To watch the virtual conference Click Here

Chairman Address

Allan Dyer

10:00 AM to 10:10 AM - SGT

Welcome Address

J. Kesavardhanan


10:10 AM to 10:20 AM - SGT

Keynote Address 1 - The Evolution of Threat Actors: Firmware is the Next Frontier

Alex Matrosov

BInarly Inc.

10:20 AM to 10:50 AM - SGT


10:50 AM to 11:00 AM - SGT

Arm'd & Dangerous: Analyzing arm64 Malware Targeting macOS

Patrick Wardle


11:00 AM to 11:30 AM - SGT

GhostEmperor: From ProxyLogon to Kernel Mode, Story of a Modern Day Rootkit

Mark Lechtik, Aseel Kayal, Paul Rascagnères, Vasiliy Berdnikov


11:30 AM to 12:00 PM - SGT

Cobalt Counter Strike

Lokesh J

K7 Computing

12:00 PM to 12:30 PM - SGT


Gil Mansharov, Ben Herzog

Check Point

12:30 PM to 01:00 PM - SGT


01:00 PM to 01:10 PM - SGT

Panel Discussion - Moving from theory to practice: making cybersecurity practical for users

J. Michael Daniel, Cyber Threat Alliance
Samir Kanu Mody, K7 Computing
Chintan Trivedi, Broadcom
Anna Chung, Palo Alto Networks

01:10 PM to 01:50 PM - SGT

XMRIG MINER – Taking stealth to a new level!

Tejaswini Sandapolla

Quick Heal Technologies Limited

01:50 PM to 02:20 PM - SGT

Using third-party SDKs to detect repackaged malicious Android applications

Catalin-Valeriu Lita , Doina Cosovan


02:20 PM to 02:50 PM - SGT

Welcome to Day2

10:00 AM to 10:05 AM - SGT

Keynote Address 2 - Digitial Intelligent Industrial Transformation Journey

Sachin Shah

Armis Security

10:05 AM to 10:35 AM - SGT

Modern World Android Malware and Sandbox Evasion Techniques

Shivang Desai

Zscaler Inc

10:35 AM to 11:05 AM - SGT

Attacking Apple: Mac Malware and Zero-Day Threats in 2021

Joshua A. Long


11:05 AM to 11:35 AM - SGT


11:35 AM to 11:45 AM - SGT

The (R)Evil Within

Janus Agcaoili

Trend Micro

11:45 AM to 12:15 PM - SGT

Dissecting the Exchange Server Saga: A Practical Deep Dive into the Vulnerabilities

P Mohith Kalyan, Anurag Shandilya

K7 Computing

12:15 PM to 12:45 PM - SGT


12:45 PM to 12:55 PM - SGT

Meet Indra: Uncovering the Hackers Behind Attacks on Iran Railways

Itay Cohen, Alexandra Gofman

Check Point

12:55 PM to 01:25 PM - SGT

Transparent Tribe VBA code and its Sidewinder mimicry

Vanja Svajcer


01:25 PM to 01:55 PM - SGT


01:55 PM to 02:05 PM - SGT


Vladislav Hrčka


02:05 PM to 02:35 PM - SGT

Panel Discussion - Challenges of testing in the current Cybersecurity Climate from a Tester's and Vendor's perspective

Eddy Willems, GData
Righard Zwienenberg, ESET
Peter Stelzhammer, AV-Comparatives
Hariharan S, K7 Computing
Gavrilut Dragos, BitDefender
Jiri Sejtko, AVAST

02:35 PM to 03:15 PM - SGT

Award Ceremony

03:15 PM to 03:25 PM - SGT

Closing Address

J. Kesavardhanan


03:25 PM to 03:30 PM - SGT

Qbot & IcedID Loader are the Dons Given Don Emotet Sleeps with the Fishes

Arun Kumar S, Rajeshkumar R

K7 Computing pvt ltd

Abusing Excel 4.0 Macro to Distribute Malware

Prashant Tilekar, Anjali Raut

Quick Heal Technologies

The DarkSide of ransomware (Colonial Pipeline attack and other threats)

Rohit bankoti, Souhardya Sardar

Cyberstanc corp

Old and Bold: DDoS Advancing the Gameplay of Ransomwares

Felissa Mariz D. Marasigan , Arabelle Mae F. Ebora

Verizon, MERALCO

Latest Sandbox Evasion Techniques

Ramesh Dhanalakota, Mary Silviya


Android Stalkerware: Hunting, analysis, and detection

Shankar Raman Ravindran


Death by a thousand cuts: the rise and rise of information stealers

Dmitry Bestuzhev, Santiago Martin Pontiroli


Hunting in the Field of Cybersecurity: The Microsoft Exchange Fiasco

Earle Maui Earnshaw, Arianne Dela Cruz

Trend Micro Inc.

Four macro trends in cybersecurity and what they mean for you

J. Michael Daniel

Cyber Threat Alliance (CTA)

Note: There are possibilities of changes in the program timing and slots till the conference date, keep visiting our website to keep track of the latest updates.

Sponsors & Partners