2020 Asia Pacific Virtual Summit Agenda Overview

3y ago
32 Views
3 Downloads
1.06 MB
12 Pages
Last View : 3d ago
Last Download : 3m ago
Upload by : Karl Gosselin
Transcription

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeTuesday 1 December 2020 All Times are SGT09:00–10:00Virtual Solutions Hall Open10:00–10:15OPENING REMARKSSteven Silberstein, CEO, FS-ISAC10:15–11:00KEYNOTE: The Secret Switches of CaptivationShamane Tan, Author & Chief Growth Officer at PrivasecSecurity leaders are experts in their fields, yet may struggle to effectively convey their message to business leaders. Great leaders have theability to communicate complex things simply. Communication is an art. Whether you’re a current/next-generation CISO or just starting yourcybersecurity career, this must-see session will help you understand and implement better and more effective ways to communication withvarying and oftentimes difficult-to-convince stakeholders. Find out the keys to successful connection across all levels. With just a few secretswitches, you, too, can captivate your audience.11:00–11:15Networking Break in Virtual Solutions Hall11:15–12:00General SessionsMagecart and the Hidden Risk in the Modern Web Supply ChainAseem Ahmed, Senior Product Manager for Cloud Security, Asia Pacific, Akamai Technologiesyy Magecart as a new attack vectoryy How Magecart is being employed in web skimming and formjacking attacksyy Different approaches to address the threatAdd Intelligence to your SIEM. Automated Investigations for the Right ResponseMohamad (Moe) Ibrahim (CISSP), APJ, Exabeamyy Know the risks to an organisation’s security posture when teams are tasked with building timelines manuallyyy Understand how automated workflows for triage and investigation can benefit SOC and IR teams,including reducing the mean time to detect and mean time to assemble a teamyy Learn How behavioural analytics adds context to security investigations, and How security teams canfree up senior analysts for more valuable tasks by not manually baselining behavioryy Learn How machine learning and can be leveraged to automatically build out a timeline of a security incidentyy Hear How financial institutions are leveraging this technology todayTLP White2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeTuesday 1 December 202011:15–12:00General SessionsContinued.Every Second Counts: Prioritising Speed and Security During Crisis and DisruptionSherif El Nabawi, Vice President, Asia Pacific & Japan Sales Engineering & Service Provider Sales, CrowdStrike12:00–12:15Networking Break in Virtual Solutions Hall12:15–12:45Concurrent Sessionsyy What are the latest cyberattack trends and how might they impact your organization?yy How can you know whether your organization has achieved the cybersecurity maturityrequired to keep up with today’s sophisticated cyberattacks?yy Looking at some of new security architectures and technologies rapidly being adopted by “forward leaning” organisations around the worldAdvancedTechnologies& TechniquesGovernanceRisk &ComplianceTLP WhiteThe Why and How to a Zero Trust StrategyMinoru Hanamura, Chief Security Advisor, MicrosoftyyyyyyyyThe limitations of a physical perimeterHow to empower your team with greater flexibilityModern technology and stronger securitySecurity management simplification with Zero TrustHow Real-Time Collaboration During COVID-19 Saved the DayCorey Hulen, CTO & Co-Founder, MattermostGavin Landless, VP of Risk Management, Empower Federal Credit UnionSteven Wallstedt, Head of Information Security and Business Continuity, ABN AMRO Holdings USA LLCyy The benefits of real-time, peer-to-peer chat during a crisisyy What the response to COVID-19 looked like for small and large financial institutionsyy How organizations can better prepare for black swan events in the future2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeTuesday 1 December 202012:15–12:45Concurrent rent SessionsCyber Threat Hunting: Resourcing & MethodsSindhu HS, Vice President, Goldman SachsAdvancedTechnologies& Techniquesyy To effectively and efficiently execute cyber threat missions leveraging collaborativeTiger Teams to address resource constraints common in every organizationyy To proactively identify previously undetected malicious activity andimprove the organization’s overall security postureyy To utilize existing threat intelligence to generate hunt hypotheses which are thenprioritized and executed to generate recommendations for improvementAdvancedTechnologies& TechniquesKeys to Automating Tactical Threat IntelligenceJorell Magtibay, Senior Consultant, Enterprise Security Threat Intelligence, National Australia BankNetworking Break in Virtual Solutions HallAdvancedTechnologies& TechniquesHacker-Powered Data: Why the Most Common Financial Services Vulnerabilities Aren’t What You Think They AreWill Kapcio, Security Solutions Engineer, HackerOneyy Discover the top vulnerabilities impacting financial services organizationsyy Discuss trends in regional vulnerability discoveryy Come away armed with the tools to better defend against specific vulnerability typesAn Introduction to the Financial Services Sector Cybersecurity Profile: A Practitioner’s PerspectiveJason Harrell, Head of Business and Government Cybersecurity Partnerships, DTCCGovernanceRisk &ComplianceTLP Whiteyy A high-level understanding of the problem that The Profile is trying tosolve for the public and private sector; Current usageyy How the Profile framework demonstrates compliance to numerous supervisory textsyy Potential Use Cases for the Profileyy Examples of how the Profile was completed at DTCC2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeTuesday 1 December 202013:00–13:30Concurrent SessionsContinued.13:30–13:45A Generic Approach to the Risk-Based Vulnerability Management ProcessGuillaume Brodar, Threat Hunting and Threat Intelligence, DBSAdvancedTechnologies& TechniquesNetworking Break in Virtual Solutions Hall13:45–14:15Concurrent SessionsTransform your Security Strategy with Data Driven DetectionAlvin Lung, Customer Engineer, ChronicleAdvancedTechnologies& TechniquesGovernanceRisk &ComplianceTLP Whiteyy Leverage the CVSS scoring metrics beyond the Base Score in accordance withthe likelihood of exploitation and their specific environment factorsyy Define their Threat Intelligence and Inventory Management requirements accordinglyyy Build a vulnerability remediation priority list in accordance with observedThreat Actor activity and internal mitigation factorsyy Ever feel like your security team is overly reliant on vendor-created threat detection? There are nuancesto your environment that often require a more customized approach to identifying potential TTPs.yy Furthermore, advanced threat actors may use methods, techniques andmalware that are custom-made for your organization.yy The art of detection is evolving as more investments are made into SOC analysts,threat responders, and hunters - and as part of this movement, data driven detection isemerging as the most accurate way to craft enterprise-specific detections.yy Attend this session to learn how you can intelligently transform your security strategy by authoring detections,treating them as code, and putting best practices in place to use, store, share and maintain your custom detections.Business Resilience and Cyber Trends in JapanMichihiro Taniai, Chairperson Director, Financials ISAC Japanyy Current threat landscape of Japanyy How the situation is being addressedyy Business resilience activities kicking off in Japan2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeTuesday 1 December 202013:45–14:15Continued.Modelling DDoS Data: Insight and AttributionRauf Ridzuan, VP, Cyber Threat Intelligence Analyst, Bank of AmericaAdvancedTechnologies& Techniques14:15–14:3014:30–15:00Concurrent Sessionsyy Overview of current DDoS threat landscape from public reportsyy Modelling of DDoS attack profile using Cyber Threat Intelligence cycles and analysis using Intrusion Diamond Modelyy Attributing attacks by identifying and analyzing observed network DDoS data to identifypotential adversary motives using historical, analytical and open source referencingyy Examples of the results from current modelNetworking Break in Virtual Solutions HallAdvancedTechnologies& TechniquesCollective Defense Through End-to-End Automation of Bi-Directional Threat Intelligence SharingNeal Dennis, Threat Intelligence Specialist, CywareJacob Smith, Solutions Architect, Cywareyy How end-to-end automation can enhance intelligence sharingyy How real-time collective defense can be achieved in continuity by automating threat intelligence sharingyy How to determine priority and relevancy for smarter intelligence actioningMaking Intelligence Relevant for the BusinessLuisa Genovese, Head of Cyber Resilience and Recovery, Commonwealth BankGovernanceRisk &ComplianceTLP Whiteyy Understand how elements of intelligence analysis, engineering and country riskassessment can be used to assess and communicate cyber threatsyy How factors wider than information directly relating to threat actors can affecttheir importance and have flow on effects to communicating riskyy Understand how intelligence can be used to inform conversations aboutrisk controls across all stages of the NIST framework2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeTuesday 1 December 202014:30–15:00Concurrent SessionsContinued.Building a Threat Hunting ProgrammeFrancois Cappellen, Head of Threat Hunting, SwiftAdvancedTechnologies& TechniquesIn early 2020, SWIFT started a new programme evolving the Threat Hunting practice from ad-hoc hunting on very specificTTPs towards a repetitive activity integrated with the role of the Cyber Fusion Centre to overcome some of the downsidesof the focus on detection.During this session, we will highlight reasons to develop such a programme, some of the pitfalls, and some of theachievements to date.15:00–15:15Networking Break in Virtual Solutions Hall15:15–16:00General SessionThe Evolving Cyber Threat in Asia – A Look Back at 2020 and Lessons Learned for the Year AheadClaudette McGowan, Global Executive Officer for Cyber Security, TD Bankyy Contextualizes cyber threats that occurred in 2020yy Provides attendees with the “so what” related to third party attacks, evolving ransomware tactics,and other key themes observed in the year and what it means for the year aheadyy Provides attendees with an understanding of benefit coming from increased informationsharing and partnerships as these threats evolve into 202116:00TLP WhiteNetworking in Virtual Solutions Hall2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeWednesday 2 December 2020 All Times are SGT09:00–10:00Virtual Solutions Hall Open10:00–10:15OPENING REMARKS10:15–11:00KEYNOTE: Turning the Tables: A Fireside Chat with Nathaniel PopperNathaniel Popper, Journalist, The New York TimesTeresa Walsh, Global Intelligence Officer, FS-ISAC11:00–11:15Networking Break11:15–11:45Concurrent SessionsAdvancedTechnologies& TechniquesIncreasing Detection and Mitigation Maturity through Internet VisibilityHans Barré, Solutions Consultant, RiskIQyy View frameworks such as Lockheed Martin Cyber Kill Chain , F3EAD and MITREATT&CK from a new perspective to improve existing defence programsyy Understand how Internet intelligence can improve the early stage effectiveness of these frameworksyy Use live reconnaissance data on organisation and threat actor infrastructure to illustrate the above pointsTheft, Disruption, Destruction, now Ransom: Responding to Evolving Targeted AttacksGreg Rattray, Partner/Co-Founder, Next Peak LLCGovernanceRisk &ComplianceTLP Whiteyy This presentation will provide strategic insight on the evolving threat that financial institutions face fromtargeted attackers, and how organizations can understand specific risks to guide cyber defense investmentsyy Attendees can expect to look at how to strategically assess adversaries and leveragea range of threat intelligence sources and the MITRE ATT&CK Framework to ensureboth operational teams and management accurately understand risksyy This understanding will enable them to make intelligent risk mitigation investments based on their critical assets,the maturity of their capabilities, and their operating locations to defend their organizations against targeted attacks2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeWednesday 2 December 202011:15–11:45Concurrent cyyy Achieving alignment across the boardyy Building a “roadmap to yes”yy Focusing on risk and reward for core business objectivesNetworking Break in Virtual Solutions Hall12:00–12:30Concurrent Sessions#trending: Dynamic Vulnerability Prioritization with Social Media, Digital Platforms, and Threat IntelligenceSam Small, Chief Security Officer, ZeroFOXAdvancedTechnologies& TechniquesGovernanceRisk &ComplianceFraud/VirtualCurrencyTLP WhiteTalking to the Board About the New Realities of IT SecurityDaniel Chu, Director of Systems Engineering, Asia Pacific & Japan, ExtraHopyy Why vulnerability prioritization is an important feature of an effective vulnerability management programyy How to judge and assess the resilience of vulnerability prioritization strategies against the modern threat landscapeyy How information from unstructured data sources like social media platforms, code-sharing services, anddeep or dark web chatter can provide additional and meaningful context to existing vulnerability datayy Best practices for incorporating dynamic vulnerability threat intelligence into vulnerability management programsSecuring the Supply Chain in the Era of FinServ DigitalizationJ.C. Checco, Leader of CISO Advisory Board on Financial Services, ProofpointSean O’Dowd, Global Financial Services Director, Proofpointyy Highlight the fundamentals of how Financial Services can secure digitaltransformation as they compete to differentiateyy Identify key cyber risks in the Financial Services value chain including DevOPsyy Showcase recent case study – Hedge Fund – from Proofpoint’s threat intelligence team yy Provide guidance using a “people-centric” framework and defensive strategies to secure the supply chainFollow the Money – Where Does the Money Go After a Large-Scale Cyber Heist?Brett Lancaster, Managing Director and Global Head of Customer Security, SWIFTSimon Viney, Cyber Security Financial Services Sector Lead, BAE Systemsyy Understand the techniquesyy What are the various stepsyy Mitigation techniques2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeWednesday 2 December 202012:30–12:45Networking Break in Virtual Solutions Hall12:45–13:15Concurrent SessionsMitigating Compromised Credentials with Security IntelligenceChien Jen Yeo, Director of Systems Engineering, Asia Pacific, Recorded FutureAdvancedTechnologies& TechniquesGovernanceRisk &ComplianceFraud/VirtualCurrency13:15–13:30TLP Whiteyy Increase user awarenessyy How you can use security intelligence to monitor criminal underground communitiesfor the availability of new configuration files targeting your organization, acquisition,and for a thorough analysis of such files for additional attack indicators.yy How you can use security intelligence to surface compromised credentials from database breachesGathering and Utilizing of Cyber Threat IntelligenceChia-Hung “Jackie” Chen, Manager, F-ISAC TaiwanWen-Ling Lo, Engineer, F-ISAC Taiwanyy Recent cyber threat targeting Taiwanyy How F-ISAC gathers cyber security informationyy How F-ISAC Members utilize Cyber Threat IntelligenceCybercrime and CryptocurrenciesBeatriz Silveira, SVP, Regional Cyber Intelligence Center Lead, Citibankyy Have an overview about cryptocurrencies characteristics and challengesyy Understand basic cryptocurrencies investigation methods using open and free toolsyy Promote collaboration with financial industry peers on cybercrime cases involving cryptocurrency abuseNetworking Break in Virtual Solutions Hall2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeWednesday 2 December 202013:30–14:00Concurrent SessionsNew Trends: Sold Access and Ransomware Attacks on Financial InstitutionsDmitry Shestakov, Head of Cybercrime Research Unit, Group-IBAdvancedTechnologies& Techniquesyy Understand the seller’s portfolio and victim’s portfolio in eachransomware attack: Geographical scope and industriesyy Track changes in the landscape of network access salesyy Discover the tactics used by sellers in gaining access to corporate network and ensuring systems remain infectedyy Learn from 3 investigation cases: Fxmsp, Basterlord and Hentaic0deThreat Intelligence Sharing in Asia Pacific: Challenges and ProspectsScott Flower, Regional Intelligence Officer (APAC), FS-ISACGovernanceRisk &Compliancey Major themes: Cultural and Linguistic Diversity (impact of differences in styles of communication,different culture etc.); Historical Antagonisms and Trust; and Political and Institutional Architecturey Constraints: language constraints (ie. confidence to lodge reports on FS-ISAC portal) ; Cultural constraints(hierarchies, the challenge of speaking up or contesting intelligence, shame of being wrong/making errors)y Opportunities; ASEAN and country level opportunities, best way to leverage FS-ISAC in APACy Practical steps members can take to enhance their benefits of intelligence sharing in APACBuilding the Next Generation of Cybersecurity ExpertsKeisuke Kamata, Regional Director, Japan and Asia, FS-ISACy Observations from working with digital native high school students in Japan and teaching them cybersecurityy These students instantly grew into excellent cybersecurity talent, howare they different from us adults in the industry?y What can we learn about building the next generation of cybersecurity experts?Introduction to Crypto CurrencyPierre Neihouser, Director, Snow Mining Pte LtdFraud/VirtualCurrencyTLP WhiteyyyyyyyyUnderstand better crypto currenciesDon’t feel overwhelmed by the numbers or the fast changing environmentUnderstand threats related to cryptoWhat’s the best course of action2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitAgenda OverviewAgenda subject to changeWednesday 2 December 202014:00–14:15Networking Break in Virtual Solutions Hall14:15–15:00General SessionsCISO PanelMasashi Abe, Tokio Marine HoldingsAshutosh Jain, Axis BankAndrew Dell, QBEDavid Ng, OCBC Bank15:00Virtual Summit ConcludesTLP White2020 FS-ISAC Asia Pacific Virtual Summit Agenda Overview

2020 Asia Pacific Virtual SummitSummit On-Demand ContentAgenda subject to changeOn-Demand SessionsThese thought leader sessions will be available for On-demand streaming during the entire event. Attendees may download and watch thefollowing sessions during the two virtual summit days and receive points on the leaderboard.yy Achieving Least Privilege in the Cloud Amazon Web Servicesyy Next Generation Software Security Initiatives Synopsysyy Actively Defending the Enterprise: Segmentation Strategiesfor Sustainable Outcomes Forescout Technologiesyy Payment Platform Fraud on the Darkweb Sixgillyy Addressing Application Resilience in Today’sComplex, Dynamic Environments vARMOURyy Architecting to Successfully Embrace AI/ML Security Endaceyy CCM: Gartner’s New Risk Management Category:The ‘what’ and ‘why’ Panaseeryy Preparing for a Breach - The

Cyber Threat Hunting: Resourcing & Methods Sindhu HS, Vice President, Goldman Sachs y To effectively and efficiently execute cyber threat missions leveraging collaborative Tiger Teams to address resource constraints common in every organization y To proactively identify previously undetected malicious activity and

Related Documents:

Asia Pacific School 2019 28-30 October 2019, Conrad Hong Kong Pierre Briens Managing Director, Head of Aviation, Transportation Sector, Investment Banking Asia Pacific BNP Paribas Vincent Lam SVP Asia Pacific - Aircraft Remarketing Air Partner Vivien Guo Vice President, Transportation Sector, Investment Banking Asia Pacific BNP Paribas Simon Ng

importance of Asia and the Pacific, and develop a specialist expertise in the region will be at a distinct advantage in the context of Australia's continued engagement with the Asia Pacific century. By studying Asia Pacific studies, you will ensure your role in shaping Australia's future. Lead UNDErSTAND, ENgAgE & LEAD

The Authoritative Guide to the Future of Broadband Digital Content, Distribution & Technology in Asia ASIA PACIFIC PAY-TV & . trends, markets and companies shaping the development of the dynamic media sector. Events. MPA conferences focus on the media & telecoms industry across Asia Pacific and around the globe. . Asia Pacific Cable .

sia-Pacific Defense Outlook: Key Numbers4 A 6 Defense Investments: The Economic Context 6 Strategic Profiles: Investors, Balancers and Economizers . Asia-Pacific Defense Outlook 2016 Asia-Pacific Defense Outlook 2016. 3. Asia-Pacific Defense Outlook: . two-thirds of the region's economic product and nearly 75 percent of the 2015 regional .

Pacific Women Shaping Pacific Development Republic of the Marshall Islands Country Plan Summary . updated to document future Pacific Women activities in RMI . Regional Office for Asia and the Pacific, ILO, Asia Pacific Working paper series. 3 UNDP. 2009. Marshall Islands MDG Report p 16-18. 4 Republic of the Marshall Islands Ministry of .

Figure 5.Asia-Pacific needed annual investments under IRENA'sTransforming Energy Scenario through to 2050 5 Figure 6.Asia-Pacific clean energy investments, 2015-2020 11 Figure 7.Percentage of the population with access to electricity and clean cooking in Asia and the Pacific 15 Figure 8.Access to electricity across Asia-Pacific subregions 16

I believe that Asia rather than Asia-Pacific is the region of consequence. I define Asia broadly to include Northeast, Southeast, South, and Central Asia, United States, Russia, Australia, and New Zealand. In due course delimitation of the Asian region will extend westward to include West Asia and parts of the Middle East especially the Gulf .

Factory Asia and turns to tracing this set of issues from Russia's perspective. The summary of the analysis is presented in the conclusion. The anatomy of Asia-Pacific Economic Growth: the Factory Asia Phenomenon The emergence of Factory Asia and its further evolution reflects the consolidation of the