Agenda

04th December, 2024, Wednesday
16:30 – 18:00Registration
19:00 Onwards Welcome drinks reception and dinner
Conference Day 1: 05th December, 2024, Thursday
9:00 – 9:30 Registration
9:30 – 9:40 Welcome Address: Kesavardhanan J, CEO, AVAR
9:40 – 10:00 Keynote Address: Artificial Intelligence in Cyber Security
Lt General (Dr) Rajesh Pant, Chairman – Cyber Security Association of India
10:00 – 10:20 Keynote Address: Mr. Kumar Jayant, IAS – Additional Chief Secretary to Government, Information Technology and Digital Services, Government of Tamil Nadu
10:20 – 10:40 Keynote Address: Digital Defence – Uncovering the shadows
Anujh Tewari, Chief Security Advisor (India & South Asia) – Microsoft
10:40 – 11:00 Break
Track 1   Track 2   CISO Connect
11:00 – 11:30 NGate: Novel Android malware for unauthorized ATM withdrawals via NFC relay
Lukas Štefanko, Jakub Osmani, ESET
  11:00 – 11:30 Bypassing evasive binaries with Dynamic Binary Instrumentation
Dr. Vlad Constantin Craciun, Andrei Catalin Mogage, Bitdefender
  11:00 – 11:10 Introduction to CISO workshop
11:30 – 12:00 Leveraging Generative AI for Revolutionizing Malware Analysis: A Gemini-Powered Approach
Marvin Castillo, Lovely Jovellee Lyn B Antonio, G-Data
  11:30 – 12:00 Exploitation of 0-day vulnerability in Yandex.Browser for persistence
Ivan Korolev, Igor Zdobnov, Doctor Web
  11:10 – 11:40 Adversarial Use of GenAI
Michael Daniel, CTA
12:00 – 12:30 The Dark Evolution: MuddyWater’s New Tactics and the Manticore Alliance
Lomada Suresh Reddy, Uma Madasamy, K7 Computing
  12:00 – 12:30 Exploiting JSON Injection in Microsoft 365 Admin Portal for Email Security Evasion in Spear-Phishing Operations
Reegun Richard Jayapaul, Trustwave
  11:40 – 12:10 The Invisible Line: Securing Endpoints in a World Without Boundaries
Romanus Raymond Prabhu, Zoho Corporation (Manage Engine)
12:30 – 12:50 Behind Enemy Lines: Discovering Initial Phases of Cyber Attacks in Asia
Jose Luis Sanchez, VirusTotal – Google
  12:30 – 12:50 EastWind Campaign: Defending Against the Latest APT31 Attacks (Sponsor Presentation)
Georgy Kucherin, Kaspersky
  12:10 – 12:40 The Future of Cybercrime – Fact or Fiction?
Peter Stelzhammer, AV-Comparatives
  12:40 – 12:50
12:50 – 14:00 Lunch
14:00 – 14:30 Double check your Zabbix agents: The mystery of GoblinRAT
Vladimir Nestor, Solar
    14:00 – 14:20 TBD
Ankercloud
14:30 – 15:00 Rise of Synergistic threats: Deception, face swap, GenAI, and obscure Crypto DEX, following the trail of evasive iOS and Android apps
Jagadeesh Chandraiah, Sophos
  14:30 – 15:10 Supply Chain Integrity: Cyber Defense Strategies in the Digital Era (Panel Discussion)
Balakrishnan Kanniah, VA Tech Wabag
Debasish Das, One Tata Operating Network
Kannan Srinivasan, GAVS Technologies
Manickam Kanniah, Verizon
Vimalaasree Anandhan, Poshmark
  14:20 – 15:00 Third Party Vendor Risk Management
Akkaiah Janagaraj, LTIMindtree
Ashok Kumar Jeyachandran, G3 Cyberspace
Subramanian Vaithi, Nium
Sarita Padmini, Protiviti
Peter Stelzhammer, AV-Comparatives
15:00 – 15:30 SAETI: State-Actor Empowered Threat Intelligence… A Good or a Bad thing?
Righard Zwienenberg, Eddy Willems, ESET, WAVCi
  15:10 – 15:30 Harnessing Language Models for Detection of Evasive Malicious Email Attachments
Abhishek Singh, Kalpesh Mantri, InceptionCyber.ai
  15:00 – 15:20 Axidian Shield – Identity Threat Detection and Response (ITDR)
Kirill Bondarenko, Axidian
  15:20 – 15:30 Interactive Q&A session
15:30 – 15:50 Break
15:50 – 16:20 Cloudy With a Chance of RATs: Unveiling APT36 and The Evolution of ElizaRAT
Itan Delshad, Check Point
  15:50 – 16:10 TBD
16:20 – 16:50 Hunting for Operation FlightNight: Attack Targeted towards Indian Government and Energy sectors
Amey Gat, Fortinet
  16:10 – 16:30 Beyond the Radar: Analysing the Linux Variant of RedTail Malware
Prashant Tilekar, Forescout Technologies
  16:30 – 16:50 Reimagining a robust supply chain security architecture
Pradeep Sekar, Optiv Security
19:00 – 19:30 Pre-dinner Drinks
19:30 – 22:00 Gala Dinner
Conference Day 2: 06th December, 2024, Friday
10:00 – 10:20 Keynote Address: 5G and AI Security will revolutionise next decade digital landscape
Dr. Debabrata Nayak, Director – PwC
10:20 – 10:40 Keynote Address: Threat Intelligence from the Frontlines: A Global Perspective on Evolving Cyber Threats
Igor Kuznetsov, Director, Global Research and Analysis Team – Kaspersky
Track 1   Track 2
10:40 – 11:10 From Code to Crime: Exploring Threats in GitHub Codespaces
Jaromir Horejsi, Trend Micro
  10:40 – 11:10 GPT vs Malware Analysis: Pitfalls and Mitigations
Ben Herzog, Check Point
11:10 – 11:40 Exploring vulnerable Windows drivers
Vanja Svajcer, Cisco
  11:10 – 11:40 Navigating Cybersecurity Challenges and Adversaries in Smart Power Meter Technologies
Vikas Karunakaran, Sectrio
11:40 – 12:00 Lazarus targets freelance developers with DeceptiveDevelopment
Matej Havranek, ESET
  11:40 – 12:00 Challenges in Reverse Engineering Rust-based Malware
Nguyen Tien Cong, Bui Huy Anh, CMC Cyber Security
12:00 – 12:20 Break
12:20 – 12:50 Charming Viper, Vanishing Crypto
Dhanush, Arun Kumar, K7 Computing
  12:20 – 13:00 The Human Element in Cyber Security (Panel Discussion)
Chethan S. Iyengar, Standard Chartered
Jeannette Jarvis, Cyber Threat Alliance
Lalit Gupta, Al Gihaz Holding
Righard Zwienenberg, ESET
Vimalaasree Anandhan, Poshmark
12:50 – 13:20 Beyond the Package: The New Frontier of MSIX Attack
Prakash Galande, Nitin Shekokar, Symantec – BROADCOM
  13:00 – 13:20 TBD
13:20 – 14:30 Lunch
14:30 – 15:00 Should Your EDR Be Based in User-mode? You Might Want to Reconsider
Omri Misgav, Independent Security Researcher
 
15:00 – 15:30 Deep into the evolution of the SteganoAmor campaign: how the TA558 attacked companies around the world
Aleksandr Badaev, Kseniia Naumova, Positive Technologies
  15:00 – 15:20 RATs in the sewers: diving into the BitTorrent cesspool (Sponsor Presentation)
Martin Jirkal, Roman Šíma, ESET
15:30 – 15:50 With Great Research Comes Great Responsibility (Sponsor Presentation)
Michael Daniel, Cyber Threat Alliance
  15:20 – 15:50 Sweet and Spicy Recipes for Government Agencies by SneakyChef
Chetan Raghuprasad, Cisco
15:50 – 16:10 Break
16:10 – 16:50 Securing your Cloud Infrastructure: Navigating the Dangers (Panel Discussion)
Dr. Anshu Premchand, Tech Mahindra
Kavitha Srinivasulu, TCS
Michael Daniel, Cyber Threat Alliance
Nasreen Dawood, Deloitte
Navaneethan M, Cywayz
Santhosh Jayaprakash, Unosecur
  16:10 – 16:50 Healthcare Cyber Attacks: Managing the Domino Effect (Panel Discussion)
Diptesh Saha, Accel Limited
Gowdhaman Jothilingam, LatentView Analytics
Kannan Srinivasan, GAVS Technologies
Senthil Subramaniam ESR, Infinite Computer Solutions
Smith Gonslaves, CyberSmith Secure
16:50 – 17:10 The Rise And Fall Of Golang Malware
Subhajeet Singha, Quick Heal
  16:50 – 17:10 TBD
17:10 – 17:20 Closing address
17:20 – 18:05 EGM and Members’ meeting
Poster Presentation
Reserve Papers

Note: Agenda is subject to change based on speaker schedules.