. This presentation will cover some of the current threats to
businesses at a high level, describe how attackers can gain access to companies, workstations and
networks embedded equipment, and go over some high level mitigations that can prevent you from
spending your time thinking "I really should have known better". With any luck, this talk will help you
ward off future real world attacks with some fairly simple tips.

Dan Tentler, Founder, Phobos Group, USA


Panel
11:50-12:20pm Building Security Into the Next Generation of Things
If we could go back in time, we would design PCs and servers very differently based on the dangers
of Internet-based attacks we are now all too familiar with. Stronger authentications, more secure
operating systems, support for encryption, less vulnerable applications are just a few of the things
we have a chance to better as we build the Internet of Things. A panel of industry security experts
will explore these issues and highlight the key areas of security that can and should be done better
this time around:
Moderator:
Nitesh Dhanjani, Global Head, Information Security Researcher
Panelist:
Ashutosh Kapse, Head of Cyber Security, IOOF HOLDINGS LTD
Sumit Puri, Global Chief Information Officer, MAX HEALTHCARE
Eric Lam, Director, Enterprise Cyber Security Group, Asia, MICROSOFT

12:25-1:00pm Big Data: Your New Sword Against Cyber Attacks

In this keynote, Ali Rebaie will introduce the audience on Big Data and how it is being used in several
industries. Being able to capture streaming data in real-time and detect attacks became a core need
for organizations within this data deluge. New technologies enable them to take proactive decisions
and also to understand the networks of fraud and influential attackers using big data. Also, with the
emergence of IoT architectures across smart cities and companies, fog computing will play a
massive role in securing these IoT
Ali Rebaie, President & Data Science Anthropologist, Rebaie Analytics Group

2:00-2:20pm Platinum Sponsor

2:20-2:40pm Platinum Sponsor


2:40-3:10pm Trust is the New Ethical Battleground to Win the Digital Wars
The unwanted consequence of becoming digital for organizations is how to ensure data privacy and
security for consumers. With IoT and sensors coming, data will grow exponentially. This poses both
a threat and an opportunity to companies because a single data breach could tarnish companys
image and brand. The biggest problem in Asia is the lack of investments happening in cyber security.
It is still viewed as a reactive investment than being proactive. Manish believes we will witness at
least one big privacy and/ or security breach event in the region in 2017 which will force companies
to change their strategy towards cyber security. He talks about why trust is the new battleground for
companies to succeed in the digital economy and what they can do about it. In the coming years, we
are bound to hear of more businesses suffering financial and reputational damage due to the trust
issues as the virtual economy expands. The biggest threat to companies today is not from the
competition, but from their own ability to win and keep consumer trust.
Manish Bahl, Regional Head, Asia Pacific, CENTRE FOR THE FUTURE OF WORK, COGNIZANT

3:10-3:45pm Securing Your Infrastructure ONE BUG AT A TIME

The session will showcase how a modern day organization can utilize the talent of White Hat
Security researchers to secure their infrastructure by means of its own Bug Bounty program. It will
be focused on the explanation of the crowd sourced model of cyber security services to the
attendees and identifying key benefits as to how this model can help prevent greater threats for an
organization and or a national infrastructure. The examples Hack the Army Bug Bounty Program
by the US Dept of Defense will be used as a benchmark to highlight the process of securing a
national infrastructure by means of a Bug Bounty Program

Shahmeer Amir, Information Security Analyst & Bug Bounty Hunter, VEILIUX PAKISTAN

3:50-4:05pm Break & Networking

4:05-4:55pm Drone Privacy and Security Threats

In todays world, consumer-grade, professional and even police-grade Wi-Fi-operated drones offer
threats in terms of security and safety. Drones are sensitive to hijacking attacks, but on the other
hand, can be used to hijack other drones, for spying, or even as attack platforms to critical
infrastructures. The presentation, with the aid of the drone "Atropos", will address state-of-the-art
Wi-Fi-drone security with specific Wi-Fi based solutions designed for the drone world. It will review
how drones can be protected against hijacking and radio jamming attacks, and how this technology
can be used as attacking platforms against wireless networks
David Melndez, R&D Embedded Software Engineer , ALBALA INGENIEROS, S.A.

4:55-5:45pm CLOSING KEYNOTE: Blurred Lines: Hardware, Software & the Internet of Things
Our societies are primed to take modern luxuries for granted. We flip a switch and expect the instant
glow of the electric flame. We open the refrigerator expecting food & drinks to be waiting for us at
just the right temperature. We walk into our homes and expect the air conditioning to continuously
and automatically maintain a comfortable equilibrium between hot and cold temperatures. It is only
in moments when our luxuries are taken away from us that we truly reflect on how much we have
come to depend on them. The Northeast blackout of 2003 not only affected 45 million people but
also caused deaths from misplaced candles. Its only been about 100 years since weve figured out
how to create electricity, yet we cant imagine living in a world without our electrical infrastructure.
Traditionally, the attack vectors to our fundamental luxuries have required physical tampering,
mostly because access to the infrastructure has been isolated from the internet. This is about to
change, with the upcoming onslaught and disruption that will be caused as we look to a future of 40
billion things connected to the internet. In this talk, we will take a fascinating look into abusing the
most popular IoT based devices already available in the market. We will take a look at how a simple
attack can cause a perpetual blackout targeting LED lightbulbs, how bad security decisions have
grossly violated the privacy of families, and how the insecurity of powerful electric cars can put you
at risk. The upcoming IoT age will blur the line between our physical and online lives. Attacks
targeting our online spaces will put our physical security at risk and that of our loved ones. The goal
of this talk is to demonstrate the tangible risk in IoT devices that we are only going to depend on
more as time progresses - it is through these discussions that we can begin to formulate our strategy
for securely enabling our sensor-based future.

Nitesh Dhanjani, Author & Global Head Information Security Researcher, United States of America

5:45pm Lucky Draw

6:00-7:30pm Networking Reception


BIOGRAPHY

Dato Dr Haji Amirudin Abdul Wahab is currently the Mustafa Al Bassam currently is the Information
Chief Executive Officer of Cyber Security Malaysia, a Security Advisor for Secure Trading in London. The
strategic agency under the Ministry of Science, reformed hacker who reportedly hacked fox.com, FBI
Technology and Innovation. He has more than 20 years affiliate Infragard, and Sony - acts as a security advisor
of ICT working experience in the telecom and IT sector on Secure Tradings technology and services, including
in the Government as well as in the semi-government a blockchain research project called Trustery which
and private sectors. Through his leadership at Cyber has been established in a bid to help commercialise
Security Malaysia, Dr Amir managed to contribute to blockchain technologies and improve the visibility and
Malaysias achievement in attaining number #3 rank in security of online payments.Secure Trading has been
the world, in the 2014 International Telecom Union (ITU) named winner of the Best Customer Focus Category at
Global Cyber Security Index and becoming the first the 2016 Best Business Awards, following its work with
World Trustmark Alliance Chairman to be reappointed London School of Economics to help the world-class
to a second term, was selected to receive an ASEAN university increase the rate of its online payments. In
Award as the Outstanding Chief Information/Security 2016, Mustafa was listed by Forbes as one of the 30
Officer Award. Under 30 in the Technology section.

Ali Rebaie is the President and principal industry


KC Wong is currently the CEO of Credit Bureau analyst at Rebaie Analytics Group. He is also a
Malaysia and the 2017 President of the Association of prominent data scientist, consultant and keynote
Credit Reporting Agencies (ACRA). He came to the speaker. As a data science anthropologist, Rebaie
credit reporting industry following a 23 year career in has been studying the impact of data patterns that
investment banking. In 1993, KC was recruited out of govern changes in business, human affairs, and
graduate business school in the US to work for Morgan culture. His research, keynotes, and consulting help
Stanley & Co. and has been with their New York, Tokyo data natives and business executives to draw power
and Hong Kong offices. He left in 1998 to be a Director from these universal patterns to better understand its
of a hedge fund in Hong Kong before returning to impact on people and the role each one of us play in
Malaysia. In Malaysia, he was with OSK Investment the data era. His studies are based on the
Bank before moving on to be Director of Equity philosophical foundations of data, with focus on the
Derivatives at the AmInvestment Bank Group (AIGB) in social underpinnings of technology encounters. As a
2003, where his team pioneered the development of the part of his work at Rebaie Analytics Group, Rebaie
first ETFs in the Malaysian market. In late 2007, KC has led and developed several data science projects
was called to serve as Advisor at the Prime Ministers for Fortune 500 organizations in different industries
Departments Economic Planning Unit, to advise on the such as media, travel, marketing, retail, oil & gas,
Sub-Prime Crisis. After the stint, he rejoined the fashion, energy, and transportation to help them
corporate sector as the CFO for a listed property become competitive in the new economy. Ali Rebaie
holding company. KC returned to investment banking in contributed and quoted in leading technology and
2009 when he was headhunted to be Head of Broking media outlets and also appeared in several lists of
at Hong Leong Investment Bank and subsequently "Who's Who in Big Data" since 2013. Ali was one of
rejoined AmInvestment Bank in mid-2013 as Head of the initiators of School of Data, jury member in
Equity Markets. In 2014, he also served as President of leading big data competitions, and also an Advisory
the Association of Stockbroking Companies Malaysia Board member of the internationally renowned
(ASCM). KC joined Credit Bureau Malaysia in 2015. Boulder BI Brain Trust (BBBT) in Boulder, USA.

Dan Tentler is one of Americas top is a well-known


Michael Wright is the most infamous Opportunity security researcher and the Founder of Phobos USA.
Broker in the Asia Pacific Region. Trained by CEH in Previously, Dan has been the sole proprietor of Aten
the dark arts of Penetration Testing, he can find Labs, a freelance Information Security consultancy
anyone, anywhere. He connects the best talent with firm in San Diego. He is routinely parachuted into
opportunity by using a data-driven, approach. He's various clients in the continental United States, as
the modern day equivalent of a Yue Lao () well as speaking engagements abroad in Australia,
or Old Man of the Moonlight a legendary the UK and Amsterdam. Dan has presented at
matchmaker and fate-weaver from the days of the 44con, BreakPoint, DefCon, BlackHat, ShakaCon,
Tang Dynasty. Michael is now doing classified work and much more. Dan has been interviewed by the
at Grab, South East Asia's best-loved mobile tech BBC, CNN, The San Diego Reader and a variety of
firm, as Head of Talent Acquisition. information security blogs and publications. Dan is
skilled in the arts of the professional bad guy.
BIOGRAPHY

Casey Fleming serves as Chief Executive Officer of Paul Craig leads the offensive security Tiger Team
BLACKOPS Partners Corporation, the leading at Vantage Point, here in Singapore. Paul originally
intelligence, think tank, strategy, and cyber security hails from New Zealand and is an avid hacker with a
advisors to senior leadership of the worlds largest passion for the dark art of exploitation. Paul has been
organizations. Mr. Fleming is widely recognized as a hacking professionally for the past 13 years and
top thought-leader, leading expert and speaker on considers nothing impossible. Paul Craig works with
intelligence, strategy, national security, asymmetrical Asia's strongest and largest banks to help raise their
hybrid warfare, and cyber security. The Cyber security bar and keep Singapore safe. He
security Excellence Awards recently named him developmed techniques and tools that are taught in
Cyber security Professional of the Year. Mr. Fleming the SANS Advanced Penetration Testing (SEC660)
led global organizations for IBM Corporation, Deloitte course and he has spoken at over 50 international
Consulting, and Good Technology. He served as the security conferences world-wide.
founding managing director of IBMs highly
successful Cyber division, now IBM Security. Mr.
Fleming earned his Bachelor of Science degree from Angel Redoble is currently the Chief Information
Texas A&M University and has participated in Security Officer (CISO) of ePLDT, Inc and the
executive programs with Harvard Business School Founding President of Philippine Institute of Cyber
and The Wharton School. Security Professionals (PICSPro). He was Formerly a
Senior Consultant of the Homeland Security
Department of Indra Sistemas, during his 5 year stay
Dani Michaux is the Executive Director of KPMG in Madrid, Spain. In 2013 he was an honoree of the
Management & Risk Consulting based in Malaysia. 2013 Asia Pacific Information Security Leadership
She is currently the Cyber Security Lead for ASEAN, Achievement (ISLA) Award, given by the International
and Cyber Strategic Growth Initiatives (SGI) Lead in Information System Security Certification
ASPAC. She has over 15 years of experience where Consortium, Inc or ISC2. Due to his passion and
she has had the opportunity to consult multiple clients contribution in combating cyber crime in the
on Unified Compliance and Risk Management, Philippines, Angel was a 2013 and 2016 Awardee of
Business Continuity Planning, Information the Philippine National Police Anti Cybercrime Group.
Governance, IT GRC, Information Security He is a Graduate of the Senior Executive Course on
Management Systems, Architecture, Remediation National Security program of the National Defense
Programs, Security Assessment especially to the College of the Philippines, completed his Masters in
Financial, Telecommunications, Energy, and Information Security Management in Universidad
Government sectors. She has also performed a Pontificia de Salamanca campus de Madrid,
number of information security engagement within successfully Completed the program "Cyber Warfare:
Energy and Telecommunication Companies covering Weaponry and Strategies of Digital Conflict",
Process Control Domain Systems and critical Technolytics Institute, USA and a well experienced
infrastructure for Telecommunications Company. She ISO27001 Certified Lead Auditor."
is currently the Chief Information Security Officer
(CISO) of a telecommunications company in
Ashutosh Kapse is currently Head of Information
Malaysia, and she was the acting Chief Information
security, technology risk and audit at IOOF Holdings
Security Officer (CISO) for large vertically integrated
Ltd., one of Australias largest financial services
energy player in Malaysia in 2015, and for a
companies. He is a senior-level professional
Telecommunication player in 2013. She is also part
experienced in security, risk management and audit
of the Cloud Computing Group in KPMG MY and
leadership for over 20 years. His subject matter
leading the Cloud Security initiatives.
expertise is independently validated through industry
certifications including CISM, CRISC, CISA, IRAP,
Krishna Rajagopal is the Group CEO of Akati CCSK and ISO27001 Lead Auditor. He has worked
Malaysia where he develops, maintains and publishes as a consultant in Australia and has provided
information security standards, policies, procedures and advisory to numerous organizations in developing
guidelines for the companys key clients. He is also an and implementing Governance, Information Security
expert witness assisting various enforcement bodies Management Systems, and Risk Management
across the globe. Krishna conducts trainings and Frameworks. He has a proven track record in being
provides services as a consultant globally. Krishna is able to present and influence at the board and
often invited to speak in conferences, forums & C-suite level. His thought leadership is evidenced
television interviews related to Infosec which also through speaking invitations to various international
includes development of secure practises . Moreover, security & GRC conferences including Ignite2015 in
Krishna has trained several international Police forces Las Vegas, North America CACS in Dallas,
on security measures and he is accredited as a International Security conference in Mexico and Asia
specialist in forensic investigation and prosecution of Pacific.
hackers and fraudsters.
BIOGRAPHY

Manish Bahl leads Cognizants Center for the Future Jorge Sebastiao is a seasoned cloud, managed
of Work in Asia Pacific. A respected speaker and services & security professional focused on business
thinker,Manish has guided many Fortune 500 value; Hebrings experience, creativity, structure and
companies into the future of work with his innovation to the solutions he architects ICT
thought-provoking research and advisory skills. he infrastructure. With over 28 years of ICT experience,
helps ensure that the units original research and covering, C level on Cloud Computing, Cyber
analysis jibes with emerging business-technology Security, Physical Security, Managed Services,
trends and dynamics in Asia, and collaborates with a managed security services, business continuity, and
wide range of leading thinkers to understand how the disaster recovery as well as governance, risk
future of business will look. His professional expertise management, compliance, auditing, certification.
spans business technology strategy and planning, Served sectors include oil & gas, banking, financial,
C-level thought leadership, innovation, and sales & telecom, government, defence, healthcare, and
marketing. He most recently served as Vice education. Jorge created the process A6 of security:
President, Country Manager with Forrester Research Assess, Architect, Apply, Administer, Awareness &
India where he provided strategic guidance to Agility. He architects practical & business focused
Forrester clients and drove Forresters growth in the Cloud and Security solutions using standards &
Asia Pacific region. His research covered IT strategy, industry best practices.
strengthening the linkage between business and
technology, disruptive start-ups, and the overall
technology services market in Asia Pacific.

Choong-Fook Fong has had considerable Sumit Puri is an experienced IT Leader with over 23
experience in the IT industry and is a 15 year veteran years of work experience in conceptualizing digital
in the specialized and highly-demanding arena of enterprise strategy and enabling operational process
information security; his special focus is undertaking transformation in leading organizations in Asia. He
IT security trainings and consultations to match has carried out IOT led digital innovation besides
strategic business objectives. He has consulted with, facilitating several new digital business models as
and trained multiple government and multinational CIO, Max Healthcare. Prior to his stint as CIO, Max
clients in the Asia Pacific, Eastern Europe and Africa Healthcare, he has played diverse senior roles in
regions on information system security, enterprise Prudential Corporation Asia as VP- Regional
risk matrix design, policy review, policy Operations, CIO Prudential Indonesia, Senior Vice
implementation assurance, penetration testing, President at ICICI Prudential, Global Digitization
technical configuration evaluation, security Leader at GENPACT and Senior management
procedures and disaster recovery/business continuity consultant at PricewaterhouseCoopers(India). He is
planning. Also as guest speaker for Federal Bureau LEAN, Six Sigma and PMP certified, has strong
of Investigation (FBI)s INFRAGARD event, Mr. Fong leadership skills and a passion for innovation.
is imminently qualified in his field in that he holds
both academic and professional qualifications.

Brett Williams is an Information Security


Professional and is widely recognized for his Shahmeer Amir is the Information Security Analyst,
extensive and in-depth knowledge of the IT security Application Security Researcher, Bug bounty hunter,
landscape. He has had experience working across and Forensics Examiner of Veiliux based in Pakistan,
industry sectors including finance, government, Veiliux is a Cyber Security startup, one of its kind
health and education, he is responsible for helping aiming to provide adequate cyber security services to
customers better manage their cyber risk and online businesses that are cost affective, resource
information security across their enterprises. Brett reductive, time reductive and of quality. Shahmeer is a
has over 25 years experience working in IT competent and skilled Security Researcher that
infrastructure and Security with a focus on incident specializes in all aspects of Information Security and
response, advanced threat detection, security also a vibrant Electronics Engineer. He also hold many
operations and digital forensics. Currently Brett is certifications that emphasize and promote his skills as a
the Sales Engineering Division for Asia Pacific and Security researcher as well as an Engineer. He has
Japan at Carbon Black, based in Australia; where he worked with one of the leading Security Services
works with customers to build solutions to detect, Providers in Pakistan as well as in the middle east. He
respond and prevent advanced cyber-attacks on end also remained Top Hacker on Hackerone platform for
points from desktops, servers, ATMs and industry almost 8 months.
control systems.
BIOGRAPHY
Nitesh Dhanjani is a well known security researcher, Niclas Kjellin is one of Europes experienced mobile
author, and speaker. Dhanjani is the author of Abusing and security architect and working with the
the Internet of Things: Blackouts, Freakouts, and development of Enterprise apps he knows the
Stakeouts. He has also written Hacking: The Next importance of security early on. He is the team leader of
Generation, Network Security Tools: Writing, Hacking, the most creative and innovative app dev team in South
and Modifying Security Tools, and HackNotes: Linux of Sweden and security is always considered for every
and Unix Security. He is also a contributing author to step in each project. Working with technology that
Hacking Exposed 4 and HackNotes: Network enables new experiences and makes people connect
Security. Dhanjani has been invited to talk at various from all over the world, while never forgetting the
information security events such as the Black Hat importance of security and privacy. Apart from his
Briefings, RSA, Hack in the Box, Microsoft Blue Hat, knowledge within mobile development and security
and OSCON. Dhanjani is currently executive director at architecture, Niclas is also an experienced speaker and
a large consulting firm, where he advises some of the have held several talks about digital security, particular
largest corporations around the world on how to security related to software development, but also on
establish enterprise-wide information security programs more softer sides, involving the actual users and the
and solutions. Dhanjani is also responsible for forces that drives us all. Niclas Kjellin is an IT security
evangelizing brand new technology service lines around expert at SIGMA and has many years of experience in
emerging technologies and trends such as cloud developing secure software. Together with an education
computing and virtualization. at Stanford University in software security, he can also
entitle himself Certified Ethical Hacker and fights for the
ordinary user in a connected, although insecure, world.
David Graham is responsible for protecting GE Capital
from data breaches and theft of intellectual property
David Melendez works as the Research and &
incidents that involve employees, contractors and third
Development software engineer for TV Studio
parties with trusted access to GE infrastructure and
manufacturer company, Albal Ingenieros in Madrid,
information. Davids 23-year career experience covers
Spain. He has won several prices in robotic
both corporate and law enforcement roles providing him
tournaments in Spain like CampusParty and ISACA,
with experience investigating and reporting on all
and has been speaker in several conferences
manner of cyber threats, electronic crime, incident
worldwide about drones architecture and security, like
response, cyber law and forensic data analysis both
RootedCON, NavajaNegra, 8.8 Security Conference
within law enforcement and corporate environments.
Chile, Nuit Du Hack, Codemotion, HKOSCON or
As SME for Victoria Police (Australia) David managed
Cymass Dubai. He has a Bachelor Computer Degree
and processed complex electronic crime scenes,
by Wales University.
investigated protracted and multi-jurisdictional
electronic based crime ranging from offences against
the person, terrorism and computer crime Gajendran Kandasamy is SVP of Information
investigations. Since then David has headed up the Security at MatchMove. Previously he was General
cyber security response team in GECC A&NZ, before Manager of ICT & Business Solutions at TV
moving across to GEHQ which saw him responsible for Rheinland, and worked in academic roles in UK,
designing and deploying the Insider Threat program Australia and Asia. He obtained a PhD in Physics
enabling GE Capital to execute on its global strategy of from the University of Melbourne and a PhD in
divestiture with the right strategy in place to protect its Innovation & Entrepreneurship from Imperial College
critical business data. London. He is also Payment Card Industry
Qualified Security Assessor and a Certified
Innovation Management Maturity Model Professional.

Chalee Vorakulpipat is currently the head of


Cybersecurity Laboratory, National Electronics and Eric Lam is the Director, Enterprise Cyber Security
Computer Technology Center (NECTEC) in Thailand. Group for MICROSOFT Asia. He is the Regional
He has been involved in several projects in business leader for Cyber Security. Managing a
information security (including ThaiCERT), mobile regional team of Solution Specialists, with subject
device management, social networking sites, matter expertise in the domains of cyber security, and
ubiquitous computing, context-aware computing, cybercrime prevention. Serving top enterprises in
e-health, and mobile application development. He Financial Services, eCommerce, Government,
has over thirty refereed publications in these areas. Defense, Law Enforcement, Telco/Media/XSP,
He also serves as a subcommittee member on Transportation/Logistics, Healthcare, Utilities,
issues regarding national information security of Petroleum/Pharmaceuticals, and High-Tech
Thailand. In his academic role, he works as a lecturer Manufacturing Industries. His specialties includes
for information systems courses at several sales leadership, business development, enterprise
universities across Thailand. solutions sales.
Registration Contract
Please complete this form immediately
and fax to: +603 2260 7500

Authorisation

Signatory must be authorized to sign on behalf of


7-8 August 2017 contracting organization
Sheraton Imperial Hotel Kuala Lumpur Name:....................................................................................

Confirm your seat with : Job title:.................................................................................


Signature:..............................................................................
MAZ +603 2260 7500 Email:.....................................................................................
Telephone:.............................................................................
Fees Mobile:...................................................................................

Early Bird @RM3,200 + 6%GST Venue


(RM3,392.00) by 18 May 2017
Sheraton Imperial Hotel, Kuala Lumpur
Tel: 603 - 2717 9900
Training Fee @RM3,500 + 6%GST Hotel Accommodation:
(RM3,710.00) after 18 May 2017 Special rates have been negotiated with the hotel for conference
delegates. Please make your bookings directly with the hotel and
indicate that you are attending
Premier Plus at RM14,500 + 6%GST
(RM15,370.00) for a group registration of
5 delegates from same company Method of payment
PAYMENT MUST BE RECEIVED BEFORE EVENT
Bank Transfer
Crossed cheque payable to
Details THOMVELL INTERNATIONAL SDN BHD
Bank Transfer:
Organization name:............................................................... Payment by bank transfer must quote the event code TVW 4837 and
delegate name. Transfer should be made to Hong Leong
Address:...................................................................................
Bank Bhd, 110 Jalan Tun Sambanthan, Kuala Lumpur
...........................................
Postcode:................................................................................ Account Name : THOMVELL INTERNATIONAL SDN BHD
Account No : 199 00000 390
Country:...................................................................................
Tel:............................................................................................ Cancellation
.................................................................. You may substitute delegates at any time. THOMVELL
Fax:...........................................................................................
INTERNATIONAL does not provide refunds for cancellations. For
cancellation received in writing more than seven (7) days prior to the
Delegate conference you will receive a 100% credit to be used at another
THOMVELL INTERNATIONAL event for up to one year from the date of
issuance. For cancellation received seven (7) days or less prior to an event,
1. Name:.............................................................................. no credit will be issued. In the event that THOMVELL INTERNATIONAL
cancels an event, delegate payments at the date of cancellation will be
Job title:........................................................................... credited to a future THOMVELLs event. This credit will be available for up
Email:............................................................................... to one year from the date of issuance.

In the event that THOMVELL postpones an event, delegate payments at the


2. Name:.............................................................................. postponement date will be credited towards the rescheduled date. If the
Job title:........................................................................... delegate is unable to attend to rescheduled event, the delegate will receive
a 100% credit representing payments made towards a future
Email:................................................................................ THOMVELL event.

3. Name:..............................................................................
.... THOMVELL INTERNATIONAL shall assume no liability whatsoever in
the event this conference is cancelled, rescheduled or postponed due
Job title:........................................................................... to a fortuitous event, Act of God and unforeseen occurrence.
Email:................................................................................

Invoice
3 EASY WAYS TO REGISTER

The Invoice should be directed to Mr / Ms / Dept: +603 2260 6500 +603 2260 7500
Name:.................................................................................... 8-1, Jalan Tun Sambanthan 3, 50470 Kuala Lumpur
.................................................................................. maz@thomvell.com
Dept:......................................................................................
Tel:......................................................................................... For official use only
.............
Email:..................................................................................... Received: Date Code: TV4837