Agenda
| Wednesday, 30th November, 2022 |
| 16:00 – 18:00 | Registration opens |
| 18:30 – 21:00 | Welcome Drinks Reception |
| Conference Day 1: Thursday, 1st December, 2022 |
| 9:00 – 9:30 | Registration opens | ||
| 9:30 – 10:40 | Opening of Conference, Keynote speech(es) | ||
| 10:40 – 11:00 | Break |
| Track 1 | Track 2 | |||
| 11:00 – 11:30 | Twisted Panda: attacks against the Russian defense sector Alexandra Gofman, David Driker, Check Point |
11:00 – 11:30 | DSE, KDP And Everything In Between: Novel Techniques To Run Unsigned Rootkits Omri Misgav, Fortinet |
|
| 11:30 – 12:00 | SparklingElf, recent supplies to SparklingGoblin’s Linux malware arsenal, new ties to APT41 Vladislav Hrčka, ESET |
11:30 – 12:00 | Operation Dragon Castling: Suspected APT Group Hijacks WPS Office Updater to Target East Asian Betting companies Luigino Camastra, Igor Morgenstern, Avast |
|
| 12:00 – 12:30 | SMS PVA: how infected smartphones are used to register fake accounts Ryan Flores, Trend Micro |
12:00 – 12:30 | Taohuawu, A much more sophisticated evolution from WHQL signed NetFilter rootkit Robert Xiang Wang, Imran Khan, NortonLifeLock |
|
| 12:30 – 13:45 | Lunch | |||
| 13:45 – 14:15 |
Kihong Kim, SANDS Lab, Inc. |
13:45 – 14:25 | Panel discussion – Cybersecurity Trends for 2023 and Beyond Yul Bahat, Kiteworks Ajay Kumar, CrowdStrike Anil Malekani, Microsoft Rudy Lim, Accenture Security |
|
| 14:15 – 14:45 | Earth Berberoka: An Analysis of a Multivector and Multiplatform APT Campaign Targeting Online Gambling Sites Jaromir Horejsi, Trend Micro |
14:25 – 14:45 | Full Attack Chain Testing – How to test any security product usefully Simon Edwards, SE Labs |
|
| 14:45 – 15:15 | XLLing in Excel – the world of malicious add-ins Vanja Svajcer, Cisco Talos |
14:45 – 15:15 | Spoofing Microsoft M365 service to bypass most of the email security protections Reegun Richard Jayapaul, Trustwave |
|
| 15:15 – 15:35 | Break | |||
| 15:35 – 16:05 | Panel Discussion: The Curse of the False Positive Stefan Haselwanter, AV-Comparatives Robert Neumann, Acronis Evgeny Vovk, Kaspersky Vanja Svajcer, Cisco Righard Zwienenberg, ESET Eddy Willems, G Data Samir Mody, K7 Computing |
15:35 – 16:05 | Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin Filip Jurčacko, ESET |
|
| 16:05 – 16:35 | Sha Zhu Pan : The Cryptocurrency cocktail that started in Asia but is conquering the world Jagadeesh Chandraiah, Xinran Wu, Sophos |
16:05 – 16:35 | Guard My Windows Anurag Shandilya, K7 Computing |
|
| 16:35 – 17:05 | CFGDump: A tool for generic unpacking of polymorphic packed binaries Craciun Vlad Constantin, Andrei Catalin Mogage, Bitdefender |
16:35 – 17:05 | Surviving the Era of Active Directory Attacks through in-Network defense Chintan Shah, Trellix |
|
| 17:05 – 17:35 | Indian Power Sector targeted with latest LockBit 3.0 variant Sathwik Ram Prakki, Quick Heal |
17:05 – 17:35 | eCrime – A Coming of Age Tale Aaron Aubrey Ng, Crowdstrike |
|
| 18:45 | Bus pick up from Carlton Hotel to Gala Dinner venue | |||
| 19:15 – 20:00 | Pre-dinner Drinks | |||
| 20:00 – 22:00 | Gala Dinner | |||
| Conference Day 2: Friday, 02nd December, 2022 |
| 10:00 – 10:30 | Keynote address: ♬ You ain’t seen nothing yet ♫ Righard Zwienenberg, ESET Eddy Willems, G Data CyberDefense |
||
| 10:30 -11:00 | The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day Itay Cohen, Israel Gubi, Check Point |
||
| 11:00 -11:20 | Break |
| Poster Presentations |
| The dark side of Potential Unwanted Applications Latokhin Dmitrii Vladimirovich, Kaspersky |
| Ransomware Archetypes: The Rise of Linux-based Ransomware Earle Maui Earnshaw, Arianne Dela Cruz, Trend Micro Inc. |
| Evaluation of GuLoader Malware – It’s Techniques and Tactics Sarang Popat Sonawane, Crowdstrike |
| Reserve Paper |
| If The Hype Doesn’t Kill You, Flawed or Missing Analysis Will Randy Abrams, SecureIQLab |
| Saturday, 03rd December, 2022 |
| 9:00 – 19:00 | Singapore tour |
| Click here for more details. | |

