5
For more information visit – www.intelligence-sec.com Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706 CYBER INTELLIGENCE ASIA CONFERENCE & EXHIBITION KUALA LUMPUR, MALAYSIA 11 TH – 12 TH MARCH 2020 SUPPORTING PARTNER CONFIRMED SPEAKERS Dato’ Ts Dr. Haji Amirudin bin Abdul Wahab, Chief Executive Officer, CyberSecurity Malaysia Budi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT) Ernywati Dewi binti Abas, Director, Sabah State Computer Services Department, Malaysia Kyaw Soe Naing, Deputy Director, National Cyber Security Center, Myanmar Genalyn B. Macalinao, Policy Lead, Cyber Security Bureau, Department of Information and Communications Technology (DICT), Philippines Nur Hidayah binti Abdullah, Director, Malaysian Administrative Modernisation and Management Planning Unit (MAMPU) Muhittin Hasancioglu, Chief Information Security Officer and Head of Cyber, PETRONAS Ts Dr. Zahri bin Yunos, Chief Operating Officer, CyberSecurity Malaysia Rudi Lumanto, Chairman, Indonesia Security Incident Response Team on Internet Infrastructure (ID-SIRTII) Pawinee Parnitudom, Cybercrime Consultant, UNODC Fazlan bin Abdullah, Head of Department, Government Engagement Department, CyberSecurity Malaysia Rana Shahzad, Forensics Expert, Cybercrime Division, Federal Investigation Agency, Pakistan Vongvilai Inthasanh, Network Security Specialist, Lao Computer Emergency Response Team (LaoCERT) Dr. Montida Pattaranantakul, Researcher, Information Security Research Team, National Electronics and Computer Technology Center (NECTEC), Thailand Professor Kwok Yan Lam, Director, Strategic Centre for Research in Privacy-Preserving Technologies and Systems (SCRIPTS), Nanyang Technological University, Singapore

CYBER INTELLIGENCE ASIA · For more information visit – Book your place by: Web: I Email: [email protected] I Tel: +44(0)1582 346706 EVENT PROGRAMME –DAY TWO 08.30 Registration

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CYBER INTELLIGENCE ASIA · For more information visit – Book your place by: Web: I Email: events@intelligence-sec.com I Tel: +44(0)1582 346706 EVENT PROGRAMME –DAY TWO 08.30 Registration

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

CYBER INTELLIGENCE

ASIA

CONFERENCE & EXHIBITION

KUALA LUMPUR, MALAYSIA

11TH– 12

THMARCH 2020

SUPPORTING PARTNER

CONFIRMED SPEAKERS• Dato’ Ts Dr. Haji Amirudin bin Abdul Wahab, Chief Executive Officer, CyberSecurity

Malaysia• Budi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)• Ernywati Dewi binti Abas, Director, Sabah State Computer Services Department,

Malaysia• Kyaw Soe Naing, Deputy Director, National Cyber Security Center, Myanmar• Genalyn B. Macalinao, Policy Lead, Cyber Security Bureau, Department of Information

and Communications Technology (DICT), Philippines• Nur Hidayah binti Abdullah, Director, Malaysian Administrative Modernisation and

Management Planning Unit (MAMPU) • Muhittin Hasancioglu, Chief Information Security Officer and Head of Cyber, PETRONAS• Ts Dr. Zahri bin Yunos, Chief Operating Officer, CyberSecurity Malaysia• Rudi Lumanto, Chairman, Indonesia Security Incident Response Team on Internet

Infrastructure (ID-SIRTII)• Pawinee Parnitudom, Cybercrime Consultant, UNODC• Fazlan bin Abdullah, Head of Department, Government Engagement Department,

CyberSecurity Malaysia• Rana Shahzad, Forensics Expert, Cybercrime Division, Federal Investigation Agency,

Pakistan• Vongvilai Inthasanh, Network Security Specialist, Lao Computer Emergency Response

Team (LaoCERT)• Dr. Montida Pattaranantakul, Researcher, Information Security Research Team, National

Electronics and Computer Technology Center (NECTEC), Thailand• Professor Kwok Yan Lam, Director, Strategic Centre for Research in Privacy-Preserving

Technologies and Systems (SCRIPTS), Nanyang Technological University, Singapore

Page 2: CYBER INTELLIGENCE ASIA · For more information visit – Book your place by: Web: I Email: events@intelligence-sec.com I Tel: +44(0)1582 346706 EVENT PROGRAMME –DAY TWO 08.30 Registration

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT PROGRAMME – DAY ONE08.30 Registration and Networking

09.00 CHAIRMAN’S OPENING REMARKSBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

REGIONAL CYBER SECURITY STRATEGIES AND POLICIESOverview of the regions cyber security policies, laws, regulations and strategies. Discussing what is in the pipeline and what has been developed over the past few years to build up national cyber defence capabilities.

09.10 MALAYSIA CYBER STRATEGIES AND ROADMAP• Current cyber security strategies for the Malaysian Government• Developments that have taken place in the past couple of years• Cyber security operation of CyberSecurity Malaysia• What is needed for the next step?Dato’ Ts Dr. Haji Amirudin bin Abdul Wahab, Chief Executive Officer, CyberSecurity Malaysia

09.40 NATIONAL CYBER SECURITY POLICIES – MALAYSIA LANDSCAPE• How the national cyber security policies are developed?• Current incentives of the national government• Cyber laws across Malaysia• Cooperation with neighbouring nationsInvited: Ir. Md. Shah Nuri bin Md. Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia

10.10 Networking Coffee Break

10.40 CYBER SECURITY IN THE STATE GOVERNMENT PUBLIC SERVICE• State Public Sector IT Security Governance• Laying the State Public Sector IT Security Foundation• Overcoming the Challenges• Towards IT Security Excellence• Looking aheadErnywati Dewi binti Abas, Director, Sabah State Computer Services Department, Malaysia

11.10 OVERVIEW OF THAILAND’S CYBER SECURITY STRATEGY• Thailand’s cyber security policy• Current strategy on cyber security• What are the current priorities?• Developments that have taken place in recent yearsDr. Montida Pattaranantakul, Researcher, Information Security Research Team, National Electronics and Computer Technology Center (NECTEC), Thailand

11.40 CYBER SECURITY DEVELOPMENTS IN THE PHILIPPINES• Overview of current cyber security policies in the Philippines• Cyber laws in place• Developments being made to create a strong cyber security

strategy• Next stepsGenalyn B. Macalinao, Policy Lead, Cyber Security Bureau, Department of Information and Communications Technology (DICT), Philippines

12.10 CYBER STRATEGY AND POLICY FOR MYANMAR • Introduction of the National Cyber Security Center of Myanmar• Current cyber security strategies in place• Government policies and laws around cyber security• What is next?Kyaw Soe Naing, Deputy Director, National Cyber Security Center,Myanmar

12.40 Networking Lunch Break

PROTECTING CRITICAL INFRASTRUCTURES AND PRIVATE DATAOverview of different industries and how they manage their computer systems, critical infrastructure and private/classified data from cyber criminals. Reviewing the importance of building sophisticated defence systems.

13.40 PROTECTING DATA WITHIN PETRONAS• Overview of Petronas’ cyber security strategies• Importance of protecting data• Systems in place to protect private data and information• Developments madeMuhittin Hasancioglu, Chief Information Security Officer and Head of Cyber, PETRONAS

14.10 LATEST PRIVACY TECHNOLOGIES• New laws and regulations over privacy data• Current technologies and trends based around privacy of

information• What is needed next?Professor Kwok Yan Lam, Director, Strategic Centre for Research in Privacy-Preserving Technologies and Systems (SCRIPTS), Nanyang Technological University, Singapore

14.40 Networking Coffee Break

TRAINING AND AWARENESS – COMBATING CYBER THREATS Developments being made in making young people, senior citizens and employees aware of the dangers online. Review of the increase of extremist content online and influencers reaching out to civilians.

15.10 CYBER TERRORISM – HOW TO TRAIN AWARENESS• Definition of Cyber Terrorism• How we can improve awareness of cyber terrorism• Recent cases of cyber terrorismTs Dr. Zahri bin Yunos, Chief Operating Officer, CyberSecurity Malaysia

15.40 CREATING AWARENESS OF HOW EXTREMISTS WORK ONLINE – INDONESIA PERSECTIVE• Current operations of ID-CERT• How ID-CERT reaches out to citizens to build awareness of

extremist behaviour online• Internet threats• What is required to build up cyber awareness in IndonesiaBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

16.10 CYBER WARFARE TRAINING AND DEVELOPMENTS• Current cyber warfare programmes within MINDEF• Developments made in cyber warfare in recent years• Training to officers in the cyber warfare techniques• What is next?Invited: Lieutenant Colonel Dr. Sayuthi bin Jaafar, Director, Cyber Warfare, Ministry of Defence, Malaysia

16.40 CHAIRMAN’S CLOSING REMARKSBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

Page 3: CYBER INTELLIGENCE ASIA · For more information visit – Book your place by: Web: I Email: events@intelligence-sec.com I Tel: +44(0)1582 346706 EVENT PROGRAMME –DAY TWO 08.30 Registration

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT PROGRAMME – DAY TWO08.30 Registration and Networking

09.00 CHAIRMAN’S OPENING REMARKSBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

COMBATING CYBERCRIMES IN THE REGIONCurrent cybercrimes faced in the region. What procedures are in place to respond to cybercrimes and what are the laws in countering cybercrimes? Case studies of recent cyber related crimes in the region and national response to them.

09.10 PROTECTING CRITICAL INFRASTRUCTURE ACROSS MALAYSIA – CHALLENGES IN CYBERCRIMES• Overview of MAMPU cyber strategies• Digital developments across Malaysia• Protecting critical infrastructures across Malaysia• How to combat cybercrimes in the digital age?Nur Hidayah binti Abdullah, Director, Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)

09.40 GOVERNMENT COOPERATION AND ENGAGEMENT IN COMBATING CYBERCRIMES ACROSS MALAYSIA• Overview of CyberSecurity Malaysia engagement with the public

and private sectors• Importance of sharing information when combating cybercrimes• Government procedures when responding to a cyber-attack• What is required next?Fazlan bin Abdullah, Head of Department, Government Engagement Department, CyberSecurity Malaysia

10.10 Networking Coffee Break

10.40 CURRENT CYBERCRIMES AND DARK WEB THREATS• Dark web threats targeting Southeast Asia• UNODC support in the fight against cybercrimes in the region• Overview of Clearweb and Darkweb threats and how countries

are adapting to these threats• What is next?Pawinee Parnitudom, Cybercrime Consultant, UNODC

11.10 CYBERCRIMES FACED IN PAKISTAN• Cybercrimes faced recently in Pakistan• Procedures in place to respond to cybercrimes• Cyber laws • What is required for the future?Rana Shahzad, Forensics Expert, Cybercrime Division, Federal Investigation Agency, Pakistan

11.40 MONITORING CYBER THREATS ONLINE• Overview of LaoCERT• Current threats faced and recent cybercrimes• Procedure in responding to cybercrimes• Lessons learnt from previous attacksVongvilai Inthasanh, Network Security Specialist, Lao Computer Emergency Response Team (LaoCERT)

12.10 Networking Lunch Break

13.10 RESPONSE FORENSICS TO CYBERCRIMES• Overview of the digital forensics carried out after a cybercrime• Response procedures to a cybercrime• Cooperation with other national agenciesInvited: Superintendent Muhammad Zulkifly Mohd Isa, Head of Digital Crime Forensics Unit, CID, Royal Malaysian Police

13.40 PROTECTING CRITICAL INFRASTRUCTURES ACROSS INDONESIA• Threats faced to internet infrastructures• Case studies of recent attacks• Developments being made in cyber defence across Indonesia• Lessons learntRudi Lumanto, Chairman, Indonesia Security Incident Response Team on Internet Infrastructure (ID-SIRTII)

14.10 Networking Coffee Break

INTERNATIONAL COOPERATION IN CYBERCRIMESHow regional agencies work with local authorities to assist in fighting against cybercrimes. Regional programs in place to assist local governments with cyber laws and policies.

14.40 INTERPOL INITIATIVES IN FIGHTING CYBERCRIMES• Overview of Interpol’s work in the region• Cooperation with national agencies in fighting against

cybercrimes• Interpol programs for cybercrimes• What are the next steps?Invited: Senior Representative, Interpol

15.10 CYBER LAWS AGAINST CYBER CRIMINALS• Overview of ASEANAPOL programs in the region• Current laws and prosecution for cyber criminals• Case studies of recent regional cybercrimes• Collaboration with local police forcesInvited: Senior Representative, ASEANAPOL

15.40 CHAIRMAN’S CLOSING REMARKSBudi Rahardjo, President, Indonesia Computer Emergency Response Team (ID-CERT)

Page 4: CYBER INTELLIGENCE ASIA · For more information visit – Book your place by: Web: I Email: events@intelligence-sec.com I Tel: +44(0)1582 346706 EVENT PROGRAMME –DAY TWO 08.30 Registration

For more information visit – www.intelligence-sec.com

Book your place by: Web: www.intelligence-sec.com I Email: [email protected] I Tel: +44(0)1582 346706

EVENT PARTNERS

CyberSecurity Malaysia is the national cybersecurity specialist and technical agency under the purview of the Ministry of Communications and Multimedia Malaysia. In essence, CyberSecurity Malaysia is committed to providing a broad range of cybersecurity innovation-led services, programmes and initiatives to help reduce the vulnerability of digital systems, and at the same time strengthen Malaysia’s self-reliance in cyberspace. Among specialised cyber security services provided are Cyber Security Responsive Services; Cyber Security Proactive Services; Outreach and Capacity Building; Strategic Study and Engagement, and Industry and Research Development.

For more information, visit http://www.cybersecurity.my. For general inquiry, email to [email protected]. Stay connected with us on www.facebook.com/CyberSecurityMalaysia and www.twitter.com/cybersecuritymy

Page 5: CYBER INTELLIGENCE ASIA · For more information visit – Book your place by: Web: I Email: events@intelligence-sec.com I Tel: +44(0)1582 346706 EVENT PROGRAMME –DAY TWO 08.30 Registration

DELEGATE DETAILS:Please complete your details below.

Title/Rank:

First Name:

Surname:

Job Title:

Company:

Tel:

Fax:

Email:

Address:

Signature:

Date:

VENUE & ACCOMMODATION

Hotel Name: Renaissance Hotel, Kuala Lumpur,

Malaysia

Please tick here if you would us to contact you to

book your accommodation ☐

TERMS AND CONDITIONS

Payments - All bookings made prior to the conference must be paid in full to guarantee registration. Oncepayment has been received, an email confirmation and a receipted invoice will be sent. If payment is not madeat the time of booking, registration will be provisional. Bookings received less than two weeks before theconference date can only be paid by credit card.Early Bird Rate - In order to qualify for any 'early bird' rates, booking must be received before the deadlinedate listed in the conference marketing material.Substitutions & Cancellations - Delegates may nominate an alternative person from their organisation to attendup to 24 hours prior to the start of the event, at no extra charge. Should substitution not be possible,cancellation charges apply as follows: 8 weeks or more prior to start of event: 10% of the delegate fee , 4 to8 weeks prior to start of event: 50% of the delegate fee , 4 weeks or less prior to start of event: 100% of thedelegate fee. All substitutions and cancellations must be received in writingAccess Requirements - Delegates should advise of any special access requirements at the time of registration.Registration Information - Registration information will be sent to registered delegates by email at least sevendays prior to the event. Any delegate not receiving the registration information should contact us by email [email protected] to Programme - Cancellation/Postponement of Event - Intelligence-Sec reserves the right to makealterations to the conference programme, venue and timings.In the unlikely event of the programme being cancelled by Intelligence-Sec, a full refund will be made. Liabilitywill be limited to the amount of the fee paid by the delegate. In the event of it being found necessary, forwhatever reason, that the conference is being postponed or the dates being changed, the organisers shall notbe liable for any expenditure, damage or loss incurred by the delegate. If by re-arrangement or postponementthe event can take place, the booking between the delegate and the organisers shall remain in force and willbe subject to the cancellation schedule in paragraph 3Speakers - Views expressed by speakers are their own. Intelligence-Sec cannot accept liability for advice given,or views expressed, by any speaker at the conference or in any material provided to delegates.Photography & Filming - For promotional purposes, there may be a professional photographer and videoproduction taking place during the conference. Delegates who do not wish to be filmed or recorded shouldadvise the organisers by email to [email protected] prior to the event.Data Protection - By submitting registration details, delegates agree to allow Intelligence-Sec and companiesassociated with the conference to contact them regarding their services. Delegates who do not wish to receivesuch communications please email [email protected]. The contact details of registered delegateswill be placed on the attendee list which will be passed to sponsoring companies and to all attendees for themto see who is at the conference for the purpose of networking and meetings. Delegates who do not wish to beincluded on this list should advise at the time of booking.Websites & Links - The conference and associated Intelligence-Sec websites may link to other websites andnetworking tools provided for the convenience of the users. The contents of these websites are maintained bytheir owners, for which Intelligence-Sec takes no responsibility. Neither can responsibility be taken for contentsof any website linking to this website.Insurance - It is the responsibility of the delegate to arrange appropriate insurance cover in connection withtheir attendance at the conference. Intelligence-Sec cannot be held liable for any loss, liability or damage topersonal property. If you have any questions about these Terms & Conditions, please contact –[email protected]

PAYMENT DETAILS:

Please complete your details below.

☐ Wire Transfer:Barclays, 16 High Street North, Dunstable, Bedfordshire, LU6 1JZ, United KingdomSort Code: 20 55 33 Account Number: 53554104

☐ PayPal

We will send you a PayPal Request for you to make payment with your credit card.

You do not need a PayPal Account to make payment this way.

ADDITIONAL NOTES

DELEGATE BOOKING FORM

Cyber Intelligence Asia 202011th – 12th MARCH 2020, KUALA LUMPUR, MALAYSIA

Please Tick

Military/Govt. Public Sector Rate

Early Bird Price (book before 31st

Dec 2019)

Standard Price

Two Day Conference & Exhibition 600 USD 800 USD

For more information visit – www.intelligence-sec.com

DATA PROTECTION

Please tick the box below if you are happy for us to share your email address with the event sponsors and exhibitors post event.I am happy for you to share my email address with the sponsors/exhibitors ☐

Please Tick

Private Sector Rate Early Bird Price (book before 31st

Dec 2019)

Standard Price

Two Day Conference & Exhibition 1,200 USD 1,600 USD