Chairman Address

Allan Dyer

10:00 AM to 10:10 AM - SGT

Welcome Address

J. Kesavardhanan

10:10 AM to 10:20 AM - SGT

Break

10:50 AM to 10:55 AM - SGT

Arm'd & Dangerous: Analyzing arm64 Malware Targeting macOS

Patrick Wardle

Objective-See

10:55 AM to 11:25 AM - SGT

Cobalt Counter Strike

Lokesh J

K7 Computing pvt ltd

11:25 AM to 11:55 AM - SGT

Break

11:55 AM to 12:00 PM - SGT

XMRIG MINER – Taking stealth to a new level!

Tejaswini Sandapolla

Quick Heal Technologies Limited

12:00 PM to 12:30 PM - SGT

GhostEmperor: From ProxyLogon to Kernel Mode, Story of a Modern Day Rootkit

Mark Lechtik, Aseel Kayal, Paul Rascagnères, Vasiliy Berdnikov

Kaspersky

12:30 PM to 01:00 PM - SGT

Break

01:00 PM to 01:05 PM - SGT

Break

01:45 PM to 01:50 PM - SGT

Pay2Key

Gil Mansharov, Ben Herzog

Check Point

01:50 PM to 02:20 PM - SGT

Using third-party SDKs to detect repackaged malicious Android applications

Catalin-Valeriu Lita , Doina Cosovan

SecurityScorecard

02:20 PM to 02:50 PM - SGT

Closing Address

02:50 PM to 02:55 PM - SGT

Welcome to Day2

EmCee

10:00 AM to 10:05 AM - SGT

Modern World Android Malware and Sandbox Evasion Techniques

Shivang Desai

Zscaler Inc

10:05 AM to 10:35 AM - SGT

Attacking Apple: Mac Malware and Zero-Day Threats in 2021

Joshua A. Long

Intego

10:35 AM to 11:05 AM - SGT

Break

11:05 AM to 11:10 AM - SGT

Auto classification Web Attack and model to detect authorization bypass exploit

Giang Hoang Nguyen, Tai Anh Nguyen

CMC CyberSecurity

11:10 AM to 11:40 AM - SGT

Dissecting the Exchange Server Saga: A Practical Deep Dive into the Vulnerabilities

P Mohith Kalyan, Anurag Shandilya

K7 Computing pvt ltd

11:40 AM to 12:10 PM - SGT

Break

12:10 PM to 12:15 PM - SGT

Meet Indra: Uncovering the Hackers Behind Attacks on Iran Railways

Itay Cohen, Alexandra Gofman

Check Point

12:55 PM to 01:25 PM - SGT

Break

01:25 PM to 01:30 PM - SGT

Transparent Tribe VBA code and its Sidewinder mimicry

Vanja Svajcer

Cisco

01:30 PM to 02:00 PM - SGT

FontOnLake

Vladislav Hrčka

ESET

02:00 PM to 02:30 PM - SGT

Award Ceremony

02:30 PM to 02:40 PM - SGT

Closing Address

02:40 PM to 02:45 PM - SGT

Qbot & IcedID Loader are the Dons Given Don Emotet Sleeps with the Fishes

Arun Kumar S, Rajeshkumar R

K7 Computing pvt ltd

Abusing Excel 4.0 Macro to Distribute Malware

Prashant Tilekar, Anjali Raut

Quick Heal Technologies

The (R)Evil Within

Janus Agcaoili

Trend Micro

The DarkSide of ransomware (Colonial Pipeline attack and other threats)

Rohit bankoti, Souhardya Sardar

Cyberstanc corp

Old and Bold: DDoS Advancing the Gameplay of Ransomwares

Felissa Mariz D. Marasigan , Arabelle Mae F. Ebora

Verizon, MERALCO

Latest Sandbox Evasion Techniques

Ramesh Dhanalakota, Mary Silviya

Microsoft

Death by a thousand cuts: the rise and rise of information stealers

Dmitry Bestuzhev, Santiago Martin Pontiroli

Kaspersky

Tales From The DarkSide

Christopher Elisan

PolySwarm

Hunting in the Field of Cybersecurity: The Microsoft Exchange Fiasco

Earle Maui Earnshaw, Arianne Dela Cruz

Trend Micro Inc.

Note: There are possibilities of changes in the program timing and slots till the conference date, keep visiting our website to keep track of the latest updates.