Cyber Security Hub (CS Hub)

All Cybersecurity conferences & events posted by Cyber Security Hub (CS Hub) will be streamed on this page

Page maintained by: Karina Kokina. Click here to edit this page.


Cyber Security Hub (CS Hub) Events in 2022 - 2023

New events will be automatically sent to this page.
Human verified with NO SPAM | Strictly Cybersecurity Conference, Events & Webinars


CISO Exchange
United States | Illinois, Chicago
April 27, 2022
Recommended Event

Cyber Security Digital Summit: APAC 2022
Singapore | Singapore (City)
July 19, 2022
Recommended Event

Cyber Security Digital Summit: Cloud Security APAC 2022
United States | New Jersey, Morristown
April 19, 2022
Recommended Event

Cyber Security Digital Summit: Cyber Automation 2022
United States | New Jersey, Morristown
April 26, 2022
Recommended Event

Cyber Security Digital Summit: Global 2022
United States | New Jersey, Morristown
May 3, 2022
Recommended Event

Cyber Security Digital Summit: Enhancing Enterprise Security Through Identify and Access Management, Zero Trust and the Secure Access Service Edge
United States | New Jersey, Morristown
February 8, 2022
Recommended Event

Cyber Security Digital Summit: Minimizing Third Party Risk Through Effective Identification, Categorization, Assessment and Monitoring
United States | New Jersey, Morristown
June 14, 2022
Recommended Event

Cyber Security Digital Summit: Minimizing Third Party Risk Through Effective Identification, Categorization, Assessment and Monitoring
United States | New Jersey, Morristown
March 8, 2022
Recommended Event

Cyber Security Digital Summit: Improving the Speed of Detection and Response Through Threat Intelligence, Enhanced Network Visibility and Automation
United States | New Jersey, Morristown
June 20, 2022
Recommended Event

Cyber Security Digital Summit: Enhancing Resilience Through Effective Planning, Detection, and Response
United States | New Jersey, Morristown
January 25, 2022
Recommended Event

Cyber Security Digital Summit: Improving the Speed of Detection and Response Through Threat Intelligence, Enhanced Network Visibility and Automation
United States | New Jersey, Morristown
February 22, 2022
Recommended Event

Cyber Security Digital Summit: Government & Critical Infrastructure APAC 2022
Singapore | Singapore
September 7, 2022
Recommended Event

Cyber Security Digital Summit: EMEA
United Kingdom | London
October 18, 2022
Recommended Event

Cyber Security Digital Summit: North America
United States | New York, New York
November 15, 2022
Recommended Event

What is IRSF? Stealth attacks lead to huge losses in APAC
Singapore | Singapore (City)
December 13, 2022

Threat Intelligence APAC 2023
Singapore | Singapore (City)
March 8, 2023

How to use AI to Prevent a Chat GPT Attack
Singapore | Singapore City
February 22, 2023
Recommended Event

The Road to Post-Quantum Cryptography 2023
Singapore | Singapore (City)
March 15, 2023
Recommended Event

Cloud Security APAC 2023
Singapore | Singapore (City)
April 18, 2023
Recommended Event

Cyber Security Strategies for Manufacturing Sectors Europe 2023
Germany | Munich
June 27, 2023

All Access: Cyber Security APAC 2023
United States | New York, New York City
April 18, 2023

All Access: Cyber Security Global 2023
United States | New York, New York City
May 2, 2023

Cyber Security Digital Summit: Global 2023
United States | New Jersey, Morristown
May 2, 2023

All Access: Government & Critical Infrastructure APAC 2023
Singapore | Singapore City
September 5, 2023
Recommended Event

Webinar: Fraud mitigation strategies for a seamless customer experience
Singapore | Singapore City
November 22, 2023

More Information On Their Events

The Cyber Security Hub, also known as “CS Hub”, is an online news source for global cyber security experts and business executives that use technology and services to defend their organization’s complete perimeter.

The folks at Cyber Security Hub organize some of the best cybersecurity conferences in Singapore.

In the cyber security area, they are committed to offering the most up-to-date industry news, thought leadership, and analysis. The expert commentary, tools, and resources provided by Cyber Security Hub are generated via the collection of data and the interviewing of end-users and analysts from throughout the sector in order to provide practical and strategic guidance.

As part of its editorial strategy, CS Hub’s editorial team surveys and monitors the latest trends in cyber security in order to produce news articles, market reports, case studies, and in-depth analyses for a captive audience of C-level executives, vice presidents, and directors of information technology and cyber security.

Government & Critical Infrastructure APAC 2022

In the Asia Pacific, constructing cyber security and safeguarding industrial control systems

As technology advancements improve and optimize critical infrastructure operations in the Asia Pacific, they also increase cyber exposure and dangers to both OT and IT. Cyber espionage and sophisticated assaults are increasingly focusing on critical infrastructure operators in the Asia Pacific, with the ability to severely disrupt vital services like energy and water delivery.

On September 7-8, Cyber Security Hub will hold its online conference titled “Government & Critical Infrastructure APAC 2022,” with the goal of highlighting how to improve resilience through efficient planning, detection, and response. The disruption or loss of service to key services has the potential to have serious effects on lives and the economy as well as destroy trust in a government or corporation given the growing APAC cyber threat landscape. Therefore, it is of the utmost importance to broadly distribute and use effective defenses.

AGENDA DAY 1
WEDNESDAY, 7 SEPTEMBER (all timings are in Singapore Time)

9:00 am – 9:45 am | CISO PANEL DISCUSSION: How Do You Ensure Good Compliance Against Government Reforms?

  • Maryam Bechtel – Chief Information Security Officer, AGL Australia
  • Simon Lee-Steere – Deputy Chief Security Officer, NBN Australia
  • Daryl Pereira – Director, Office of the CISO, Google Cloud APAC

10:00 am – 10:45 am | Session Reserved for Cybereason
11:00 am – 11:45 am | Session Reserved for BeyondTrust

12:00 pm – 12:45 pm | FIRESIDE CHAT: The Significance of Securing Medical Devices for Enhanced Patient Safety

Simon Cowley – Principal Cybersecurity Officer, Victorian Department of Health

AGENDA DAY 2
WEDNESDAY, 8 SEPTEMBER (all timings are in Singapore Time)

9:00 am – 9:45 am | PANEL DISCUSSION: Accountability and Responsibility – Minimum Baseline to be Addressed for O&G and Transport

Salem Al-Elwi – Head of ICS Cybersecurity, Saudi Aramco

10:00 am – 10:45 am | Focussing on Transparency Whilst Mitigating Security Risks?
11:00 am – 11:45 am | Optimizing Network Critical Assets

12:00 pm – 12:45 pm | FIRESIDE CHAT: Assessing IT and OT Major Challenges and the Wider Impact on the Business and Citizens

  • Jeff Campbell – Manager, Technology (CIO), Horizon Power

What is IRSF? Stealth attacks lead to huge losses in APAC

Today, business is conducted almost exclusively online. Fraudsters have learned to game the system with sophisticated tactics aimed to steal money from unwary businesses as a result of the tectonic shift to e-commerce and the demand for quick, trustworthy digital identity verification. Call centers and online businesses that employ SMS one-time passwords (OTP) as part of their sign-up procedures are among the organizations that are targeted by international revenue share fraud (IRSF), also known as OTP abuse/SMS flooding attacks.

When there is an increase in the number of text attempts to phone numbers around the world, it is a sign of IRSF. The speed at which text attempts are coming in is another vertical to take into account. It is a sign of fraud if you witness one text try every second, with the velocity of the text tries changing to fifty attempts in a second.

Many organizations lack effective strategies to prevent or even detect IRSF as it rises across APAC. In fact, IRSF allows criminals to steal money from businesses by exploiting their security measures, making multi-factor authentication a highly profitable way to steal money that is frequently unnoticed until it is too late.

In this webinar, the team will talk about:

  • What IRSF/OTP abuse is and why is it an underreported crime in APAC
  • Who are the people who are most vulnerable to these nefarious practices?
  • When to look for such attacks and some clear signals that one is taking place
  • How to battle these attacks in APAC to protect your company

Threat Intelligence APAC 2023

The goal is remediation-based, orchestrated, automated, and personalized threat intelligence.

Most businesses have a few stages to take before they accomplish their goal. Executives in cyber security have understood that raw data is not intelligence. The discipline is termed Threat Intelligence, not Threat Raw Data. Global corporate enterprise cyber security executives must evolve beyond the current collective ‘feed-based’ mindset.

SIEM solutions have been improving, but they still lack reaction capability at their core. SOAR solutions provide the missing response in base SIEM solutions, although industry experts remark that not all solutions deliver on the promise made by most SOAR vendors.

While automation can be accomplished with the press of a button, the quality of the data that goes in determines the quality of the data that comes out. But that is only the data. The talent required to work with the data coming in and out, as well as the ongoing tweaking of the automation tool itself, must be in-house. While one of automation’s promises is cost reduction, increasing automation-focused people is required to acquire meaningful threat intelligence for the company.

Moving beyond the feed-based mindset necessitates understanding the context of the evidence-based data being presented. It is critical to share knowledge throughout the community. The evaluation of the insights derived from that data can become proven organizational knowledge. That knowledge must be orchestrated in order for action-based responses and, ultimately, remediation to occur.

How to use AI to Prevent a Chat GPT Attack

It’s no surprise that folks with evil intent are experimenting with how to properly use ChatGPT for nefarious purposes. With that in mind, the Cyber Security Hub will host a fireside conversation with world-class expert Jonathan Jackson, Director of Sales Engineering APJ, BlackBerry Cybersecurity.

This in-depth discussion will provide a unique industry perspective, contextualizing and delving deeper into how to change your defenses to increase your resilience to future attacks. The discussion will include the following points:

  • Explain how BlackBerry’s Threat Research and Intelligence team used data and telemetry gathered from their own artificial intelligence (AI)-driven products and analytical capabilities to report malware activity statistics every 90 days.
  • Provide actionable intelligence about targeted assaults, cybercrime-motivated threat actors, and campaigns aimed at enterprises like yours, allowing you to make well-informed decisions and take timely and effective action.
  • Explain how to take a proactive strategy to anticipate, mitigate, and prevent cyberattack surprises.
  • Explain how artificial intelligence will help you learn to fight fire with fire.

The Road to Post-Quantum Cryptography 2023

Cryptographic agility refers to an organization’s capacity to quickly test, deploy, and govern new cryptography in accordance with best practices, developing standards, and regulations. The widely used classical cryptographic algorithm suites, such as RSA, have served us well and have remained fairly stable over the last twenty years.

As computer power expanded, security was simply reinforced by expanding key length and lifetime to ensure security. In addition to getting a “match fit” for Cryptographic Agility, a precise Cryptographic Asset inventory is critical in your initial preparations.

Join this session and learn:

  • Evidence-based guidance from a cryptography, governance, and compliance expert on how to approach your PQC readiness.
  • What steps should you take right now to prepare for the major adjustments required to transition to quantum?
  • A ‘game changer’ is expected in the next 6 to 8 years that challenge the integrity and confidentiality of data and transactions.

Speakers:

  • Ian Christofis, Principal Managing Consultant, Entrust
  • Paul Creswick, Security Evangelist, AusPayNet
  • Jagathesh Rajavasagam, Regional Risk & Cyber Security Officer, Abbott

Cloud Security APAC 2023

Moving to a cloud environment is not a simple process; in order to move to a cloud environment in a way that is both successful and secure, many businesses require the abilities of cloud migration specialists. It is important to keep in mind that achieving security in the cloud is not always as easy as it may seem, despite the fact that businesses all over the world have been transferring their operations to the cloud for some time now.

Their objective is to bring together Cyber Security Leaders from throughout the APAC region in order to develop confidence that the cloud infrastructure facilitates response rather than inhibits it.

In light of this, the All Access Cloud Security APAC 2023 online event will be driven by conversations including the following topics:

  • Pushing to ensure transparency of the architecture, foundational components, and even discovered vulnerabilities
  • Defending against social engineering attacks leveled at employers and organizations across the cloud
  • Enhancing visibility and transparency beyond SOC and ISO certifications

Speakers:

  • Anthony Lim, Cyber Security, and Governance Pioneer, Cyber Security Alliance
  • Dr Carrine Teoh Chooi Shi, Chief Strategy Officer, CyberEdBoard Community
  • Roxanne Pashaei, Managed Services & Security Lead – Network, Application & Cloud, Telstra
  • Yaron Slutzky, Chief Information Security Officer, Agoda

All Access: Government & Critical Infrastructure APAC 2023

Cyber security spending in Asia Pacific (excluding Japan) is predicted to rise 16.7 percent to $36 billion by 2023. The importance of cyber security for the Asia Pacific region’s government and critical infrastructure cannot be emphasized.

Cybercrime is on the rise in Australia, and as Minister for Home Affairs and Cybersecurity Clare O’Neil stated in February, simply being prepared to respond to a cyber disaster is not enough. Continuous risk management and operational resilience are now a legislative need, as well as a commercial imperative.

Governments are becoming increasingly reliant on digital technology to deliver services and protect people’s data, and cyberattacks have the potential to cause significant disruption, financial losses, and reputational damage.

Cybersecurity threats have evolved to be more complex and persistent, with the ability to target key infrastructure such as power grids, telecommunications networks, and transportation systems. Join the team at All Access: Government & Critical Infrastructure APAC 2023, where they will be focusing on:

  • Threat Intelligence
  • Strategies to Protect Critical Infrastructure from Cyber Attacks
  • Assessing Best Practices for Mitigating Cyber Threats
  • Building Cyber Security Resilience
  • Enhancing Training and Awareness Initiatives to Improve Cyber Security

Follow us on Twitter for alerts, or join our LinkedIn with over 6K members!

Recommended Event

Ai4 (Fora Group)

CXO Level

Recommended Event

Conf42

Hacker, Programming