Agenda

04th December, 2024, Wednesday
16:30 – 18:00Registration
19:00 Onwards Welcome drinks reception and dinner
Conference Day 1: 05th December, 2024, Thursday
9:00 – 9:30 Registration
9:30 – 10:40 Conference opening & Keynote Addresses
10:40 – 11:00 Break
Track 1   Track 2
11:00 – 11:30 NGate: Novel Android malware for unauthorized ATM withdrawals via NFC relay
Lukas Štefanko, Jakub Osmani, ESET
  11:00 – 11:30 Bypassing evasive binaries with Dynamic Binary Instrumentation
Dr. Vlad Constantin Craciun, Andrei Catalin Mogage, Bitdefender
11:30 – 12:00 Leveraging Generative AI for Revolutionizing Malware Analysis: A Gemini-Powered Approach
Marvin Castillo, Lovely Jovellee Lyn B Antonio, G-Data
  11:30 – 12:00 Exploitation of 0-day vulnerability in Yandex.Browser for persistence
Ivan Korolev, Igor Zdobnov, Doctor Web
12:00 – 12:30 The Dark Evolution: MuddyWater’s New Tactics and the Manticore Alliance
Lomada Suresh Reddy, Uma Madasamy, K7 Computing
  12:00 – 12:30 Exploiting JSON Injection in Microsoft 365 Admin Portal for Email Security Evasion in Spear-Phishing Operations
Reegun Richard Jayapaul, Trustwave
12:30 – 12:50 Behind Enemy Lines: Discovering Initial Phases of Cyber Attacks in Asia
Jose Luis Sanchez, VirusTotal – Google
  12:30 – 12:50 TBD
12:50 – 14:00 Lunch
14:00 – 14:30 Double check your Zabbix agents: The mystery of GoblinRAT
Vladimir Nestor, Solar
 
14:30 – 15:00 Rise of Synergistic threats: Deception, face swap, GenAI, and obscure Crypto DEX, following the trail of evasive iOS and Android apps
Jagadeesh Chandraiah, Sophos
  14:30 – 15:10 Supply Chain Integrity: Cyber Defense Strategies in the Digital Era (Panel Discussion)
Babitha B P, ReBIT
Debasish Das, One Tata Operating Network
Manickam Kanniah, Verizon
Vimalaasree Anandhan, Poshmark
15:00 – 15:30 SAETI: State-Actor Empowered Threat Intelligence… A Good or a Bad thing?
Righard Zwienenberg, Eddy Willems, ESET, WAVCi
  15:10 – 15:30 Harnessing Language Models for Detection of Evasive Malicious Email Attachments
Abhishek Singh, Kalpesh Mantri, InceptionCyber.ai
15:30 – 15:50 Break
15:50 – 16:20 Cloudy With a Chance of RATs: Unveiling APT36 and The Evolution of ElizaRAT
Itan Delshad, Check Point
  15:50 – 16:10 TBD
16:20 – 16:50 Hunting for Operation FlightNight: Attack Targeted towards Indian Government and Energy sectors
Amey Gat, Fortinet
  16:10 – 16:30 Beyond the Radar: Analysing the Linux Variant of RedTail Malware
Prashant Tilekar, Forescout Technologies
  16:30 – 16:50 Reimagining a robust supply chain security architecture
Pradeep Sekar, Optiv Security
19:00 – 19:30 Pre-dinner Drinks
19:30 – 22:00 Gala Dinner
Conference Day 2: 06th December, 2024, Friday
10:00 – 10:20 Keynote Address: TBD
Track 1   Track 2
10:20 – 10:50 From Code to Crime: Exploring Threats in GitHub Codespaces
Jaromir Horejsi, Trend Micro
  10:20 – 10:50 GPT vs Malware Analysis: Pitfalls and Mitigations
Ben Herzog, Check Point
10:50 – 11:20 Exploring vulnerable Windows drivers
Vanja Svajcer, Cisco
  10:50 – 11:20 Navigating Cybersecurity Challenges and Adversaries in Smart Power Meter Technologies
Vikas Karunakaran, Sectrio
11:20 – 11:40 Lazarus targets freelance developers with DeceptiveDevelopment
Matej Havranek, ESET
  11:20 – 11:40 Challenges in Reverse Engineering Rust-based Malware
Nguyen Tien Cong, Bui Huy Anh, CMC Cyber Security
11:40 – 12:00 Break
12:00 – 12:30 Charming Viper, Vanishing Crypto
Dhanush, Arun Kumar, K7 Computing
  12:00 – 12:40 The Human Element in Cyber Security (Panel Discussion)
Chethan S. Iyengar, Standard Chartered
Jeannette Jarvis, Cyber Threat Alliance
Lalit Gupta, Al Gihaz Holding
Righard Zwienenberg, ESET
Suvabrata Sinha, Zscaler
12:30 – 13:00 Beyond the Package: The New Frontier of MSIX Attack
Prakash Galande, Nitin Shekokar, Symantec – BROADCOM
  12:40 – 13:00 TBD
13:00 – 14:10 Lunch
14:10 – 14:40 Should Your EDR Be Based in User-mode? You Might Want to Reconsider
Omri Misgav, Independent Security Researcher
 
14:40 – 15:10 Deep into the evolution of the SteganoAmor campaign: how the TA558 attacked companies around the world
Aleksandr Badaev, Kseniia Naumova, Positive Technologies
  14:40 – 15:00 RATs in the sewers: diving into the BitTorrent cesspool (Sponsor Presentation)
Martin Jirkal, Roman Šíma, ESET
15:10 – 15:30 With Great Research Comes Great Responsibility (Sponsor Presentation)
Michael Daniel, Cyber Threat Alliance
  15:00 – 15:30 Sweet and Spicy Recipes for Government Agencies by SneakyChef
Chetan Raghuprasad, Cisco
15:30 – 15:50 Break
15:50 – 16:30 Securing your Cloud Infrastructure: Navigating the Dangers (Panel Discussion)
Dr. Anshu Premchand, Tech Mahindra
Kavitha Srinivasulu, TCS
Nasreen Dawood, Deloitte
Prateek Bhajanka, SentinelOne
  15:50 – 16:30 Healthcare Cyber Attacks: Managing the Domino Effect (Panel Discussion)
Diptesh Saha, Accel Limited
Gowdhaman Jothilingam, LatentView Analytics
Kannan Srinivasan, GAVS Technologies
Senthil Subramaniam ESR, Infinite Computer Solutions
16:30 – 16:50 The Rise And Fall Of Golang Malware
Subhajeet Singha, Quick Heal
  16:30 – 16:50 TBD
16:50 – 17:00 Closing address
17:00 – 17:45 EGM and Members’ meeting
Poster Presentation
Reserve Papers

Note: Agenda is subject to change based on speaker schedules.