Keynote Speaker
DATO' TS. DR. HAJI AMIRUDIN ABDUL WAHAB
Chief Executive Officer
CyberSecurity Malaysia
Lena Yu
CEO and Founder, Malmons World Ltd
Founder, World Cyber Health - Malware Village
More Keynote Speakers Will Join Us at AVAR 2025!
Watch this space for details
Asia’s Most Impactful Cyber Security Conference
3 Days of Power Packed Knowledge Sharing and Networking

Training

Conference

Awards

350+ Delegates

50+ Speakers

40+ Presentations
Who should Attend
- CEOs
- CTOs
- CSOs/CISOs
- Regulators
- Law Enforcement Agencies
- Researchers
CISO Connect
Dynamic cyber security leadership is recognized and reinforced through awards, knowledge sessions, panel discussions, training, and networking opportunities that enable CISOs to enhance skills and build relationships with critical stakeholders.
CISO Panel Discussions
- Compliance & AI – Governing the New Technology on the Block
- Internal Threats – Strategies for Partner-Dependent Organizations
- Disaster Recovery – What Works, and Doesn’t, in the Real World
- Leading with Risk – How CISOs Can Drive Business Decisions
- Data Without Borders? – Sovereignty, Trust, and the Cloud Dilemma

CISO Connect Speakers
CISO Awards
AVAR 2025’s CISO Awards recognize impactful cybersecurity leaders who have transformed the real-word effectiveness of enterprise cyber defenses in their organizations. Nominate exceptional CISOs from Malaysia for the Best CISO Award in 5 categories.
Cyber Security Leader Training
AI Management Systems for CISOs: Navigating Governance, Risk, and Compliance
Artificial Intelligence presents both a security and compliance risk that CISOs need to manage. AVAR 2025’s CISO Training session focuses on governance frameworks, risk management practices, and compliance obligations related to AI systems, and includes an interactive simulation where participants understand how an LLM can be hacked.
Expert Speakers
Threat Research Papers
- Sniffing Around: Unmasking the LongNosedGoblin operation in Southeast Asia and Japan
- ValleyRAT Unleashed: A Deep Dive into its Modern Arsenal and Tactics
- Inside the Shadows: APT Tactics Using MSC Files, Grim Resource Injection, and AppDomain Hijacking
- Meet VenomSEO: New Threat Targeting Malaysian Websites for Black SEO
- Unmasking AI-Themed Malvertising Targeting Social Media Users
- Lotus in Perpetual Bloom: Sustained Espionage in Southeast Asia with Evolving Sagerunex Backdoors
- Countering the Unthinkable: Disrupting Advanced Threats with Unconventional Defenses
- From Clusters to Actors: A Practical Threat Actor Attribution Framework
- ConnectUnwise: How Threat Actors Abuse ConnectWise installer as Builder for Signed Malware
- Yet Another Cyberespionage Operation In Vietnam
- High Stakes, Hidden Threats: Unmasking the Vault Viper Network with DNS
- SESE: Social Engineering Second Edition
- Cracking the Vault: Real-World Crypto Wallet Exploits and Defense Strategies
- Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware
- The Open doorX : From Directory Listing to Attribution
- IDFKA Backdoor: The Hidden Threat of Rust Implants in Modern APT Campaigns
These are just some of the papers that will be presented at AVAR 2025. View the agenda for more information.
Sponsors & Partners
Silver Sponsors



Bronze Sponsor

T Shirt Sponsor

Delegate Bag Sponsor

Attendee Name Badge & Lanyard Sponsor

Supporting Sponsors



Media Partners




Past Event Highlights


