October 13, 2020
4:00 PM SGT
BrighTalk
Defensible Cybersecurity:
Balancing Business and Operational Requirements
The online world that we live in has increased the risks for organizations as our data may be exposed to a breach because of the increased attack surface. Organizations needs to take steps to create a defensible cyber infrastructure in their digital transformation journey. The talk will cover the steps that organizations need to take to ensure that cybersecurity is weaved into the organizations’ DNA. Some best practices will be discussed as well as examples on how they can be implemented. The talk will end with some key take-aways to build a defensible cyber organization and security program.
September 29 - October 2, 2020
Online
Black Hat Asia 2020
Black Hat Asia will be held virtually in the Singapore Time Zone, September 29-October 2. During this week, information security experts will teach interactive, online Trainings, innovative research will be presented at Briefings, the latest open-source tools will be showcased at Arsenal, and the Business Hall will feature top-tier security solutions and service providers, plus ample networking events and opportunities.
September 17, 2020
4:00 PM SGT
Online
Panel Discussion:
"5G, Data and IOT: How to avoid being left behind"
Moderator:
Jane Lo (Correspondent, MySecurity Media)
Panellists:
-
John Lee Managing Director, GRF Asia Pacific Pte Ltd
-
Vihang Shah Executive Advisor, SynFiny Advisors
-
Oleg Ishanov Director of Threat Research, Acronis
July 17, 2020
11:20 AM SGT
RSAConference 2020
Asia Pacific & Japan
Virtual Summit
Intelligence Sharing for Critical Infrastructure Resiliency
Critical infrastructure operators face greater risk due to OT/IT convergence. A breach can lead to damaging consequences for the operator as essential services are disrupted.
Actionable intelligence contextualised to the organizational threat profile enables effective response prioritization. This session will highlight the threat landscape, value of intelligence sharing and how it is achieved.
August 13, 2020
10:30 AM SGT
Online
“VPN Vulnerabilities and the Security Implications for OT Remote Access”
OT-ISAC partner, Claroty researchers recently disclosed their discovery of multiple vulnerabilities affecting VPN-based products used primarily to provide off-site personnel with access to operational technology (OT) networks within industrial enterprises and critical infrastructure.
Join us together with Ghian Oberholzer, Regional VP Technical Operations at Claroty and John Lee, Managing Director at OT-ISAC in this interactive discussion that will provide insights into these issues answering important questions:
-What is the overview of industrial VPN vulnerabilities discovered by Claroty researchers?
-What are risks inherent to OT remote access and the controls needed to minimize those risks?
-Why VPN-based solutions by itself are not enough for securing OT remote access?
August 17, 2020
4:00 PM SGT
BrighTalk
Cybersecurity in the New World
As most of our systems and processes depends on digital technologies, it leaves us open to cyber attacks. We need to be prepared for the next external change that may leave us vulnerable to an attack. In the presentation some of the ways to increase our cyber resilience will be discussed.
Cyber security must continuously evolved and be proactive. It must be top down and bottom up. The governance of Operational Technology and Information Technology needs to be holistic and seamless to prevent gaps in the environment.
Just as important is the situation awareness on the ground and the control mechanism to bring to management attention when things go wrong or are likely to.
This session will cover:
-
Understand the changing digital complexity
-
Take steps to protect the critical assets by utilizing a proactive risk based approach
-
The approach will be covered in the talk
May 21, 2020
10:30 AM SGT
Online
Emerging OT Challenges: Vulnerabilities, Attack Vectors and Attack Signatures in Today’s World
The physical world and the virtual world were once separate. Today’s digital world has changed that. Until recently, OT systems were air-gapped and as a result were often not designed with robust or any cybersecurity.
Because of global IP visibility, and organizations desires to improve their operations via the promises of machine learning and business analytics, previously isolated OT systems are now susceptible to the same threat of cyber-attacks as IT systems with even graver consequences.
This session will cover the vulnerabilities, attack vectors and attack signatures unique to the OT space and demonstrate how real-time and secure information sharing around actionable intelligence can enable all members of a network or a community to gain knowledge for preventing, detecting, interdicting and mitigating OT threats.
Known as “collective defense”, this information sharing reverses the negative network effects in cyber and enables members to benefit from being part of a large trusted network.
June 18, 2020
10:30 AM SGT
Online
Lazarus in 2020
Lazarus attacks on OT industries started as most attacks do, via phishing emails or documents. Should email as an initial vector fails, Lazarus threat actors stealthily move on to communicate with target's employees via social media (Facebook, Linkedin, etc.) or Skype. Recent attacks by Lazarus threat actors on Energy, Aerospace and Ammunition manufacturing sectors will be dissected in great detail.
Join this webinar to discover the initial vectors employed by Lazarus in recent attacks and the evolution of the multilayer proxy infrastructure of Lazarus.
The session will also cover Human Factor in ICS Security and how it plays as an important ingredient on effective information sharing Community (What are the incentives and barriers?)
July 7, 2020
Parkroyal Collection Marina Bay, Singapore
Singapore Cyber Attack 2020
CyberAttack Singapore 2020 is TEH Group’s largest CyberAttack event in its series across the APAC region. Happening at Parkroyal Collection Marina Bay, the event will focus on many critical areas in the cyber security domain, pushing forward the originally planned agendas such as threat intelligence, information security, data privacy, technology risks, cyber awareness, data breach, and third-party risks.
April 6, 2020
3:00 PM SGT
BrightTALK
[PANEL] What would CISO do?
As cybersecurity vulnerabilities and breaches continue to make headlines and put organizations reputation at stake, it’s important to ask “What would a CISO do?”
Join this interactive panel of industry experts as they discuss:
- Top threats to look out for in 2020
- Key factors for building a successful CISO strategy
- Selling your security strategy
- Why your entire organization should be up to date on cybersecurity
Moderator: Paul Brennecker QSA, Head of Operations at 3B Data Security
Panelists:
John Lee, Managing Director, GRF Asia Pacific
RV Raghu, Director Versatilist Consulting India Pvt Ltd & Director, ISACA
Germaine Tan, Director of Threat Analysis, Darktrace
April 8, 2020
10:00 AM SGT
BrightTALK
An Intelligence Led Approach Using AI for Cyber Defense
The world is becoming increasingly connected in the digital age that is setting upon us and there is no turning back. The huge opportunities from the IT and OT convergence enable new services and increased productivity. At the same time with greater connectivity there is also greater risks to organizations because of this increased threat surface. A new approach to defend against cyber attacks is needed to keep pace with other business changes and evolving threats. Artificial Intelligence and Machine Learning technologies may present a solution to this problem.
April 22, 2020
11:00 AM SGT
Online
Elevate Incident Response for Industrial Control Systems: What are the deliberations and priorities?
How can organization elevate their ICS incident response while maintaining safety and reliability of operations?
Join Exclusive OT-ISAC Webinar with John Lee, GRF APAC Managing Director and Dave Weinstein, CISO from Claroty to walk you thru "What are Best Practices for deliberating and setting incident response priorities to help your organization bolster cyber security both OT and IT infrastructure."