You are on page 1of 8

a division of

Optimizing strategies the right way to risk-proof


cyber-threat in endemic setting

21 st & 22 nd June 2022


ON -SIT E Co nfe re nce
Pull m an KLCC ,
Kual a Lump u r

9.0 0 am - 5. 3 0 pm

Platinium Partner Silver Partner

Exhibition Partner

Supporting Partner Institutional Partners

Singapore Chapter

Media Partners

i n fo@ 3nove x . c om +6 0 3 2 7 0 6 0 1 6 0 w w w .3 n ov e x.c om


2nd EDITION ANNUAL CYBERSECURITY & THREAT INTELLIGENCE SUMMIT 2022
Pullman KLCC, Kuala Lumpur | 21 st & 22 nd June 2022

Event Overview
The 2nd Edition Cybersecurity & Threat Intelligence Summit is back!
This time, In-Person in Malaysia on the 21 st & 22 nd June 2022 at Pullman KLCC Hotel, Kuala
Lumpur.

The highly interactive 2 days event, comprises of a one day conference and two exclusive
workshops are tailored for cybersecurity professionals and IT experts with updates on the
recent development in cybersecurity as well as hot-trends in SEA and globally to stay ahead
with the challenges, technologies, strategies and way of implementing the right techniques
to sustain in the new era to be able to overcome cyberattacks in the future hybrid environment.

This event will bring remarkable networking opportunities, interactive discussions through
keynotes, panelists and workshops among senior-level decision makers from cross-industries.
Attendees will gain insights on the importance of strengthening strategies to combat
cyber-threats in the new era for long-term business sustainability.

Who Should Attend?


This summit has been specifically designed for, without limiting to: -
Chief Information Security Officer (CISO) Head of IT Risk
Chief Technology Officer (CTO) Security Analyst
Chief Information Officer (CIO) Security Engineer
Director of Cybersecurity Security Architect
Group Head of Cybersecurity Security Administrator
Head of Data Privacy Security Software Developer
Head of Defense Senior Data Analyst/ Data Scientist
Head of IT Security Consultant/Specialist
Information Security Manager Compliance & Governance
Security Advisor
From the departments and divisions of Cyber Threat & Intelligence, IT Management,
Finance, Software Development, IT Solutions, Threat Intelligence Solutions, Risk &
Compliance, Regulatory Bodies and more.

Topics of Discussion & more…

1 How to increase cyber resilience and address


vulnerabilities that exist proactively?

2 What's trending on cybersecurity, threat intelligence tools


and the responsiveness?

3 Best strategies for securing devices and protecting


organization in a hybrid working environment?

4 The role of government & recent initiatives to combat


cyber threats?

5 What are the possible approaches for defense - risk mitigation


strategies?

6 How can organizations protect OT systems focusing on security


fundamentals?

20+ 100+ 2+ 2+ 2+
Inspiring Attendees Insightful Panel Networking Workshops
Speakers discussions Sessions

· Provision of a digital certificate and final recording to speakers, sponsors and


participants at the end of the conference
2nd EDITION ANNUAL CYBERSECURITY & THREAT INTELLIGENCE SUMMIT 2022
Pullman KLCC, Kuala Lumpur | 21 st & 22 nd June 2022

Featured Speakers

O p e n ing A dd r e s s Chairperson
Y B HG. D A T O ' T S . D R H A J I GE O R GE M A T H E W S
A MI RUDIN A BDUL W A H A B FA S c Principal Data Privacy & Security Compliance
Chief Executive Officer Analyst/ Data Protection Officer
Cy berSecurity M al ays ia Malaysia NT B u s i n e s s Co n s u l tin g & T r a i n i n g Malaysia

KE V I N C A RDW E LL GE O R GE D O B R E A
EC-Council Certified Advanced EC-Council Master Instructor &
Penetration Tester ; President Microsoft MCT Regional Lead
Cyber2labs, Los Angeles Cybersecurity Technologist Romania

L TC R O LA N D J A V IN E S O N G
I NF (G S C ) M N S A P A ( R) JO SI A H W I N ST O N
Senior Territory Manager & Solutions Consultant Senior Solutions Engineer, ASEAN,
Federal/Government & Service Providers Cy be r A r k
Trellix

( P a n e l M o d e ra t o r)
TA NV IN DE R S IN G H
Director Cybersecurity & AARON RAJ
Privacy - SEA Associate Editor
Pw C Malaysia T e ch W i r e A s i a Malaysia

(Panel Mo d er a t o r )
JO E D E V A N E S A N VIRAG THAKKAR
Editor APAC Information Security Officer
Tec h Wire Asia Malaysia A l l i a n z P a r t n e r s Thailand

JA CO BE N A D IE MEISAM ESLAHI PhD.


Partner Senior Director Cybersecurity
Erns t & Young (EY) Malaysia EC - Co u n ci l G l o ba l Se r vi ce s Malaysia

DR .CA RRIN E T E O H C H O O I S H I
Vice President AZRIL RAHIM
AS EAN CI O A sso cia tion Senior Cyberthreat Intelligence Management
( C ybersecurity & Governance) T e n a ga N a s i o n a l B e r h a d Malaysia
Malaysia

HA N T H E R LE E NAEEM MUSA
Adjunct Professor at American Military University, CISSP
Chief Technology Officer
Licensed Instructor with ISC2 ; Chief Information Security Officer
Cy bot s Singapore
U . S C o mm o di t y Fu t u r e s T r a d i n g C o m m issio n USA

PE I YUE N W O N G
Chief Technology Officer
IB M Security Australia, S o utheas t A s i a ,
New Z ealand , Korea

· Provision of a digital certificate and final recording to speakers, sponsors and


participants at the end of the conference
2nd EDITION ANNUAL CYBERSECURITY & THREAT INTELLIGENCE SUMMIT 2022
Pullman KLCC, Kuala Lumpur | 21 st & 22 nd June 2022

Day One Outline | ON-SITE Conference

8:00 am Registration

8:40 am Welcome & Introduction by 3novex Global

8:45 am Opening Address by

YBHG. DATO' TS. DR HAJI AMIRUDIN A BDUL WA HAB FA S c


Chief Executive Officer
C y b e r Se c u r i ty M a l a y s i a Malaysia

9:00 am THE NEED TO BUILD SECURITY INTO WEB3 (Keynote Speaker)


• How safe is transaction made using blockchain and the impact on data today?
• Cons of phishing attacks
• Tools to combat phishing attacks for remote working organization

9:30 am ZERO-TRUST : VERIFY FIRST, NEVER TRUST


• Re-think organization security's approach - processes,skills & tech
• Automate security tech
• Best practices to benefit from zero-trust
DR.CARRINE TEOH CHOOI S HI
Vice President
A SE A N C IO A s s o c i a ti o n ( Cy ber s ec u r ity & G o ve rna nce ) Malaysia

10:00 am (DIAMOND PARTNER)

10:30 am Morning Break

11:00 am NATIONAL PANEL - BUILDING BLOCKS FOR DATA BREACH (Panel 1)


• Recent development of cybersecurity trends & governance for data breach
• Action plan & outcome of implementation
• Further initiatives & funding for cybersecurity
• Ways to enhance security on digital banking - cyber fraud
( P a nel M o de r a t o r ) N A E E M M U SA
JOE DEVANESA N Adjunct Professor at American Military University,
CISSP Licensed Instructor with ISC2 ; Chief Information
Editor
Security Officer U . S C o mm o di t y F utur e s
T ec h W i r e As i a Malaysia T r a di n g Co m mi s s i o n USA

MEISAM ESL AHI PhD.


Senior Director Cybersecurity (BRONZE PARTNER)
EC- Co u n c i l G l o ba l S er vi c es Malaysia

11:45 am ADDRESSING CYBER READINESS WITH EXTENDED DETECTION AND RESPONSE


(PLATINUM PARTNER)
• Re-imagining cybersecurity, re-thinking cybersecurity approach
• How to increase cyber resilience and address cyber vulnerabilities
• Possible approaches and strategies in cyber defenseg
L TC R O L AN D J A V I N E S O N G IN F ( G S C ) MN S A P A (R)
Senior Territory Manager & Solutions Consultant Federal/
Government & Service Providers T r el l i x

12:15 pm AI POWER CYBERSECURITY


• Benefits, agility & responsiveness of AI for security framework
• Role of AI for cybersecurity today
• Impact on remote working
H AN TH ER L E E
Chief Technology Officer C y b o t s Singapore

· Provision of a digital certificate and final recording to speakers, sponsors and


participants at the end of the conference
2nd EDITION ANNUAL CYBERSECURITY & THREAT INTELLIGENCE SUMMIT 2022
Pullman KLCC, Kuala Lumpur | 21 st & 22 nd June 2022

Day One Outline (Cont'd) | ON-SITE Conference

1:00 pm Lunch Break

2:00 pm TRENDING ON IAM & PAM TODAY


• Best IAM strategies
• Measure taken by organizations to secure systems & network infrastructure
• How to optimize customer identity and access management?
TANV IND ER SINGH
Director Cybersecurity & Privacy - SEA PwC Malaysia

2:30 pm ADVANCING DDoS ATTACKS


• Ways to ensure systems are configured properly to avoid unwanted incidents
• Organization to understand & apply defense-in-dept strategy correctly
• Preventive measure to prevent security threats
JACO BENADIE
Partner
E r n s t & Y o u n g ( EY ) Malaysia

3:00 pm (GOLD PARTNER)

3:30 pm Coffee Break & Networking

4:00 pm MY SaaSy IDENTITY: IDENTITY SECURITY FOR EVERYWHERE, IN THE CLOUD


(SILVER PARTNER)
JOSIAH WINSTON
Senior Solutions Engineer, ASEAN,
CyberArk

4:30 pm GLOBAL PANEL - THREAT INTELLIGENCE : WHAT THE FUTURE HOLDS (Panel 2)
• The role of CISOs today & ways to achieve harmony with data & cybersecurity
• Ways to spot vulnerabilities in existing system and monitoring future attacks
• Perspectives on hybrid working environment & initiatives to combat cyberattacks
• Ways to make businesses 5G ready
( P a nel M oder a t o r ) AZRIL RAHIM
AARON RAJ Senior Cyberthreat
Associate Editor Intelligence Management
T ec h W i r e As i a T e na ga Na siona l Be rha d
Malaysia Malaysia

VIRAG THAKKA R PEI YUEN WONG


APAC Information Chief Technology Officer
Security Officer I BM Se curity A ustra lia , Southe a st
A l l i a n z P a r tn er s , Thailand A sia , N e w Z e a la nd, Kore a

5:30 pm End of Day 1 & Networking

SPEAKING, SPONSORSHIP &


PARTNERSHIP OPPORTUNITIES
Reach out to us for more details: -
For Speaking Opportunities, email: ainee@3novex.com
For Sponsorship Opportunities, email: rashidah@3novex.com
For Partnership and other information, email: marketing@3novex.com

· Provision of a digital certificate and final recording to speakers, sponsors and


participants at the end of the conference
2nd EDITION ANNUAL CYBERSECURITY & THREAT INTELLIGENCE SUMMIT 2022
Pullman KLCC, Kuala Lumpur | 21 st & 22 nd June 2022

Day Two Outline | In-Person - Workshops

8:30 am Registration
MasterClass 1 :

CPENT & ADVANCED DEFENSE AND TACTICS OF DECEPTION PROGRAM WORKSHOP SCHEDULE
Senior Manager Level Technical Workshop Training
9.00am: Start
11.00am: Short Break
KEV IN CA RDWELL 11.30am: Resume
EC-Council Certified Advanced Penetration Tester ; President
Cyber2labs, Los Angeles 1.00pm: End of Masterclass 1

Kevin Cardwell - President at Cyber2labs, an expert in cybersecurity and a well-known technical instructor
with more than 35 years of business experience in offering consultancy. He worked extensively with banks
and financial institutions throughout the Middle East, Europe and the UK. He also served as leader of a DoD
Red Team with 100% success rate of compromise. Some recent consulting projects include the Petroleum
Development Oman and the Central Bank of Oman. He designed and implemented the custom security baseline
for the existing Oman Airport Management Company (OAMC) airports and the two new airports. Kevin is also
an author of Center of Advanced Security CAST 611 - Advanced Penetration Testing and CAST 614 - Advanced
Network Defense

Masterclass 1 – CPENT & Advanced Defense and Tactics of Deception Program primarily targeting Senior
Manager level and to anyone moving from an expert role towards a security management position.

WORKSHOP AGENDA: Part 2 : Advanced Defense & Tactics of Deception


Part 1 : Penetration Testing Skills
Deploying Advanced Perimeter Techniques
Establish your range · Bogon Filtering · Time-Based
· Plan, Plan and Plan again · Martians · Reflexive
· Identifying vulnerabilities to test · Blackhole Routing · Context Based
· Creating machines · Source Address Verification · Hardening Perimeter
· Choosing range components · uRPF Devices

LAB: Designing an advanced perimeter solution


LAB: Establishing Your Range
Host Based Hardening
· Host firewall
Advanced Scanning Techniques
· Advanced Firewall Configuration
· Customization of scan protocols
· Windows Defender Exploit Guard
· Analyzing the scan results
· Windows Defender
· Determining a plan of attack
· Immutable files
· Identification of filtering devices and other protections
· Application Whitelisting
· Effective scan analysis methods
- File access policy daemon
· Customize and tune scan parameters
· Micro-VM
· Bypassing protection devices
· Hardware
- Fragmentation - Other methods
- Source port - Egress busting
LAB: Locking down the host machines
- Checksum
Securing an Enterprise
· Emerging Threats
LAB: Practical Advanced Scanning
· Enterprise Malware Management
· Secure Network Architecture and Micro-segmentation
Roadmap to Professional Security Testing
· Internal Decoys and Triggers
· Identify the methodology
· Hone skills
LAB: Securing an Enterprise
· Reporting
· Components of the report
Click to EC-Council Certified Penetration
View Video
Testing Professional | CPENT
LAB: Enterprise Penetration Testing Practice
Click to
View Video CYRIN Advanced Defense Course

· Provision of a digital certificate and final recording to speakers, sponsors and


participants at the end of the conference
2nd EDITION ANNUAL CYBERSECURITY & THREAT INTELLIGENCE SUMMIT 2022
Pullman KLCC, Kuala Lumpur | 21 st & 22 nd June 2022

Breakout Sessions | In-Person - Workshops

1:00 pm Lunch Break


MasterClass 2 :

EXECUTIVE MANAGEMENT PROGRAM WORKSHOP SCHEDULE


Chief Information Security Officer (CISO) Workshop Training
2.00pm: Start
3.30pm: Afternoon Break
GEORGE DOBREA 4.00pm: Resume
EC-Council Master Instructor & Microsoft MCT Regional Lead
Cybersecurity Technologist Romania 5.30pm: End of Masterclass 2

George Dobrea - founder and CEO of XEDUCO Institute, an expert in cybersecurity and a well-known technical
instructor with more than 35 years of business experience in offering consultancy and instruction for military,
commercial and public organizations in more than 30 countries.

Masterclass 2 – Executive Management Program primarily targeting the Chief Information Security Officers
and useful to anyone moving from an expert role towards a security management position.

TARGET AUDIENCE:

· Chief Information Security Officers (CISO)


· Anyone moving from an expert role towards a security management position.

WORKSHOP AGENDA:

· The role of the modern CISO in 2022: from risk mitigation to business enabler.
· Challenges CISO's face in a rapidly evolving cybersecurity landscape.
· New CISO? Things to achieve in your first 90 days.
· Top 5 areas CISO's should prioritize today. Making the case for developing a security strategy.
· Increasing Cybersecurity Culture with a Roadmap: a key objective of an effective CISO.
· CISO's common mistakes when dealing with the board – and how to avoid them. A CISO playbook
for stakeholder management, influence and persuasion.
· Practical assessment: how effective are your cybersecurity solutions against today's threats?
The story of the recent cyber-attacks that have affected the business of organizations and how they
could have been prevented.
· CISO's role during a cyber crisis. Wargame simulation: ransomware attack on the computer system
of a company.
Click to The CISO Experience by
View Video
George Dobrea

Note: Agenda may be subject to change.

· Provision of a digital certificate and final recording to speakers, sponsors and


participants at the end of the conference
2nd EDITION ANNUAL CYBERSECURITY & THREAT INTELLIGENCE SUMMIT 2022
Pullman KLCC, Kuala Lumpur | 21 st & 22 nd June 2022

Registration Form *Please complete this form and return it digitally by email to info@3novex.com

Paymen t Option
ON - S I T E ( C on f eren c e + Wo rk sho ps)
Bank Transfers | Local OrdersChecks Payment
Promo Early Bird Regular Rate Online Banking | Credit Card | PayPal

USD 799 USD 999 Click to


Pay Online
till 20th May 2022 starts from 21st May 2022

Group discount: 10% from 4 to 6 pax | 16% from 7 to 10 pax | 20% from 11 and above pax

Payment Option Bank Transfers | Local Orders | Checks Payment | Online Banking | Credit Card | PayPal

ATTENDEE DETAILS

Name (Dr/Mr/Mrs/Ms): Name (Dr/Mr/Mrs/Ms):

Job Title: Job Title:

Email: Email:

Tel / Direct Line: Tel / Direct Line:

Mobile Phone: Mobile Phone:

Name (Dr/Mr/Mrs/Ms): Name (Dr/Mr/Mrs/Ms):

Job Title: Job Title:

Email: Email:

Tel / Direct Line: Tel / Direct Line:

Mobile Phone: Mobile Phone:

COMPANY DETAILS AUTHORISATION


Organisation: Name:

Address: Job Title:

Postcode: Email:

Country: Tel:

Tel: Mobile Phone:

Nature of Business: Signature: (Mandatory)

Bank Details
Account name : 3NOVEX ASIA SDN BHD
Bank : HSBC Amanah Malaysia Berhad This booking is invalid without a signature or company stamp. Authorisation signatory
must be authorised to sign on behalf of contracting organisation.
Account Number : 018-371864-701 (USD)
Swift code : HMABMYKL
Address : No.66G, 66-1 Jalan Telawi Bangsar Baru, Bangsar 59100 KL
TERMS AND CONDITION 1. Fees are inclusive of program materials and tax.
2. PAYMENT TERMS: Payment MUST be made in full within seven (7) days from the date of registra�on or receipt of official invoice, whichever comes first. Official
INDEMNITY: 3novex Asia Sdn Bhd is the responsible invoice will be sent upon submission of registra�on form, while payment receipt will be generated upon successful payment. 3novex reserves the rights to refuse
organiser of the Event. 3novex shall have the rights, free admission if payment is not made as s�pulated.
of charge, to transfer to a new loca�on, cancel or 3. CANCELLATION/SUBSTITUTION: Any form of cancella�on can be done at least 15 days before Event Date with a fully claimable 100% refund. Cancella�on
postpone the Event by no�fying the Solu�on Provider within 15 days lesser, allows a 50% refund only. Par�cipants can be subs�tuted up to at least one day prior to the Event. For neither cancella�on or subs�tu�on,
thereof, if circumstances rela�ng to the Event changes paid par�cipants may use the paid fees as Credit Transfer for any other future events of 3novex.
essen�ally, in case of a Force Majeure occurrence, or if 4. LOGISCTICS: If, for any reason, 3novex decides to cancel or postpone this Event, 3novex is not responsible for covering airfare, hotel, or other travel costs
3novex’s business partner, who has an important role in incurred by clients. Event program content is subject to change without no�ce.
the organisa�on of the Event, breaches its agreement 5. COPYRIGHT ETC: All intellectual property rights of all materials produced or distributed by 3novex during the Event are expressly reserved and any
with 3novex. Events of Force Majeure includes (without unauthorized duplica�on, publica�on or distribu�on is prohibited.
being limited to) fire, natural condi�ons/disasters, 6. DATA PROTECTION: Client confirms and agrees to the request and consent to 3novex retaining client informa�on on 3novex’s database to be used by 3novex
mobiliza�on, legal provisions, rules and regula�ons given and, if required, passed to selected third par�es to assist in communica�ng products and services which may be of interest to the client.
by authori�es, malfunc�ons and breaks in traffic and data 7. IMPORTANT NOTE: While every reasonable effort will be made to adhere to the adver�sed package, 3novex reserves the right to change event dates, sites or
loca�on or omit event features, or merge the event with another event, as it deems necessary without penalty and in such situa�ons no refunds, part refunds or
communica�ons, accidents concerning 3novex, burglaries
alterna�ve offers shall be made. In the event that 3novex permanently cancels the event for any reason whatsoever, (including, but not limited to any force
and hacking, and any delays of the subcontractors which majeure occurrence) and provided that the event is not postponed to a later date nor is merged with another event, the Client shall receive a credit note for the
are due to some of the abovemen�oned reasons, or other amount that the Client has paid to such permanently cancelled event, valid for up to six months to be used for another 3novex Event.
reasons preven�ng the realisa�on of the Event, which are 8. GOVERNING LAW: This Agreement shall be governed and construed in accordance with the law of Malaysia not including its conflict of law’s provisions. Any
beyond the control of 3novex that may occur a�er the disputes arising from this contract shall be brought before the court of Malaysia. At sole discre�on, 3novex may elect to bring any dispute arising under this
date of agreeing on the Event that is not reasonably contract to the jurisdic�on of the codes and which the client’s offices are located.
foreseeable at the �me of agreement. 9. Par�cipants a�ending at venue are required to provide health status update 3 days before event day (latest on 3 June 2022).Any failure of providing health
status update, par�cipants will not be able to join the event.
10. Inclusive breakfast, lunch and coffee break for those a�ending event at the hotel, Should there be last minute cancella�on from paid a�endee due to
unforeseen circumstances before the event day, refund will be provided.

i n fo@ 3nove x . co m +6 0 3 2 7 0 6 0 1 6 0 w w w .3 n ov e x.c om

You might also like