Agenda
04th December, 2024, Wednesday |
16:30 – 18:00 | Registration |
19:00 Onwards | Welcome drinks reception and dinner |
Conference Day 1: 05th December, 2024, Thursday |
9:00 – 9:25 | Registration | ||
9:25 – 9:35 | Welcome Address: Kesavardhanan J, CEO, AVAR | ||
9:35 – 9:40 | Inaugural Address: Dr. Palanivel Thiagarajan Minister for Information Technology and Digital Services, Government of Tamil Nadu |
||
9:40 – 10:00 | Keynote Address: Artificial Intelligence in Cyber Security Lt General (Dr) Rajesh Pant, Chairman – Cyber Security Association of India |
||
10:00 – 10:20 | Keynote Address Mr. Kumar Jayant, IAS – Additional Chief Secretary to Government, Information Technology and Digital Services, Government of Tamil Nadu |
||
10:20 – 10:40 | Keynote Address: Manickam Kanniah, Sr. Director, Verizon |
||
10:40 – 11:00 | Break |
Track 1 | Track 2 | CISO Connect | ||||||
11:00 – 11:30 | NGate: Novel Android malware for unauthorized ATM withdrawals via NFC relay Lukas Štefanko, Jakub Osmani, ESET |
11:00 – 11:30 | Sweet and Spicy Recipes for Government Agencies by SneakyChef Chetan Raghuprasad, Cisco |
11:00 – 11:10 | Introduction to CISO workshop Vaidyanathan Chandramouli, Apayapadh Advisory |
|||
11:30 – 12:00 | Leveraging Generative AI for Revolutionizing Malware Analysis: A Gemini-Powered Approach Marvin Castillo, Lovely Jovellee Lyn B Antonio, G-Data |
11:30 – 12:00 | Exploitation of 0-day vulnerability in Yandex.Browser for persistence Ivan Korolev, Igor Zdobnov, Doctor Web |
11:10 – 11:40 | Adversarial Use of GenAI Michael Daniel, CTA |
|||
12:00 – 12:30 | The Dark Evolution: MuddyWater’s New Tactics and the Manticore Alliance Lomada Suresh Reddy, Uma Madasamy, K7 Computing |
12:00 – 12:30 | Exploiting JSON Injection in Microsoft 365 Admin Portal for Email Security Evasion in Spear-Phishing Operations Reegun Richard Jayapaul, Trustwave |
11:40 – 12:10 | The Invisible Line: Securing Endpoints in a World Without Boundaries Romanus Raymond Prabhu, Zoho Corporation (Manage Engine) |
|||
12:30 – 12:50 | Behind Enemy Lines: Discovering Initial Phases of Cyber Attacks in Asia Jose Luis Sanchez, VirusTotal – Google |
12:30 – 12:50 | EastWind Campaign: Defending Against the Latest APT31 Attacks (Sponsor Presentation) Georgy Kucherin, Kaspersky |
12:10 – 12:40 | The Future of Cybercrime – Fact or Fiction? Peter Stelzhammer, AV-Comparatives |
|||
12:40 – 12:50 | ||||||||
12:50 – 14:00 | Lunch | |||||||
14:00 – 14:30 | Double check your Zabbix agents: The mystery of GoblinRAT Vladimir Nestor, Solar |
14:00 – 14:20 | Defend your cloud infrastructure from Identity Threats Chandresh Rajkumar, Himani Kambale, Unosecur |
|||||
14:30 – 15:00 | Rise of Synergistic threats: Deception, face swap, GenAI, and obscure Crypto DEX, following the trail of evasive iOS and Android apps Jagadeesh Chandraiah, Sophos |
14:30 – 14:50 | Harnessing Language Models for Detection of Evasive Malicious Email Attachments Abhishek Singh, Kalpesh Mantri, InceptionCyber.ai |
14:20 – 15:00 | Third Party Vendor Risk Management (Panel Discussion) Akkaiah Janagaraj, LTIMindtree Ashok Kumar Jeyachandran, G3 Cyberspace Subramanian Vaithi, Nium Sarita Padmini, Protiviti Peter Stelzhammer, AV-Comparatives |
|||
15:00 – 15:30 | SAETI: State-Actor Empowered Threat Intelligence… A Good or a Bad thing? Righard Zwienenberg, Eddy Willems, ESET, WAVCi |
14:50 – 15:10 | Beyond the Radar: Analysing the Linux Variant of RedTail Malware Prashant Tilekar, Forescout Technologies |
15:00 – 15:20 | Axidian Shield – Identity Threat Detection and Response (ITDR) Kirill Bondarenko, Axidian |
|||
15:10 – 15:30 | Reimagining a robust supply chain security architecture Pradeep Sekar, Optiv Security |
15:20 – 15:30 | Interactive Q&A session Vaidyanathan Chandramouli, Apayapadh Advisory |
|||||
15:30 – 15:50 | Break | |||||||
15:50 – 16:20 | GPT vs Malware Analysis: Pitfalls and Mitigations Ben Herzog, Check Point |
15:50 – 16:40 | Supply Chain Integrity: Cyber Defense Strategies in the Digital Era (Panel Discussion) Balakrishnan Kanniah, VA Tech Wabag Debasish Das, One Tata Operating Network Kannan Srinivasan, GAVS Technologies Manickam Kanniah, Verizon Vimalaasree Anandhan, Poshmark |
|||||
16:20 – 16:50 | Hunting for Operation FlightNight: Attack Targeted towards Indian Government and Energy sectors Amey Gat, Fortinet |
|||||||
19:00 – 19:30 | Pre-dinner Drinks | |||||||
19:30 – 22:00 | Gala Dinner |
Conference Day 2: 06th December, 2024, Friday |
10:00 – 10:20 | Keynote Address: Akkaiah Janagaraj, Global Head of Cybersecurity Practice, LTIMindtree |
||
10:20 – 10:40 | Keynote Address: Threat Intelligence from the Frontlines: A Global Perspective on Evolving Cyber Threats Igor Kuznetsov, Director, Global Research and Analysis Team – Kaspersky |
Track 1 | Track 2 | |||
10:40 – 11:10 | From Code to Crime: Exploring Threats in GitHub Codespaces Jaromir Horejsi, Trend Micro |
10:40 – 11:10 | Cloudy With a Chance of RATs: Unveiling APT36 and The Evolution of ElizaRAT Itan Delshad, Check Point |
|
11:10 – 11:40 | Exploring vulnerable Windows drivers Vanja Svajcer, Cisco |
11:10 – 11:40 | Navigating Cybersecurity Challenges and Adversaries in Smart Power Meter Technologies Vikas Karunakaran, Sectrio |
|
11:40 – 12:00 | Break | |||
12:00 – 12:30 | Charming Viper, Vanishing Crypto Dhanush, Arun Kumar, K7 Computing |
12:00 – 12:40 | The Human Element in Cyber Security (Panel Discussion) Chethan S. Iyengar, Standard Chartered Jeannette Jarvis, Cyber Threat Alliance Lalit Gupta, Al Gihaz Holding Righard Zwienenberg, ESET Vimalaasree Anandhan, Poshmark |
|
12:30 – 13:00 | Beyond the Package: The New Frontier of MSIX Attack Prakash Galande, Nitin Shekokar, Symantec – BROADCOM |
12:40 – 13:00 | Challenges in Reverse Engineering Rust-based Malware Nguyen Tien Cong, Bui Huy Anh, CMC Cyber Security |
|
13:00 – 14:10 | Lunch | |||
14:10 – 14:40 | Should Your EDR Be Based in User-mode? You Might Want to Reconsider Omri Misgav, Independent Security Researcher |
|||
14:40 – 15:10 | Deep into the evolution of the SteganoAmor campaign: how the TA558 attacked companies around the world Aleksandr Badaev, Kseniia Naumova, Positive Technologies |
14:40 – 15:00 | RATs in the sewers: diving into the BitTorrent cesspool (Sponsor Presentation) Martin Jirkal, Roman Šíma, ESET |
|
15:10 – 15:30 | With Great Research Comes Great Responsibility (Sponsor Presentation) Michael Daniel, Cyber Threat Alliance |
15:00 – 15:30 | Bypassing evasive binaries with Dynamic Binary Instrumentation Dr. Vlad Constantin Craciun, Andrei Catalin Mogage, Bitdefender |
|
15:30 – 15:50 | Break | |||
15:50 – 16:30 | Securing your Cloud Infrastructure: Navigating the Dangers (Panel Discussion) Chandresh Rajkumar, Unosecur Dr. Anshu Premchand, Tech Mahindra Karthikeyan K, Logitech Michael Daniel, Cyber Threat Alliance Srinivasan Balraj, Muthoot Fincorp |
15:50 – 16:30 | Healthcare Cyber Attacks: Managing the Domino Effect (Panel Discussion) Diptesh Saha, Accel Limited Gowdhaman Jothilingam, LatentView Analytics Kannan Srinivasan, GAVS Technologies Romanus Raymond Prabhu, Zoho Corporation (Manage Engine) Senthil Subramaniam ESR, Infinite Computer Solutions Smith Gonslaves, CyberSmith Secure |
|
16:30 – 16:50 | The Rise And Fall Of Golang Malware Subhajeet Singha, Quick Heal |
16:30 – 16:50 | Lazarus targets freelance developers with DeceptiveDevelopment Matej Havranek, ESET |
|
16:50 – 17:00 | Closing address | |||
17:00 – 17:45 | EGM and Members’ meeting |
Poster Presentation |
Paving the Path for IoT Security Certification Martin Nocker, Dr. Pascal Schöttle, MCI Innsbruck |
Reserve Papers |
Build your Own AI Research Assistant via “small” Large Language Models Georgelin Manuel, K7 Computing |
Industry Certificate Blocking List? Samir Mody, K7 Computing |
HDDCryptor on Rise Soumen Burma, Rumana Siddiqui, QuickHeal & Seqrite |
Note: Agenda is subject to change based on speaker schedules.