19-20 Jun 2019 #IICSG2019

MAIN CONFERENCE SCHEDULE

#IICSG2019 will be featuring 4 main conference/premium tracks spread over 3 streams over 2 days (19-20 Jun 2019).

  • Where practitioners reveal cutting-edge techniques and more. 
    Your usual standard Track 1.

  • Where leaders provide insights into their area of specialisation with the aim to:

    • Give attendees an in-depth understanding of the latest developments in various cybersecurity domains; and 

    • Provide those interested in entering the cybersecurity field/industry with an edge to do so.

  • Where experts discuss how to practise specialised cybersecurity domains the right way and/or examine common pitfalls seen in existing practices or solutions.

  • Featuring short training courses where attendees can gain new skills or knowledge to develop their expertise, career or research.

19 Jun 2019 DAY 1

BREAKOUT ROOM 1

BREAKOUT ROOM 2

BREAKOUT ROOM 3

10.30am — 11.00am

WELCOME &
OPENING ADDRESS

Adrian M. & Emil Tan

11.00am — 11.45am

Opening Keynote

SPLINTERNET &
THE CASE FOR TRANSPARENCY

Oleg Abdurashitov, Kaspersky Lab

LUNCH BREAK

1.00pm — 1.45pm

EXPLOITING
WINDOWS VISTA
RESOURCE VIRTUALIZATION

James Forshaw, Google

2.00pm — 2.45pm

REAL HARDWARE HACKING FOR S$30 OR LESS

Joe FitzPatrick,
SecuringHardware.com

1.00pm — 1.45pm

BODY LANGUAGE BEHIND SOCIAL ENGINEERING ATTACKS

Sarka Pekarova,
Dreamlab Technologies

1.00pm — 2.45pm

AN INTRODUCTION TO
SAP FORENSICS

Jordan Santarsieri, Vicxer

TEA BREAK

3.00pm — 3.45pm

THE ART OF PERSISTENCE: LURKING BEHIND THE BROWSER

Samuel Pua, MWR InfoSecurity

4.00pm — 4.45pm

CLOUDY CLUSTERS CATASTROPHE?

Rory McCune, NCC Group

3.00pm — 3.45pm

DATA BREACHES: BARBARIANS IN THE THRONE ROOM

Dave Lewis, Cisco

3.00pm — 4.45pm

CATCH ME IF YOU CAN — SEEING THE RED THROUGH THE BLUE
Owen Shearing & Will Hunt, in.security

5.00pm — 5.45pm

PWNING AWS
CLOUD SERVICES

Mohammed Aldoub

5.00pm — 5.45pm

DESIGNING SECURE SYSTEMS: VALUE DRIVEN THREAT MODELING
Avi Douglen, Bounce Security

6.45pm — LATE

COMMUNITY NIGHT

20 Jun 2019 DAY 2

BREAKOUT ROOM 1

BREAKOUT ROOM 2

BREAKOUT ROOM 3

10.15am — 10.30am

WELCOME BACK ADDRESS

Emil Tan

10.30am — 11.15am

YOU ARE NOT HIDING
FROM ME .NET!

Aden Chung, MWR InfoSecurity

11.30am — 12.15pm

A RED TEAM PERSPECTIVE TO RESEARCH

Vincent Yiu, SYON

10.30am — 11.15am

ATTACKING OFFENSIVELY FOR DEFENSE

Keith Rayle, Fortinet

11.30am — 12.15pm

SPEED-UP RECON & PWN
ON BUG BOUNTY?
BUILD YOUR OWN TOOL!

Igor Lyrchikov & Egor Saltykov

LUNCH BREAK

2.30pm — 3.15pm

ANALYZING KONY
MOBILE APPLICATIONS

Terry Chia,
Centurion Information Security

1.30pm — 2.15pm

OFFICE IOT:
THE ELEPHANT
IN THE ROOM

Quentyn Taylor, Canon

1.30pm — 3.15pm

MAKING & BREAKING MACHINE LEARNING SYSTEMS
Clarence Chio

3.30pm — 4.15pm

NATIVE MOBILE BOTNET & ANTI-BOTNET SOLUTIONS

Ron Munitz, The PSCG

3.30pm — 4.15pm

P@SSWORD MAKING & BREAKING

Will Hunt, in.security

3.30pm — 4.15pm

REAL HARDWARE HACKING FOR S$30 OR LESS
(HANDS-ON)

Joe FitzPatrick, SecuringHardware.com

TEA BREAK

4.40pm — 5.00pm

CLOSING ADDRESS,
PRIZE GIVING &
LUCKY DRAW

Adrian M. & Emil Tan

6.00pm — LATE

AFTER PARTY!
@
DALLAS RESTAURANT & BAR (SUNTEC CITY)

Infosec in the City. Copyright © 2017-2019
IIC Productions (Pte. Ltd.). All rights reserved.

  • @infoseccity
  • @infosec_city

Contact Us  |  Join Our Mailing List   |  Follow Us :