Agenda

04th December, 2024, Wednesday
16:30 – 18:00Registration
19:00 OnwardsWelcome drinks reception and dinner
Conference Day 1: 05th December, 2024, Thursday
9:00 – 9:25 Registration
9:25 – 9:35 Welcome Address: Kesavardhanan J, CEO, AVAR
9:35 – 9:40 Inaugural Address: Dr. Palanivel Thiagarajan
Minister for Information Technology and Digital Services, Government of Tamil Nadu
9:40 – 10:00 Keynote Address: Artificial Intelligence in Cyber Security
Lt General (Dr) Rajesh Pant, Chairman – Cyber Security Association of India
10:00 – 10:20 Keynote Address
Mr. Kumar Jayant, IAS – Additional Chief Secretary to Government, Information Technology and Digital Services, Government of Tamil Nadu
10:20 – 10:40 Keynote Address: 
Manickam Kanniah, Sr. Director, Verizon
10:40 – 11:00 Break
Track 1   Track 2   CISO Connect
11:00 – 11:30 NGate: Novel Android malware for unauthorized ATM withdrawals via NFC relay
Lukas Štefanko, Jakub Osmani, ESET
  11:00 – 11:30 Sweet and Spicy Recipes for Government Agencies by SneakyChef
Chetan Raghuprasad, Cisco
  11:00 – 11:10 Introduction to CISO workshop
Vaidyanathan Chandramouli, Apayapadh Advisory
11:30 – 12:00 Leveraging Generative AI for Revolutionizing Malware Analysis: A Gemini-Powered Approach
Marvin Castillo, Lovely Jovellee Lyn B Antonio, G-Data
  11:30 – 12:00 Exploitation of 0-day vulnerability in Yandex.Browser for persistence
Ivan Korolev, Igor Zdobnov, Doctor Web
  11:10 – 11:40 Adversarial Use of GenAI
Michael Daniel, CTA
12:00 – 12:30 The Dark Evolution: MuddyWater’s New Tactics and the Manticore Alliance
Lomada Suresh Reddy, Uma Madasamy, K7 Computing
  12:00 – 12:30 Exploiting JSON Injection in Microsoft 365 Admin Portal for Email Security Evasion in Spear-Phishing Operations
Reegun Richard Jayapaul, Trustwave
  11:40 – 12:10 The Invisible Line: Securing Endpoints in a World Without Boundaries
Romanus Raymond Prabhu, Zoho Corporation (Manage Engine)
12:30 – 12:50 Behind Enemy Lines: Discovering Initial Phases of Cyber Attacks in Asia
Jose Luis Sanchez, VirusTotal – Google
  12:30 – 12:50 EastWind Campaign: Defending Against the Latest APT31 Attacks (Sponsor Presentation)
Georgy Kucherin, Kaspersky
  12:10 – 12:40 The Future of Cybercrime – Fact or Fiction?
Peter Stelzhammer, AV-Comparatives
  12:40 – 12:50  
12:50 – 14:00 Lunch
14:00 – 14:30 Double check your Zabbix agents: The mystery of GoblinRAT
Vladimir Nestor, Solar
        14:00 – 14:20 Defend your cloud infrastructure from Identity Threats
Chandresh Rajkumar, Himani Kambale, Unosecur
14:30 – 15:00 Rise of Synergistic threats: Deception, face swap, GenAI, and obscure Crypto DEX, following the trail of evasive iOS and Android apps
Jagadeesh Chandraiah, Sophos
  14:30 – 14:50 Harnessing Language Models for Detection of Evasive Malicious Email Attachments
Abhishek Singh, Kalpesh Mantri, InceptionCyber.ai
  14:20 – 15:00 Third Party Vendor Risk Management (Panel Discussion)
Akkaiah Janagaraj, LTIMindtree
Ashok Kumar Jeyachandran, G3 Cyberspace
Subramanian Vaithi, Nium
Sarita Padmini, Protiviti
Peter Stelzhammer, AV-Comparatives
15:00 – 15:30 SAETI: State-Actor Empowered Threat Intelligence… A Good or a Bad thing?
Righard Zwienenberg, Eddy Willems, ESET, WAVCi
  14:50 – 15:10 Beyond the Radar: Analysing the Linux Variant of RedTail Malware
Prashant Tilekar, Forescout Technologies
  15:00 – 15:20 Axidian Shield – Identity Threat Detection and Response (ITDR)
Kirill Bondarenko, Axidian
  15:10 – 15:30 Reimagining a robust supply chain security architecture
Pradeep Sekar, Optiv Security
  15:20 – 15:30 Interactive Q&A session
Vaidyanathan Chandramouli, Apayapadh Advisory
15:30 – 15:50 Break
15:50 – 16:20 GPT vs Malware Analysis: Pitfalls and Mitigations
Ben Herzog, Check Point
  15:50 – 16:40 Supply Chain Integrity: Cyber Defense Strategies in the Digital Era (Panel Discussion)
Balakrishnan Kanniah, VA Tech Wabag
Debasish Das, One Tata Operating Network
Kannan Srinivasan, GAVS Technologies
Manickam Kanniah, Verizon
Vimalaasree Anandhan, Poshmark
16:20 – 16:50 Hunting for Operation FlightNight: Attack Targeted towards Indian Government and Energy sectors
Amey Gat, Fortinet
19:00 – 19:30 Pre-dinner Drinks
19:30 – 22:00 Gala Dinner
Conference Day 2: 06th December, 2024, Friday
10:00 – 10:20 Keynote Address: 
Akkaiah Janagaraj, Global Head of Cybersecurity Practice, LTIMindtree
10:20 – 10:40 Keynote Address: Threat Intelligence from the Frontlines: A Global Perspective on Evolving Cyber Threats
Igor Kuznetsov, Director, Global Research and Analysis Team – Kaspersky
Track 1   Track 2
10:40 – 11:10 From Code to Crime: Exploring Threats in GitHub Codespaces
Jaromir Horejsi, Trend Micro
  10:40 – 11:10 Cloudy With a Chance of RATs: Unveiling APT36 and The Evolution of ElizaRAT
Itan Delshad, Check Point
11:10 – 11:40 Exploring vulnerable Windows drivers
Vanja Svajcer, Cisco
  11:10 – 11:40 Navigating Cybersecurity Challenges and Adversaries in Smart Power Meter Technologies
Vikas Karunakaran, Sectrio
11:40 – 12:00 Break
12:00 – 12:30 Charming Viper, Vanishing Crypto
Dhanush, Arun Kumar, K7 Computing
  12:00 – 12:40 The Human Element in Cyber Security (Panel Discussion)
Chethan S. Iyengar, Standard Chartered
Jeannette Jarvis, Cyber Threat Alliance
Lalit Gupta, Al Gihaz Holding
Righard Zwienenberg, ESET
Vimalaasree Anandhan, Poshmark
12:30 – 13:00 Beyond the Package: The New Frontier of MSIX Attack
Prakash Galande, Nitin Shekokar, Symantec – BROADCOM
  12:40 – 13:00 Challenges in Reverse Engineering Rust-based Malware
Nguyen Tien Cong, Bui Huy Anh, CMC Cyber Security
13:00 – 14:10 Lunch
14:10 – 14:40 Should Your EDR Be Based in User-mode? You Might Want to Reconsider
Omri Misgav, Independent Security Researcher
     
14:40 – 15:10 Deep into the evolution of the SteganoAmor campaign: how the TA558 attacked companies around the world
Aleksandr Badaev, Kseniia Naumova, Positive Technologies
  14:40 – 15:00 RATs in the sewers: diving into the BitTorrent cesspool (Sponsor Presentation)
Martin Jirkal, Roman Šíma, ESET
15:10 – 15:30 With Great Research Comes Great Responsibility (Sponsor Presentation)
Michael Daniel, Cyber Threat Alliance
  15:00 – 15:30 Bypassing evasive binaries with Dynamic Binary Instrumentation
Dr. Vlad Constantin Craciun, Andrei Catalin Mogage, Bitdefender
15:30 – 15:50 Break
15:50 – 16:30 Securing your Cloud Infrastructure: Navigating the Dangers (Panel Discussion)
Chandresh Rajkumar, Unosecur
Dr. Anshu Premchand, Tech Mahindra
Karthikeyan K, Logitech
Michael Daniel, Cyber Threat Alliance
Srinivasan Balraj, Muthoot Fincorp
  15:50 – 16:30 Healthcare Cyber Attacks: Managing the Domino Effect (Panel Discussion)
Diptesh Saha, Accel Limited
Gowdhaman Jothilingam, LatentView Analytics
Kannan Srinivasan, GAVS Technologies
Romanus Raymond Prabhu, Zoho Corporation (Manage Engine)
Senthil Subramaniam ESR, Infinite Computer Solutions
Smith Gonslaves, CyberSmith Secure
16:30 – 16:50 The Rise And Fall Of Golang Malware
Subhajeet Singha, Quick Heal
  16:30 – 16:50 Lazarus targets freelance developers with DeceptiveDevelopment
Matej Havranek, ESET
16:50 – 17:00 Closing address
17:00 – 17:45 EGM and Members’ meeting
Poster Presentation
Reserve Papers

Note: Agenda is subject to change based on speaker schedules.