CYBER INTELLIGENCE ASIA...Invited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber...

6
For more information visit – www.intelligence-sec.com Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706 CYBER INTELLIGENCE ASIA CONFERENCE & EXHIBITION KUALA LUMPUR, MALAYSIA 10 TH – 12 TH MARCH 2020 SUPPORTING PARTNER CONFIRMED SPEAKERS Dato’ Ts Dr. Haji Amirudin bin Abdul Wahab, Chief Executive Officer, CyberSecurity Malaysia Budi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT) Ernywati Dewi binti Abas, Director, Sabah State Computer Services Department, Malaysia Genalyn B. Macalinao, Policy Lead, Cyber Security Bureau, Department of Information and Communications Technology (DICT), Philippines Dr. Chalee Vorakulpipat, Head of Cybersecurity Laboratory, National Electronics and Computer Technology Center (NECTEC), Thailand Muhittin Hasancioglu, Chief Information Security Officer and Head of Cyber, PETRONAS Ts Dr. Zahri bin Yunos, Chief Operating Officer, CyberSecurity Malaysia Rudi Lumanto, Chairman, Indonesia Security Incident Response Team on Internet Infrastructure (ID-SIRTII) Alexandru Caciuloiu, Cybercrime and Cryptocurrency Programme Coordinator, UNODC Fazlan bin Abdullah, Head of Department, Government Engagement Department, CyberSecurity Malaysia Rana Shahzad, Forensics Expert, Cybercrime Division, Federal Investigation Agency, Pakistan Vongvilai Inthasanh, Network Security Specialist, Lao Computer Emergency Response Team (LaoCERT) EVENT SPONSORS AND EXHIBITORS

Transcript of CYBER INTELLIGENCE ASIA...Invited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber...

Page 1: CYBER INTELLIGENCE ASIA...Invited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia 10.40 Networking Coffee Break 11.10 CYBER SECURITY

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

CYBER INTELLIGENCE

ASIA

CONFERENCE & EXHIBITION

KUALA LUMPUR, MALAYSIA

10TH– 12

THMARCH 2020

SUPPORTING PARTNER

CONFIRMED SPEAKERS• Dato’ Ts Dr. Haji Amirudin bin Abdul Wahab, Chief Executive Officer, CyberSecurity

Malaysia• Budi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)• Ernywati Dewi binti Abas, Director, Sabah State Computer Services Department,

Malaysia• Genalyn B. Macalinao, Policy Lead, Cyber Security Bureau, Department of Information

and Communications Technology (DICT), Philippines• Dr. Chalee Vorakulpipat, Head of Cybersecurity Laboratory, National Electronics and

Computer Technology Center (NECTEC), Thailand• Muhittin Hasancioglu, Chief Information Security Officer and Head of Cyber, PETRONAS• Ts Dr. Zahri bin Yunos, Chief Operating Officer, CyberSecurity Malaysia• Rudi Lumanto, Chairman, Indonesia Security Incident Response Team on Internet

Infrastructure (ID-SIRTII)• Alexandru Caciuloiu, Cybercrime and Cryptocurrency Programme Coordinator, UNODC• Fazlan bin Abdullah, Head of Department, Government Engagement Department,

CyberSecurity Malaysia• Rana Shahzad, Forensics Expert, Cybercrime Division, Federal Investigation Agency,

Pakistan• Vongvilai Inthasanh, Network Security Specialist, Lao Computer Emergency Response

Team (LaoCERT)

EVENT SPONSORS AND EXHIBITORS

Page 2: CYBER INTELLIGENCE ASIA...Invited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia 10.40 Networking Coffee Break 11.10 CYBER SECURITY

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT PROGRAMME – DAY ONE08.30 Registration and Networking

09.00 CHAIRMAN’S OPENING REMARKSBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

REGIONAL CYBER SECURITY STRATEGIES AND POLICIESOverview of the regions cyber security policies, laws, regulations and strategies. Discussing what is in the pipeline and what has been developed over the past few years to build up national cyber defence capabilities.

09.10 MALAYSIA CYBER STRATEGIES AND ROADMAP• Current cyber security strategies for the Malaysian Government• Developments that have taken place in the past couple of years• Cyber security operation of CyberSecurity Malaysia• What is needed for the next step?Dato’ Ts Dr. Haji Amirudin bin Abdul Wahab, Chief Executive Officer, CyberSecurity Malaysia

09.40 RESECURITY PRESENTATIONSenior Representative, Resecurity

10.10 NATIONAL CYBER SECURITY POLICIES – MALAYSIA LANDSCAPE• How the national cyber security policies are developed?• Current incentives of the national government• Cyber laws across Malaysia• Cooperation with neighbouring nationsInvited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia

10.40 Networking Coffee Break

11.10 CYBER SECURITY IN THE STATE GOVERNMENT PUBLIC SERVICE• State Public Sector IT Security Governance• Laying the State Public Sector IT Security Foundation• Overcoming the Challenges• Towards IT Security Excellence• Looking aheadErnywati Dewi binti Abas, Director, Sabah State Computer Services Department, Malaysia

11.40 OVERVIEW OF THAILAND’S CYBER SECURITY STRATEGY• Thailand’s cyber security policy• Current strategy on cyber security• What are the current priorities?• Developments that have taken place in recent yearsDr. Chalee Vorakulpipat, Head of Cybersecurity Laboratory, National Electronics and Computer Technology Center (NECTEC), Thailand

12.10 CYBER SECURITY DEVELOPMENTS IN THE PHILIPPINES• Overview of current cyber security policies in the Philippines• Cyber laws in place• Developments being made to create a strong cyber security

strategy• Next stepsGenalyn B. Macalinao, Policy Lead, Cyber Security Bureau, Department of Information and Communications Technology (DICT), Philippines

12.40 Networking Lunch Break

13.40 CYBER STRATEGY AND POLICY FOR MYANMAR • Introduction of the National Cyber Security Center of Myanmar• Current cyber security strategies in place• Government policies and laws around cyber security• What is next?Invited: Yan Naung Soe, Assistant Director, National Cyber Security Center, Myanmar

PROTECTING CRITICAL INFRASTRUCTURES AND PRIVATE DATAOverview of different industries and how they manage their computer systems, critical infrastructure and private/classified data from cyber criminals. Reviewing the importance of building sophisticated defence systems.

14.10 UNDERSTANDING THE IMPORTANCE OF THREAT INTELLIGENCE• Overview of how TNB monitor their computer systems• Threats faced to our systems• Threat intelligence procedures and systems• Cooperation with other public sector agenciesInvited: Azril Azam Abdul Rahim, Threat Intelligence Manager, Tenaga Nasional Berhad (TNB), Malaysia

14.40 PROTECTING DATA WITHIN PETRONAS• Overview of Petronas’ cyber security strategies• Importance of protecting data• Systems in place to protect private data and information• Developments madeMuhittin Hasancioglu, Chief Information Security Officer and Head of Cyber, PETRONAS

15.10 Networking Coffee Break

TRAINING AND AWARENESS – COMBATING CYBER THREATS Developments being made in making young people, senior citizens and employees aware of the dangers online. Review of the increase of extremist content online and influencers reaching out to civilians.

15.40 CYBER TERRORISM – HOW TO TRAIN AWARENESS• Definition of Cyber Terrorism• How we can improve awareness of cyber terrorism• Recent cases of cyber terrorismTs Dr. Zahri bin Yunos, Chief Operating Officer, CyberSecurity Malaysia

16.10 CREATING AWARENESS OF HOW EXTREMISTS WORK ONLINE – INDONESIA PERSECTIVE• Current operations of ID-CERT• How ID-CERT reaches out to citizens to build awareness of

extremist behaviour online• Internet threats• What is required to build up cyber awareness in IndonesiaBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

16.40 CHAIRMAN’S CLOSING REMARKSBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

Evening Reception Sponsored by

17.00 – 19.00Drinks and Canapes served in the Exhibitor Hall

Page 3: CYBER INTELLIGENCE ASIA...Invited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia 10.40 Networking Coffee Break 11.10 CYBER SECURITY

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT PROGRAMME – DAY TWO08.30 Registration and Networking

09.00 CHAIRMAN’S OPENING REMARKSBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

COMBATING CYBERCRIMES IN THE REGIONCurrent cybercrimes faced in the region. What procedures are in place to respond to cybercrimes and what are the laws in countering cybercrimes? Case studies of recent cyber related crimes in the region and national response to them.

09.10 PROTECTING CRITICAL INFRASTRUCTURE ACROSS MALAYSIA – CHALLENGES IN CYBERCRIMES• Overview of MAMPU cyber strategies• Digital developments across Malaysia• Protecting critical infrastructures across Malaysia• How to combat cybercrimes in the digital age?Invited: Abdul Latif bin Ismail, Director of ICT Infrastructure Shared Services and Security Development Division, Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)Invited: Susie Dorai Raj, Director of ICT Consulting Division, Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)

09.40 RESECURITY PRESENTATIONSenior Representative, Resecurity

10.10 GOVERNMENT COOPERATION AND ENGAGEMENT IN COMBATING CYBERCRIMES ACROSS MALAYSIA• Overview of CyberSecurity Malaysia engagement with the public

and private sectors• Importance of sharing information when combating cybercrimes• Government procedures when responding to a cyber-attack• What is required next?Fazlan bin Abdullah, Head of Department, Government Engagement Department, CyberSecurity Malaysia

10.40 Networking Coffee Break

11.10 COUNTERING CYBERCRIMES AND MONEY LAUNDERING ACROSS SOUTH-EAST ASIA• Current UN initiatives at countering cybercrimes• Money laundering monitoring across South-East Asia• Different types of cyber currencies being used in the dark web• What is next?Alexandru Caciuloiu, Cybercrime and Cryptocurrency Programme Coordinator, UNODC

11.40 CYBERCRIMES FACED IN PAKISTAN• Cybercrimes faced recently in Pakistan• Procedures in place to respond to cybercrimes• Cyber laws • What is required for the future?Rana Shahzad, Forensics Expert, Cybercrime Division, Federal Investigation Agency, Pakistan

12.10 MONITORING CYBER THREATS ONLINE• Overview of LaoCERT• Current threats faced and recent cybercrimes• Procedure in responding to cybercrimes• Lessons learnt from previous attacksVongvilai Inthasanh, Network Security Specialist, Lao Computer Emergency Response Team (LaoCERT)

12.40 Networking Lunch Break

13.40 PROTECTING CRITICAL INFRASTRUCTURES ACROSS INDONESIA• Threats faced to internet infrastructures• Case studies of recent attacks• Developments being made in cyber defence across Indonesia• Lessons learntRudi Lumanto, Chairman, Indonesia Security Incident Response Team on Internet Infrastructure (ID-SIRTII)

INTERNATIONAL COOPERATION IN CYBERCRIMESHow regional agencies work with local authorities to assist in fighting against cybercrimes. Regional programs in place to assist local governments with cyber laws and policies.

14.10 INTERPOL INITIATIVES IN FIGHTING CYBERCRIMES• Overview of Interpol’s work in the region• Cooperation with national agencies in fighting against

cybercrimes• Interpol programs for cybercrimes• What are the next steps?Invited: Senior Representative, Interpol

14.40 CYBER LAWS AGAINST CYBER CRIMINALS• Overview of ASEANAPOL programs in the region• Current laws and prosecution for cyber criminals• Case studies of recent regional cybercrimes• Collaboration with local police forcesInvited: Senior Representative, ASEANAPOL

15.10 CHAIRMAN’S CLOSING REMARKSBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

15.30 Networking Coffee Break

16.00 CLOSE OF CONFERENCE AND EXHIBITION

Page 4: CYBER INTELLIGENCE ASIA...Invited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia 10.40 Networking Coffee Break 11.10 CYBER SECURITY

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT SPONSORS & EXHIBITORS

Resecurity Inc., a California-based cybersecurity company, focused on next-generation endpoint protection andintelligence-driven solutions. Resecurity combines robust protection stack to identify security anomalies withinvestigation and remediation capabilities. The flagman products are EPP™ (Endpoint Protection Platform), Risk™(SaaS for Digital Risk Monitoring) and Context™ (Cyber Threat Intelligence Platform). The company also providesvCISO and security research services to leading Fortune 500 corporations and governments worldwide.

Page 5: CYBER INTELLIGENCE ASIA...Invited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia 10.40 Networking Coffee Break 11.10 CYBER SECURITY

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT PARTNERS

CyberSecurity Malaysia is the national cybersecurity specialist and technical agency under the purview of the Ministry of Communications and Multimedia Malaysia. In essence, CyberSecurity Malaysia is committed to providing a broad range of cybersecurity innovation-led services, programmes and initiatives to help reduce the vulnerability of digital systems, and at the same time strengthen Malaysia’s self-reliance in cyberspace. Among specialised cyber security services provided are Cyber Security Responsive Services; Cyber Security Proactive Services; Outreach and Capacity Building; Strategic Study and Engagement, and Industry and Research Development.

For more information, visit http://www.cybersecurity.my. For general inquiry, email to [email protected]. Stay connected with us on www.facebook.com/CyberSecurityMalaysia and www.twitter.com/cybersecuritymy

Page 6: CYBER INTELLIGENCE ASIA...Invited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia 10.40 Networking Coffee Break 11.10 CYBER SECURITY

DELEGATE DETAILS:Please complete your details below.

Title/Rank:

First Name:

Surname:

Job Title:

Company:

Tel:

Fax:

Email:

Address:

Signature:

Date:

VENUE & ACCOMMODATION

Hotel Name: Renaissance Hotel, Kuala Lumpur,

Malaysia

Please tick here if you would us to contact you to

book your accommodation ☐

TERMS AND CONDITIONS

Payments - All bookings made prior to the conference must be paid in full to guarantee registration. Oncepayment has been received, an email confirmation and a receipted invoice will be sent. If payment is not madeat the time of booking, registration will be provisional. Bookings received less than two weeks before theconference date can only be paid by credit card.Early Bird Rate - In order to qualify for any 'early bird' rates, booking must be received before the deadlinedate listed in the conference marketing material.Substitutions & Cancellations - Delegates may nominate an alternative person from their organisation to attendup to 24 hours prior to the start of the event, at no extra charge. Should substitution not be possible,cancellation charges apply as follows: 8 weeks or more prior to start of event: 10% of the delegate fee , 4 to8 weeks prior to start of event: 50% of the delegate fee , 4 weeks or less prior to start of event: 100% of thedelegate fee. All substitutions and cancellations must be received in writingAccess Requirements - Delegates should advise of any special access requirements at the time of registration.Registration Information - Registration information will be sent to registered delegates by email at least sevendays prior to the event. Any delegate not receiving the registration information should contact us by email [email protected] to Programme - Cancellation/Postponement of Event - Intelligence-Sec reserves the right to makealterations to the conference programme, venue and timings.In the unlikely event of the programme being cancelled by Intelligence-Sec, a full refund will be made. Liabilitywill be limited to the amount of the fee paid by the delegate. In the event of it being found necessary, forwhatever reason, that the conference is being postponed or the dates being changed, the organisers shall notbe liable for any expenditure, damage or loss incurred by the delegate. If by re-arrangement or postponementthe event can take place, the booking between the delegate and the organisers shall remain in force and willbe subject to the cancellation schedule in paragraph 3Speakers - Views expressed by speakers are their own. Intelligence-Sec cannot accept liability for advice given,or views expressed, by any speaker at the conference or in any material provided to delegates.Photography & Filming - For promotional purposes, there may be a professional photographer and videoproduction taking place during the conference. Delegates who do not wish to be filmed or recorded shouldadvise the organisers by email to [email protected] prior to the event.Data Protection - By submitting registration details, delegates agree to allow Intelligence-Sec and companiesassociated with the conference to contact them regarding their services. Delegates who do not wish to receivesuch communications please email [email protected]. The contact details of registered delegateswill be placed on the attendee list which will be passed to sponsoring companies and to all attendees for themto see who is at the conference for the purpose of networking and meetings. Delegates who do not wish to beincluded on this list should advise at the time of booking.Websites & Links - The conference and associated Intelligence-Sec websites may link to other websites andnetworking tools provided for the convenience of the users. The contents of these websites are maintained bytheir owners, for which Intelligence-Sec takes no responsibility. Neither can responsibility be taken for contentsof any website linking to this website.Insurance - It is the responsibility of the delegate to arrange appropriate insurance cover in connection withtheir attendance at the conference. Intelligence-Sec cannot be held liable for any loss, liability or damage topersonal property. If you have any questions about these Terms & Conditions, please contact –[email protected]

PAYMENT DETAILS:

Please complete your details below.

☐ Wire Transfer:Barclays, 16 High Street North, Dunstable, Bedfordshire, LU6 1JZ, United KingdomSort Code: 20 55 33 Account Number: 53554104

☐ Online Payment:

Register your details online via our website http://www.intelligence-sec.com/login/

and follow the instructions to make payment

☐ PayPal

We will send you a PayPal Request for you to make payment with your credit card.

You do not need a PayPal Account to make payment this way.

ADDITIONAL NOTES

DELEGATE BOOKING FORM

Cyber Intelligence Asia 202010th – 12th MARCH 2020, KUALA LUMPUR, MALAYSIA

Please Tick

Military/Govt. Public Sector Rate

Early Bird Price (book before 31st

Dec 2018)

Standard Price

Two Day Conference & Exhibition 600 USD 800 USD

Workshop 150 USD 200 USD

All of the Above 750 USD 1,000 USD

For more information visit – www.intelligence-sec.com

DATA PROTECTION

Please tick the box below if you are happy for us to share your email address with the event sponsors and exhibitors post event.I am happy for you to share my email address with the sponsors/exhibitors ☐

Please Tick

Private Sector Rate Early Bird Price (book before 31st

Dec 2018)

Standard Price

Two Day Conference & Exhibition 1,200 USD 1,600 USD

Workshop 300 USD 400 USD

All of the Above 1,500 USD 2,000 USD