The Cyber Security Hub, also known as “CS Hub”, is an online news source for global cyber security experts and business executives that use technology and services to defend their organization’s complete perimeter.
The folks at Cyber Security Hub organize some of the best cybersecurity conferences in Singapore.
In the cyber security area, they are committed to offering the most up-to-date industry news, thought leadership, and analysis. The expert commentary, tools, and resources provided by Cyber Security Hub are generated via the collection of data and the interviewing of end-users and analysts from throughout the sector in order to provide practical and strategic guidance.
As part of its editorial strategy, CS Hub’s editorial team surveys and monitors the latest trends in cyber security in order to produce news articles, market reports, case studies, and in-depth analyses for a captive audience of C-level executives, vice presidents, and directors of information technology and cyber security.
Government & Critical Infrastructure APAC 2022
In the Asia Pacific, constructing cyber security and safeguarding industrial control systems
As technology advancements improve and optimize critical infrastructure operations in the Asia Pacific, they also increase cyber exposure and dangers to both OT and IT. Cyber espionage and sophisticated assaults are increasingly focusing on critical infrastructure operators in the Asia Pacific, with the ability to severely disrupt vital services like energy and water delivery.
On September 7-8, Cyber Security Hub will hold its online conference titled “Government & Critical Infrastructure APAC 2022,” with the goal of highlighting how to improve resilience through efficient planning, detection, and response. The disruption or loss of service to key services has the potential to have serious effects on lives and the economy as well as destroy trust in a government or corporation given the growing APAC cyber threat landscape. Therefore, it is of the utmost importance to broadly distribute and use effective defenses.
AGENDA DAY 1
WEDNESDAY, 7 SEPTEMBER (all timings are in Singapore Time)
9:00 am – 9:45 am | CISO PANEL DISCUSSION: How Do You Ensure Good Compliance Against Government Reforms?
- Maryam Bechtel – Chief Information Security Officer, AGL Australia
- Simon Lee-Steere – Deputy Chief Security Officer, NBN Australia
- Daryl Pereira – Director, Office of the CISO, Google Cloud APAC
10:00 am – 10:45 am | Session Reserved for Cybereason
11:00 am – 11:45 am | Session Reserved for BeyondTrust
12:00 pm – 12:45 pm | FIRESIDE CHAT: The Significance of Securing Medical Devices for Enhanced Patient Safety
Simon Cowley – Principal Cybersecurity Officer, Victorian Department of Health
AGENDA DAY 2
WEDNESDAY, 8 SEPTEMBER (all timings are in Singapore Time)
9:00 am – 9:45 am | PANEL DISCUSSION: Accountability and Responsibility – Minimum Baseline to be Addressed for O&G and Transport
Salem Al-Elwi – Head of ICS Cybersecurity, Saudi Aramco
10:00 am – 10:45 am | Focussing on Transparency Whilst Mitigating Security Risks?
11:00 am – 11:45 am | Optimizing Network Critical Assets
12:00 pm – 12:45 pm | FIRESIDE CHAT: Assessing IT and OT Major Challenges and the Wider Impact on the Business and Citizens
- Jeff Campbell – Manager, Technology (CIO), Horizon Power
What is IRSF? Stealth attacks lead to huge losses in APAC
Today, business is conducted almost exclusively online. Fraudsters have learned to game the system with sophisticated tactics aimed to steal money from unwary businesses as a result of the tectonic shift to e-commerce and the demand for quick, trustworthy digital identity verification. Call centers and online businesses that employ SMS one-time passwords (OTP) as part of their sign-up procedures are among the organizations that are targeted by international revenue share fraud (IRSF), also known as OTP abuse/SMS flooding attacks.
When there is an increase in the number of text attempts to phone numbers around the world, it is a sign of IRSF. The speed at which text attempts are coming in is another vertical to take into account. It is a sign of fraud if you witness one text try every second, with the velocity of the text tries changing to fifty attempts in a second.
Many organizations lack effective strategies to prevent or even detect IRSF as it rises across APAC. In fact, IRSF allows criminals to steal money from businesses by exploiting their security measures, making multi-factor authentication a highly profitable way to steal money that is frequently unnoticed until it is too late.
In this webinar, the team will talk about:
- What IRSF/OTP abuse is and why is it an underreported crime in APAC
- Who are the people who are most vulnerable to these nefarious practices?
- When to look for such attacks and some clear signals that one is taking place
- How to battle these attacks in APAC to protect your company
Threat Intelligence APAC 2023
The goal is remediation-based, orchestrated, automated, and personalized threat intelligence.
Most businesses have a few stages to take before they accomplish their goal. Executives in cyber security have understood that raw data is not intelligence. The discipline is termed Threat Intelligence, not Threat Raw Data. Global corporate enterprise cyber security executives must evolve beyond the current collective ‘feed-based’ mindset.
SIEM solutions have been improving, but they still lack reaction capability at their core. SOAR solutions provide the missing response in base SIEM solutions, although industry experts remark that not all solutions deliver on the promise made by most SOAR vendors.
While automation can be accomplished with the press of a button, the quality of the data that goes in determines the quality of the data that comes out. But that is only the data. The talent required to work with the data coming in and out, as well as the ongoing tweaking of the automation tool itself, must be in-house. While one of automation’s promises is cost reduction, increasing automation-focused people is required to acquire meaningful threat intelligence for the company.
Moving beyond the feed-based mindset necessitates understanding the context of the evidence-based data being presented. It is critical to share knowledge throughout the community. The evaluation of the insights derived from that data can become proven organizational knowledge. That knowledge must be orchestrated in order for action-based responses and, ultimately, remediation to occur.
How to use AI to Prevent a Chat GPT Attack
It’s no surprise that folks with evil intent are experimenting with how to properly use ChatGPT for nefarious purposes. With that in mind, the Cyber Security Hub will host a fireside conversation with world-class expert Jonathan Jackson, Director of Sales Engineering APJ, BlackBerry Cybersecurity.
This in-depth discussion will provide a unique industry perspective, contextualizing and delving deeper into how to change your defenses to increase your resilience to future attacks. The discussion will include the following points:
- Explain how BlackBerry’s Threat Research and Intelligence team used data and telemetry gathered from their own artificial intelligence (AI)-driven products and analytical capabilities to report malware activity statistics every 90 days.
- Provide actionable intelligence about targeted assaults, cybercrime-motivated threat actors, and campaigns aimed at enterprises like yours, allowing you to make well-informed decisions and take timely and effective action.
- Explain how to take a proactive strategy to anticipate, mitigate, and prevent cyberattack surprises.
- Explain how artificial intelligence will help you learn to fight fire with fire.
The Road to Post-Quantum Cryptography 2023
Cryptographic agility refers to an organization’s capacity to quickly test, deploy, and govern new cryptography in accordance with best practices, developing standards, and regulations. The widely used classical cryptographic algorithm suites, such as RSA, have served us well and have remained fairly stable over the last twenty years.
As computer power expanded, security was simply reinforced by expanding key length and lifetime to ensure security. In addition to getting a “match fit” for Cryptographic Agility, a precise Cryptographic Asset inventory is critical in your initial preparations.
Join this session and learn:
- Evidence-based guidance from a cryptography, governance, and compliance expert on how to approach your PQC readiness.
- What steps should you take right now to prepare for the major adjustments required to transition to quantum?
- A ‘game changer’ is expected in the next 6 to 8 years that challenge the integrity and confidentiality of data and transactions.
- Ian Christofis, Principal Managing Consultant, Entrust
- Paul Creswick, Security Evangelist, AusPayNet
- Jagathesh Rajavasagam, Regional Risk & Cyber Security Officer, Abbott
Cloud Security APAC 2023
Moving to a cloud environment is not a simple process; in order to move to a cloud environment in a way that is both successful and secure, many businesses require the abilities of cloud migration specialists. It is important to keep in mind that achieving security in the cloud is not always as easy as it may seem, despite the fact that businesses all over the world have been transferring their operations to the cloud for some time now.
Their objective is to bring together Cyber Security Leaders from throughout the APAC region in order to develop confidence that the cloud infrastructure facilitates response rather than inhibits it.
In light of this, the All Access Cloud Security APAC 2023 online event will be driven by conversations including the following topics:
- Pushing to ensure transparency of the architecture, foundational components, and even discovered vulnerabilities
- Defending against social engineering attacks leveled at employers and organizations across the cloud
- Enhancing visibility and transparency beyond SOC and ISO certifications
- Anthony Lim, Cyber Security, and Governance Pioneer, Cyber Security Alliance
- Dr Carrine Teoh Chooi Shi, Chief Strategy Officer, CyberEdBoard Community
- Roxanne Pashaei, Managed Services & Security Lead – Network, Application & Cloud, Telstra
- Yaron Slutzky, Chief Information Security Officer, Agoda
All Access: Government & Critical Infrastructure APAC 2023
Cyber security spending in Asia Pacific (excluding Japan) is predicted to rise 16.7 percent to $36 billion by 2023. The importance of cyber security for the Asia Pacific region’s government and critical infrastructure cannot be emphasized.
Cybercrime is on the rise in Australia, and as Minister for Home Affairs and Cybersecurity Clare O’Neil stated in February, simply being prepared to respond to a cyber disaster is not enough. Continuous risk management and operational resilience are now a legislative need, as well as a commercial imperative.
Governments are becoming increasingly reliant on digital technology to deliver services and protect people’s data, and cyberattacks have the potential to cause significant disruption, financial losses, and reputational damage.
Cybersecurity threats have evolved to be more complex and persistent, with the ability to target key infrastructure such as power grids, telecommunications networks, and transportation systems. Join the team at All Access: Government & Critical Infrastructure APAC 2023, where they will be focusing on:
- Threat Intelligence
- Strategies to Protect Critical Infrastructure from Cyber Attacks
- Assessing Best Practices for Mitigating Cyber Threats
- Building Cyber Security Resilience
- Enhancing Training and Awareness Initiatives to Improve Cyber Security