DATO' TS. DR. HAJI AMIRUDIN ABDUL WAHAB

Chief Executive Officer

CyberSecurity Malaysia

Lena Yu

CEO and Founder, Malmons World Ltd

Founder, World Cyber Health - Malware Village

More Keynote Speakers Will Join Us at AVAR 2025!

Watch this space for details

  • CEOs
  • CTOs
  • CSOs/CISOs
  • Regulators
  • Law Enforcement Agencies
  • Researchers

Dynamic cyber security leadership is recognized and reinforced through awards, knowledge sessions, panel discussions, training, and networking opportunities that enable CISOs to enhance skills and build relationships with critical stakeholders.

  • Compliance & AI – Governing the New Technology on the Block
  • Internal Threats – Strategies for Partner-Dependent Organizations
  • Disaster Recovery – What Works, and Doesn’t, in the Real World
  • Leading with Risk – How CISOs Can Drive Business Decisions
  • Data Without Borders? – Sovereignty, Trust, and the Cloud Dilemma

Arivindran Saidoo

Partner, Technology Risk and Cybersecurity Consulting

Ashok Kumar J

Founder & CEO

Dr. Peter Leong

Co Founder

G Saravanan

Chief Transformation Officer

Jairam Ramesh

Director of Cyber Security

Jonathan Tam

Regional Cybersecurity Officer

Malini Kanesamoorthy

CISO /Head of Group Technology Risk

Mohd Hanapi Bisri

Head of Group ICT

Selvakumar Manickam

Professor and Director of Cybersecurity Research Centre

Syahril Aziz

Managing Consultant

Tanvinder Singh

Director - Cyber Security and Privacy

Vaidyanathan Chandramouli

Founder & Partner

Vikneswaran Kunasegaran

Malaysian Representative/SVP, Security Assessment

Yusfarizal Yusoff

Head of Security Architecture

AVAR 2025’s CISO Awards recognize impactful cybersecurity leaders who have transformed the real-word effectiveness of enterprise cyber defenses in their organizations. Nominate exceptional CISOs from Malaysia for the Best CISO Award in 5 categories.

Artificial Intelligence presents both a security and compliance risk that CISOs need to manage. AVAR 2025’s CISO Training session focuses on governance frameworks, risk management practices, and compliance obligations related to AI systems, and includes an interactive simulation where participants understand how an LLM can be hacked.

Chetan Raghuprasad

Cisco

Eddy Willems

WAVCi

Igor Zdobnov

Doctor Web, Ltd.

Ivan Korolev

Doctor Web, Ltd.

Jaromír Hořejší

Check Point

Joey Chen

Cisco

Righard Zwienenberg

ESET

Sathwik Ram Prakki

Quick Heal

Shogo Hayashi

NTT Security Holdings

Subhajeet Singha

Quick Heal
  • Sniffing Around: Unmasking the LongNosedGoblin operation in Southeast Asia and Japan
  • ValleyRAT Unleashed: A Deep Dive into its Modern Arsenal and Tactics
  • Inside the Shadows: APT Tactics Using MSC Files, Grim Resource Injection, and AppDomain Hijacking
  • Meet VenomSEO: New Threat Targeting Malaysian Websites for Black SEO
  • Unmasking AI-Themed Malvertising Targeting Social Media Users
  • Lotus in Perpetual Bloom: Sustained Espionage in Southeast Asia with Evolving Sagerunex Backdoors
  • Countering the Unthinkable: Disrupting Advanced Threats with Unconventional Defenses
  • From Clusters to Actors: A Practical Threat Actor Attribution Framework
  • ConnectUnwise: How Threat Actors Abuse ConnectWise installer as Builder for Signed Malware
  • Yet Another Cyberespionage Operation In Vietnam
  • High Stakes, Hidden Threats: Unmasking the Vault Viper Network with DNS
  • SESE: Social Engineering Second Edition
  • Cracking the Vault: Real-World Crypto Wallet Exploits and Defense Strategies
  • Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware
  • The Open doorX : From Directory Listing to Attribution
  • IDFKA Backdoor: The Hidden Threat of Rust Implants in Modern APT Campaigns

These are just some of the papers that will be presented at AVAR 2025. View the agenda for more information.

rgdwivedy@aavar.org
+91 93840 19113 (India)