Agenda
04th December, 2024, Wednesday |
16:30 – 18:00 | Registration |
19:00 Onwards | Welcome drinks reception and dinner |
Conference Day 1: 05th December, 2024, Thursday |
9:00 – 9:30 | Registration | ||
9:30 – 9:40 | Welcome Address: Kesavardhanan J, CEO, AVAR | ||
9:40 – 10:00 | Keynote Address: Artificial Intelligence in Cyber Security Lt General (Dr) Rajesh Pant, Chairman – Cyber Security Association of India |
||
10:00 – 10:20 | Keynote Address: Mr. Kumar Jayant, IAS – Additional Chief Secretary to Government, Information Technology and Digital Services, Government of Tamil Nadu | ||
10:20 – 10:40 | Keynote Address: Digital Defence – Uncovering the shadows Anujh Tewari, Chief Security Advisor (India & South Asia) – Microsoft |
||
10:40 – 11:00 | Break |
Track 1 | Track 2 | CISO Connect | ||||||
11:00 – 11:30 | NGate: Novel Android malware for unauthorized ATM withdrawals via NFC relay Lukas Štefanko, Jakub Osmani, ESET |
11:00 – 11:30 | Bypassing evasive binaries with Dynamic Binary Instrumentation Dr. Vlad Constantin Craciun, Andrei Catalin Mogage, Bitdefender |
11:00 – 11:10 | Introduction to CISO workshop | |||
11:30 – 12:00 | Leveraging Generative AI for Revolutionizing Malware Analysis: A Gemini-Powered Approach Marvin Castillo, Lovely Jovellee Lyn B Antonio, G-Data |
11:30 – 12:00 | Exploitation of 0-day vulnerability in Yandex.Browser for persistence Ivan Korolev, Igor Zdobnov, Doctor Web |
11:10 – 11:40 | Adversarial Use of GenAI Michael Daniel, CTA |
|||
12:00 – 12:30 | The Dark Evolution: MuddyWater’s New Tactics and the Manticore Alliance Lomada Suresh Reddy, Uma Madasamy, K7 Computing |
12:00 – 12:30 | Exploiting JSON Injection in Microsoft 365 Admin Portal for Email Security Evasion in Spear-Phishing Operations Reegun Richard Jayapaul, Trustwave |
11:40 – 12:10 | The Invisible Line: Securing Endpoints in a World Without Boundaries Romanus Raymond Prabhu, Zoho Corporation (Manage Engine) |
|||
12:30 – 12:50 | Behind Enemy Lines: Discovering Initial Phases of Cyber Attacks in Asia Jose Luis Sanchez, VirusTotal – Google |
12:30 – 12:50 | EastWind Campaign: Defending Against the Latest APT31 Attacks (Sponsor Presentation) Georgy Kucherin, Kaspersky |
12:10 – 12:40 | The Future of Cybercrime – Fact or Fiction? Peter Stelzhammer, AV-Comparatives |
|||
12:40 – 12:50 | ||||||||
12:50 – 14:00 | Lunch | |||||||
14:00 – 14:30 | Double check your Zabbix agents: The mystery of GoblinRAT Vladimir Nestor, Solar |
14:00 – 14:20 | TBD Ankercloud |
|||||
14:30 – 15:00 | Rise of Synergistic threats: Deception, face swap, GenAI, and obscure Crypto DEX, following the trail of evasive iOS and Android apps Jagadeesh Chandraiah, Sophos |
14:30 – 15:10 | Supply Chain Integrity: Cyber Defense Strategies in the Digital Era (Panel Discussion) Balakrishnan Kanniah, VA Tech Wabag Debasish Das, One Tata Operating Network Kannan Srinivasan, GAVS Technologies Manickam Kanniah, Verizon Vimalaasree Anandhan, Poshmark |
14:20 – 15:00 | Third Party Vendor Risk Management Akkaiah Janagaraj, LTIMindtree Ashok Kumar Jeyachandran, G3 Cyberspace Subramanian Vaithi, Nium Sarita Padmini, Protiviti Peter Stelzhammer, AV-Comparatives |
|||
15:00 – 15:30 | SAETI: State-Actor Empowered Threat Intelligence… A Good or a Bad thing? Righard Zwienenberg, Eddy Willems, ESET, WAVCi |
15:10 – 15:30 | Harnessing Language Models for Detection of Evasive Malicious Email Attachments Abhishek Singh, Kalpesh Mantri, InceptionCyber.ai |
15:00 – 15:20 | Axidian Shield – Identity Threat Detection and Response (ITDR) Kirill Bondarenko, Axidian |
|||
15:20 – 15:30 | Interactive Q&A session | |||||||
15:30 – 15:50 | Break | |||||||
15:50 – 16:20 | Cloudy With a Chance of RATs: Unveiling APT36 and The Evolution of ElizaRAT Itan Delshad, Check Point |
15:50 – 16:10 | TBD | |||||
16:20 – 16:50 | Hunting for Operation FlightNight: Attack Targeted towards Indian Government and Energy sectors Amey Gat, Fortinet |
16:10 – 16:30 | Beyond the Radar: Analysing the Linux Variant of RedTail Malware Prashant Tilekar, Forescout Technologies |
|||||
16:30 – 16:50 | Reimagining a robust supply chain security architecture Pradeep Sekar, Optiv Security |
|||||||
19:00 – 19:30 | Pre-dinner Drinks | |||||||
19:30 – 22:00 | Gala Dinner |
Conference Day 2: 06th December, 2024, Friday |
10:00 – 10:20 | Keynote Address: 5G and AI Security will revolutionise next decade digital landscape Dr. Debabrata Nayak, Director – PwC |
||
10:20 – 10:40 | Keynote Address: Threat Intelligence from the Frontlines: A Global Perspective on Evolving Cyber Threats Igor Kuznetsov, Director, Global Research and Analysis Team – Kaspersky |
Track 1 | Track 2 | |||
10:40 – 11:10 | From Code to Crime: Exploring Threats in GitHub Codespaces Jaromir Horejsi, Trend Micro |
10:40 – 11:10 | GPT vs Malware Analysis: Pitfalls and Mitigations Ben Herzog, Check Point |
|
11:10 – 11:40 | Exploring vulnerable Windows drivers Vanja Svajcer, Cisco |
11:10 – 11:40 | Navigating Cybersecurity Challenges and Adversaries in Smart Power Meter Technologies Vikas Karunakaran, Sectrio |
|
11:40 – 12:00 | Lazarus targets freelance developers with DeceptiveDevelopment Matej Havranek, ESET |
11:40 – 12:00 | Challenges in Reverse Engineering Rust-based Malware Nguyen Tien Cong, Bui Huy Anh, CMC Cyber Security |
|
12:00 – 12:20 | Break | |||
12:20 – 12:50 | Charming Viper, Vanishing Crypto Dhanush, Arun Kumar, K7 Computing |
12:20 – 13:00 | The Human Element in Cyber Security (Panel Discussion) Chethan S. Iyengar, Standard Chartered Jeannette Jarvis, Cyber Threat Alliance Lalit Gupta, Al Gihaz Holding Righard Zwienenberg, ESET Vimalaasree Anandhan, Poshmark |
|
12:50 – 13:20 | Beyond the Package: The New Frontier of MSIX Attack Prakash Galande, Nitin Shekokar, Symantec – BROADCOM |
13:00 – 13:20 | TBD | |
13:20 – 14:30 | Lunch | |||
14:30 – 15:00 | Should Your EDR Be Based in User-mode? You Might Want to Reconsider Omri Misgav, Independent Security Researcher |
|||
15:00 – 15:30 | Deep into the evolution of the SteganoAmor campaign: how the TA558 attacked companies around the world Aleksandr Badaev, Kseniia Naumova, Positive Technologies |
15:00 – 15:20 | RATs in the sewers: diving into the BitTorrent cesspool (Sponsor Presentation) Martin Jirkal, Roman Šíma, ESET |
|
15:30 – 15:50 | With Great Research Comes Great Responsibility (Sponsor Presentation) Michael Daniel, Cyber Threat Alliance |
15:20 – 15:50 | Sweet and Spicy Recipes for Government Agencies by SneakyChef Chetan Raghuprasad, Cisco |
|
15:50 – 16:10 | Break | |||
16:10 – 16:50 | Securing your Cloud Infrastructure: Navigating the Dangers (Panel Discussion) Dr. Anshu Premchand, Tech Mahindra Kavitha Srinivasulu, TCS Michael Daniel, Cyber Threat Alliance Nasreen Dawood, Deloitte Navaneethan M, Cywayz Santhosh Jayaprakash, Unosecur |
16:10 – 16:50 | Healthcare Cyber Attacks: Managing the Domino Effect (Panel Discussion) Diptesh Saha, Accel Limited Gowdhaman Jothilingam, LatentView Analytics Kannan Srinivasan, GAVS Technologies Senthil Subramaniam ESR, Infinite Computer Solutions Smith Gonslaves, CyberSmith Secure |
|
16:50 – 17:10 | The Rise And Fall Of Golang Malware Subhajeet Singha, Quick Heal |
16:50 – 17:10 | TBD | |
17:10 – 17:20 | Closing address | |||
17:20 – 18:05 | EGM and Members’ meeting |
Poster Presentation |
Paving the Path for IoT Security Certification Martin Nocker, Dr. Pascal Schöttle, MCI Innsbruck |
Reserve Papers |
Build your Own AI Research Assistant via “small” Large Language Models Georgelin Manuel, K7 Computing |
Industry Certificate Blocking List? Samir Mody, K7 Computing |
HDDCryptor on Rise Soumen Burma, Rumana Siddiqui, QuickHeal & Seqrite |
Note: Agenda is subject to change based on speaker schedules.