Agenda
04th December, 2024, Wednesday |
16:30 – 18:00 | Registration |
19:00 Onwards | Welcome drinks reception and dinner |
Conference Day 1: 05th December, 2024, Thursday |
9:00 – 9:30 | Registration | ||
9:30 – 10:40 | Conference opening & Keynote Addresses | ||
10:40 – 11:00 | Break |
Conference Day 2: 06th December, 2024, Friday |
10:00 – 10:20 | Keynote Address: TBD |
Track 1 | Track 2 | |||
10:20 – 10:50 | From Code to Crime: Exploring Threats in GitHub Codespaces Jaromir Horejsi, Trend Micro |
10:20 – 10:50 | GPT vs Malware Analysis: Pitfalls and Mitigations Ben Herzog, Check Point |
|
10:50 – 11:20 | Exploring vulnerable Windows drivers Vanja Svajcer, Cisco |
10:50 – 11:20 | Navigating Cybersecurity Challenges and Adversaries in Smart Power Meter Technologies Vikas Karunakaran, Sectrio |
|
11:20 – 11:40 | Lazarus targets freelance developers with DeceptiveDevelopment Matej Havranek, ESET |
11:20 – 11:40 | Challenges in Reverse Engineering Rust-based Malware Nguyen Tien Cong, Bui Huy Anh, CMC Cyber Security |
|
11:40 – 12:00 | Break | |||
12:00 – 12:30 | Charming Viper, Vanishing Crypto Dhanush, Arun Kumar, K7 Computing |
12:00 – 12:40 | The Human Element in Cyber Security (Panel Discussion) Chethan S. Iyengar, Standard Chartered Jeannette Jarvis, Cyber Threat Alliance Lalit Gupta, Al Gihaz Holding Righard Zwienenberg, ESET Suvabrata Sinha, Zscaler |
|
12:30 – 13:00 | Beyond the Package: The New Frontier of MSIX Attack Prakash Galande, Nitin Shekokar, Symantec – BROADCOM |
12:40 – 13:00 | TBD | |
13:00 – 14:10 | Lunch | |||
14:10 – 14:40 | Should Your EDR Be Based in User-mode? You Might Want to Reconsider Omri Misgav, Independent Security Researcher |
|||
14:40 – 15:10 | Deep into the evolution of the SteganoAmor campaign: how the TA558 attacked companies around the world Aleksandr Badaev, Kseniia Naumova, Positive Technologies |
14:40 – 15:00 | RATs in the sewers: diving into the BitTorrent cesspool (Sponsor Presentation) Martin Jirkal, Roman Šíma, ESET |
|
15:10 – 15:30 | With Great Research Comes Great Responsibility (Sponsor Presentation) Michael Daniel, Cyber Threat Alliance |
15:00 – 15:30 | Sweet and Spicy Recipes for Government Agencies by SneakyChef Chetan Raghuprasad, Cisco |
|
15:30 – 15:50 | Break | |||
15:50 – 16:30 | Securing your Cloud Infrastructure: Navigating the Dangers (Panel Discussion) Dr. Anshu Premchand, Tech Mahindra Kavitha Srinivasulu, TCS Nasreen Dawood, Deloitte Prateek Bhajanka, SentinelOne |
15:50 – 16:30 | Healthcare Cyber Attacks: Managing the Domino Effect (Panel Discussion) Diptesh Saha, Accel Limited Gowdhaman Jothilingam, LatentView Analytics Kannan Srinivasan, GAVS Technologies Senthil Subramaniam ESR, Infinite Computer Solutions |
|
16:30 – 16:50 | The Rise And Fall Of Golang Malware Subhajeet Singha, Quick Heal |
16:30 – 16:50 | TBD | |
16:50 – 17:00 | Closing address | |||
17:00 – 17:45 | EGM and Members’ meeting |
Poster Presentation |
Paving the Path for IoT Security Certification Martin Nocker, Dr. Pascal Schöttle, MCI Innsbruck |
Reserve Papers |
Build your Own AI Research Assistant via “small” Large Language Models Georgelin Manuel, K7 Computing |
Industry Certificate Blocking List? Samir Mody, K7 Computing |
HDDCryptor on Rise Soumen Burma, Rumana Siddiqui, QuickHeal & Seqrite |
Note: Agenda is subject to change based on speaker schedules.