Live streaming has ended
CYBERSEC is launching an exciting new initiative called CYBERSEC GLOBAL, aimed at creating a global hub for cybersecurity exchange. We've gathered a lineup of speakers from across the globe, including the U.S., the U.K., Sweden, Singapore, Malaysia, Vietnam, and Taiwan, to share the latest research and insight. These sessions will be streamed live online in English.
The CYBERSEC GLOBAL agenda covers a wide array of topics in cybersecurity and technology, ranging from security governance and ZTA practice to hardware security, OT security, PQC encryption, critical infrastructure protection, and regional security.
Don't miss out on the opportunity to stay up-to-date with the latest global cybersecurity trends by tuning in to the sessions.
Premiere: 5/14 12:00 - 12:30
Replays: 5/14 18:00 - 18:30, 5/15 00:00 - 00:30
Localized threat intelligence is the kryptonite to threat actors, yet the majority of organizations overlook it completely. When you know who your enemy is, why not focus all your energy and resources into understanding them and staying one step ahead? Well, it’s next to impossible for most western governments to gather actionable intelligence on APAC adversaries, so companies have no chance at all.
With little to zero understanding of how the typical APAC adversary group operates, a lack of humanresources who understand the local language (and its dialects), most organizations simply give up.
However, there are companies on the front lines of the information war (that has already started) that are developing solutions and exporting them globally. In this session, we will discuss what localized intelligence is, how APAC threat intelligence teams gather and process it, and how international organizations can use it to stay one step ahead of threat actors.
Premiere: 5/14 12:40 - 13:10
Replays: 5/14 18:40 - 19:10, 5/15 00:40 - 01:10
There is observed rapid rise in awareness of cyber security in the maritime sector especially in the last couple of years. This is now strengthened by IACS' mandated cyber security compliances for new builds of ships and vessels by mid 2024.
This presentation addresses concisely the past, present and future possibilities of maritime cybersecurity. It aims to provide practical and actionable insights and advice as take home for the audience
Premiere: 5/14 13:20 - 13:50
Replays: 5/14 19:20 - 19:50, 5/15 01:20 - 01:50
In the rapidly evolving landscape of cybersecurity, the protection of sensitive information lies at the heart of robust product security. As businesses go digital, the surge in data and complex software makes it essential to find innovative ways to protect critical assets. This presentation will focus on the key role of secrets management in strengthening digital security and improving the overall safety of modern products.
We will explore the fundamental importance of secrets management in securing credentials, API keys, encryption keys, and other sensitive information vital to the integrity of digital ecosystems. I'll discuss the evolving threats we face and share real-life examples to highlight the need for effective secrets management. I'll also cover the latest techniques, tools, and best practices designed for today's ever-changing security challenges.
Premiere: 5/14 14:00 - 14:30
Replays: 5/14 20:00 - 20:30, 5/15 02:00 - 02:30
By 2030, 100 billion devices will be connected to the internet, significantly expanding the attack surface. Beyond asset owners who utilize these connected products, the companies selling such devices must also seriously consider reducing potential cybersecurity threats and risks during the product development life cycle through essential product security practices. It is crucial for them to understand and recognize the value of “product security” and differentiate it from IT security or OT security.
Additionally, global and regional regulations and standards have been driving action since the 2010s, compelling product manufacturers and providers to take necessary steps. However, many of these companies lack internal cybersecurity capabilities and sufficient resources to fully implement the required practices to meet product security requirements.
In this talk, I will introduce comprehensive recommendations at different levels, including compliance and testing services, security software development tools, and security software components. These measures aim to ensure effective guarding against cybersecurity threats and risks.
Premiere: 5/14 14:40 - 15:10
Replays: 5/14 20:40 - 21:10, 5/15 02:40 - 03:10
In today's interconnected world, the protection of critical infrastructure is paramount. The recent events unfolding in the Russia-Ukraine conflict have underscored the critical importance of enhancing cybersecurity measures, particularly in OT systems.
As we witness the evolving nature of warfare, it's crucial to draw lessons from this conflict and apply them to fortify our defenses. The Russia-Ukraine war has not only showcased traditional military tactics but has also seen a significant reliance on cyber warfare targeting critical infrastructure.
One of the key lessons we can glean from this conflict is the vulnerability of OT systems within critical infrastructure. These systems control vital operations in sectors such as energy, communications, and government. The disruption of these systems can have far-reaching consequences, impacting not just national security but also the economy and public safety.
To enhance OT cybersecurity in critical infrastructure, we must prioritize several key strategies to address this hybrid warfare. Countermeasure suggestions will be provided based on recent attacks targeting critical infrastructure.
Premiere: 5/14 15:20 - 15:50
Replays: 5/14 21:20 - 21:50, 5/15 03:20 - 03:50
Summary:
CYBERSEC 2024 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。