Agenda
Wednesday, 30th November, 2022 |
16:00 – 18:00 | Registration opens |
18:30 – 21:00 | Welcome Drinks Reception |
Conference Day 1: Thursday, 1st December, 2022 |
9:00 – 9:30 | Registration opens | ||
9:30 – 10:40 | Opening of Conference, Keynote speech(es) | ||
10:40 – 11:00 | Break |
Track 1 | Track 2 | |||
11:00 – 11:30 | Twisted Panda: attacks against the Russian defense sector Alexandra Gofman, David Driker, Check Point |
11:00 – 11:30 | DSE, KDP And Everything In Between: Novel Techniques To Run Unsigned Rootkits Omri Misgav, Fortinet |
|
11:30 – 12:00 | SparklingElf, recent supplies to SparklingGoblin’s Linux malware arsenal, new ties to APT41 Vladislav Hrčka, ESET |
11:30 – 12:00 | Operation Dragon Castling: Suspected APT Group Hijacks WPS Office Updater to Target East Asian Betting companies Luigino Camastra, Igor Morgenstern, Avast |
|
12:00 – 12:30 | SMS PVA: how infected smartphones are used to register fake accounts Ryan Flores, Trend Micro |
12:00 – 12:30 | Taohuawu, A much more sophisticated evolution from WHQL signed NetFilter rootkit Robert Xiang Wang, Imran Khan, NortonLifeLock |
|
12:30 – 13:45 | Lunch | |||
13:45 – 14:15 |
Kihong Kim, SANDS Lab, Inc. |
13:45 – 14:25 | Panel discussion – Cybersecurity Trends for 2023 and Beyond Yul Bahat, Kiteworks Ajay Kumar, CrowdStrike Anil Malekani, Microsoft Rudy Lim, Accenture Security |
|
14:15 – 14:45 | Earth Berberoka: An Analysis of a Multivector and Multiplatform APT Campaign Targeting Online Gambling Sites Jaromir Horejsi, Trend Micro |
14:25 – 14:45 | Full Attack Chain Testing – How to test any security product usefully Simon Edwards, SE Labs |
|
14:45 – 15:15 | XLLing in Excel – the world of malicious add-ins Vanja Svajcer, Cisco Talos |
14:45 – 15:15 | Spoofing Microsoft M365 service to bypass most of the email security protections Reegun Richard Jayapaul, Trustwave |
|
15:15 – 15:35 | Break | |||
15:35 – 16:05 | Panel Discussion: The Curse of the False Positive Stefan Haselwanter, AV-Comparatives Robert Neumann, Acronis Evgeny Vovk, Kaspersky Vanja Svajcer, Cisco Righard Zwienenberg, ESET Eddy Willems, G Data Samir Mody, K7 Computing |
15:35 – 16:05 | Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin Filip Jurčacko, ESET |
|
16:05 – 16:35 | Sha Zhu Pan : The Cryptocurrency cocktail that started in Asia but is conquering the world Jagadeesh Chandraiah, Xinran Wu, Sophos |
16:05 – 16:35 | Guard My Windows Anurag Shandilya, K7 Computing |
|
16:35 – 17:05 | CFGDump: A tool for generic unpacking of polymorphic packed binaries Craciun Vlad Constantin, Andrei Catalin Mogage, Bitdefender |
16:35 – 17:05 | Surviving the Era of Active Directory Attacks through in-Network defense Chintan Shah, Trellix |
|
17:05 – 17:35 | Indian Power Sector targeted with latest LockBit 3.0 variant Sathwik Ram Prakki, Quick Heal |
17:05 – 17:35 | eCrime – A Coming of Age Tale Aaron Aubrey Ng, Crowdstrike |
|
18:45 | Bus pick up from Carlton Hotel to Gala Dinner venue | |||
19:15 – 20:00 | Pre-dinner Drinks | |||
20:00 – 22:00 | Gala Dinner |
Conference Day 2: Friday, 02nd December, 2022 |
10:00 – 10:30 | Keynote address: ♬ You ain’t seen nothing yet ♫ Righard Zwienenberg, ESET Eddy Willems, G Data CyberDefense |
||
10:30 -11:00 | The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day Itay Cohen, Israel Gubi, Check Point |
||
11:00 -11:20 | Break |
Poster Presentations |
The dark side of Potential Unwanted Applications Latokhin Dmitrii Vladimirovich, Kaspersky |
Ransomware Archetypes: The Rise of Linux-based Ransomware Earle Maui Earnshaw, Arianne Dela Cruz, Trend Micro Inc. |
Evaluation of GuLoader Malware – It’s Techniques and Tactics Sarang Popat Sonawane, Crowdstrike |
Reserve Paper |
If The Hype Doesn’t Kill You, Flawed or Missing Analysis Will Randy Abrams, SecureIQLab |
Saturday, 03rd December, 2022 |
9:00 – 19:00 | Singapore tour |
Click here for more details. |