| 3rd December, 2025, Wednesday |
| 10:00 AM – 11:00 AM | Registration |
| 11:00 AM – 06:00 PM | Detailed agenda will be published soon |
| 07:00 PM | Welcome drinks reception and dinner |
| Conference Day 1: 4th December, 2025, Thursday |
| 09:00 – 09:40 | Registration and Conference Opening | ||||||
| 09:40 – 10:40 | Keynote Addresses | ||||||
| 10:40 – 11:00 | Break | ||||||
| Track 1 | Track 2 | CISO Workshop | |||||
| 11:00 – 11:30 | Sniffing Around: Unmasking the LongNosedGoblin operation in Southeast Asia and Japan Anton Cherepanov, Peter Strýček, ESET |
11:00 – 11:30 | High Stakes, Hidden Threats: Unmasking the Vault Viper Network with DNS Maël Le Touz, John Wojcik, Infoblox |
11:00 – 11:05 | Introduction to CISO workshop Vaidyanathan Chandramouli, Apayapadh Advisory |
||
| 11:05 – 11:25 | Quantum Reckoning: Cyber Security At A Tipping Point Felissa Mariz Marasigan, Mark Gabriel Rizare, EY GDS (CS) Philippines, Inc. |
||||||
| 11:30 – 12:00 | Inside the Shadows: APT Tactics Using MSC Files, Grim Resource Injection, and AppDomain Hijacking Hossein Jazi, Douglas Santos, Fortinet |
11:30 – 12:00 | Lotus in Perpetual Bloom: Sustained Espionage in Southeast Asia with Evolving Sagerunex Backdoors Joey Chen, Cisco |
11:25 – 11:45 | Automating PUA Inspection Dennis Batchelder, Arunabh Trivedi, AppEsteem Corporation |
||
| 12:00 – 12:30 | Shadows in Native Code: The Rise of AOT Compilation in Modern .NET Malware Sarang Popat Sonawane, Crowdstrike |
12:00 – 12:30 | NTLM Exploit Redux! Anurag Shandilya, Arnab Mandal, Satyam Yadav, K7 Computing |
11:45 – 12:25 | Leading with Risk – How CISOs Can Drive Business Decisions (Panel Discussion) Dr. Peter Leong, MY CIO Service Vikneswaran Kunasegaran, CREST Asia Council/Firmus Arivindran Saidoo, KPMG Malaysia Malini Kanesamoorthy, AmBank Group |
||
| 12:30 – 13:00 | Harnessing Large Language Models for Detection of AI Generated Attacks Abhishek Singh, Kalpesh Mantri, Shray Kapoor, InceptionCyber.ai |
12:30 – 13:00 | SESE: Social Engineering Second Edition Righard Zwienenberg, Eddy Willems, ESET, WAVCi |
12:25 – 13:00 | Training session: Building a Secure Malware Analysis Environment Lena YuMalware Village |
||
| 13:00 – 14:00 | Lunch | ||||||
| 14:00 – 14:30 | No Payload For You: Inside Sidewinder’s Selective Exploitation Strategy Eliad Kimhy, Santiago Pontiroli, Acronis |
14:00 – 14:30 | ValleyRAT Unleashed: A Deep Dive into its Modern Arsenal and Tactics Hiromu Kubiura, Shota Nakajima, Ryonosuke Kawakami, LY Corporation / Cyber Defense Institute, Inc. |
14:00 – 14:20 | TBD | ||
| 14:30 – 15:00 | ConnectUnwise: How Threat Actors Abuse ConnectWise Installer as Builder for Signed Malware Lance Jansen Caoile Go, Karsten Hahn, G Data AV Lab Inc / G Data Cyberdefense AG |
14:30 – 15:00 | Modern Fileless RAT Tactics: Node.js Abuse : Technical Analysis and Threat Attribution Reegun Richard Jayapaul |
14:20 – 15:00 | Disaster Recovery – What Works, and Doesn’t, in the Real World (Panel Discussion) Mohd Hanapi Bisri, Petra Energy Berhad Ashok Kumar J, G3 Cyberspace Vaidyanathan Chandramouli, Apayapadh Advisory |
||
| 15:00 – 15:30 | When Firewalls Go Blind: Custom Tools, AI Agents, and the Fall of Traditional Network Inspection Sangay Lama, Cameron Camp, SecureIQLab |
15:00 – 15:30 | Generative AI, Retrieval-Augmented Generation (RAG) and Agentic AI in Offensive Cyber Operations Aaron Aubrey Ng, Stanford University |
15:00 – 15:20 | Countering the Unthinkable: Disrupting Advanced Threats with Unconventional Defenses Ken Soh, Athena Dynamics |
||
| 15:30 – 15:50 | Break | ||||||
| 15:50 – 16:20 | Clustering Malicious File Hosting in APAC (and Beyond!) Joshua Hopkins, Team Cymru |
15:50 – 16:30 | TBD | 15:50 – 16:50 | Training session: AI Management Systems for CISOs – Navigating Governance, Risk, and Compliance | ||
| 16:20 – 16:50 | An Analysis of Cloud Infrastructure Utilization in Malware Command and Control Tran Thi Hieu Ngan, Bui Huy Anh, CMC Cyber Security |
16:30 – 16:50 | The Silent Invaders: Understanding and Combating macOS Infostealers Srinivasan Govindarajan, Pranjal Gupta, Microsoft |
||||
| 16:50 – 17:10 | TBD | 16:50 – 17:10 | What Gets Measured Gets Done (Sponsor Presentation) Michael Daniel, Cyber Threat Alliance |
16:50 – 17:30 | Compliance & AI – Governing the New Technology On The Block (Panel Discussion) Syarifah Bahiyah Rahayu, Universiti Pertahanan Nasional Malaysia Ruban Bala, Ryt Bank Cameron Camp, SecureIQLabs Yusfarizal Yusoff, PETRONAS Digital |
||
| 17:10 – 17:30 | Booking a Threat: Inside LummaStealer’s Fake reCAPTCHA Arvin Lauren L. Tan, John Rey B. Dador, Arvin Jay S. Bandong, G DATA AV Lab Inc. |
17:10 – 17:30 | Using Linguistics and Psychological Profiling in Threat Actor Attribution Rishika Desai, BforeAI |
17:30 – 17:35 | Closing remarks Vaidyanathan Chandramouli, Apayapadh Advisory |
||
| 19:00 – 19:30 | Pre-dinner Drinks | ||||||
| 19:30 – 22:00 | Gala Dinner | ||||||
| Conference Day 2: 5th December, 2025, Friday |
| 10:00 – 10:20 | The (Un)Natural Science of Malware Lena Yu, Malmons World Ltd & World Cyber Health – Malware Village |
|||
| Track 1 | Track 2 | |||
| 10:20 – 10:50 | Unmasking AI-Themed Malvertising Targeting Social Media Users Jaromír Hořejší, Check Point |
10:20 – 10:50 | Simplicity as a Weapon for Stealth and Persistence Chetan Raghuprasad, Cisco |
|
| 10:50 – 11:20 | AI Voice Honeypots – Turning Scam Calls into Real-Time Threat Intelligence Claudiu Laurentiu Tirisi, Alexandru Paul Marinescu, Bitdefender |
10:50 – 11:20 | Ghost Math: Syscall‑Only Injection, Deterministic Shellcode & QUIC C2 – A Modern EDR Bypass Monograph Ananda Krishna, Anand Sreekumar, UST |
|
| 11:20 – 11:40 | Break | |||
| 11:40 – 12:10 | IDFKA Backdoor: The Hidden Threat of Rust Implants in Modern APT Campaigns Vladimir Stepanov, Anna Mazurkevich, Rostelecom-Solar |
11:40 – 12:20 | Transparency Wars: Exposing Hidden Biases in Testing (Panel Discussion) Luis Corrons, Gen Simon Edwards, SE Labs Righard Zwienenberg, ESET Samir Mody, K7 Computing |
|
| 12:10 – 12:40 | The Open doorX : From Directory Listing to Attribution Shogo Hayashi, Nobuyuki Amakasu, NTT Security Holdings |
12:20 – 12:50 | No Impregnable Fortress: How Team46 Carries Out Successful Attacks on Russian Companies Vladislav Lunin, Positive Technologies |
|
| 12:40 – 13:10 | Meet VenomSEO: New Threat Targeting Malaysian Websites for Black SEO Igor Zdobnov, Ivan Korolev, Doctor Web |
12:50 – 13:10 | Hidden Malice: Inside Tiny FUD’s Mac Backdoor Suresh Reddy Lomada, K7 Computing |
|
| 13:10 – 14:10 | Lunch | |||
| 14:10 – 14:40 | From Code to Clues: Leveraging LLMs to RAT out Android SpyMax Baran Kumar, K7 Computing |
14:10 – 14:40 | Cracking the Vault: Real-World Crypto Wallet Exploits and Defense Strategies Rijul Chauhan, Mansi Aggarwal, Mastercard |
|
| 14:40 – 15:10 | Yet Another Cyberespionage Operation In Vietnam Luong Minh Anh, Tran Duy Nam, VNPT Cyber Immunity |
14:40 – 15:10 | Leveraging Generative AI for dynamic file honeypots in Windows Kernel Vladimir Strogov, Sergey Ulasen, Acronis |
|
| 15:10 – 15:30 | Windows threats and COM interfaces (Sponsor Presentation) Vanja Svajcer, Cisco |
15:10 – 15:30 | TBD | |
| 15:30 – 15:50 | Break | |||
| 15:50 – 16:20 | Emmenhtal Loader: The Silent Enabler of Modern Malware Campaigns Lovely Jovellee Lyn Antonio, Ricardo Pineda Jr, Louis Victor Sorita Jr, G Data AV Lab Inc |
15:50 – 16:30 | Data Without Borders? Sovereignty, Trust, and the Cloud Dilemma (Panel Discussion) Michael Daniel, Cyber Threat Alliance Selvakumar Manickam, Universiti Sains Malaysia G Saravanan, Informed Solutions Syahril Aziz, Secure InSight Sdn Bhd |
|
| 16:20 – 17:00 | Internal Threats – Strategies for Partner-Dependent Organizations (Panel Discussion) Peter Stelzhammer, AV-Comparatives Jairam Ramesh, AIA Digital+ Tanvinder Singh, PwC Jonathan Tam, Schneider Electric |
16:30 – 17:00 | Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware Sathwik Ram Prakki, Subhajeet Singha, Quick Heal |
|
| 17:00 – 17:10 | Closing address | |||
| 17:10 – 17:55 | EGM and Member’s meeting | |||
| 6th December, 2025, Saturday |
| 8:30 – 19:00 | Malaysia Tour |
| Click here for more details. | |
| Poster Presentation |
| A Threat-Aware Hybrid Quantum-Classical Machine Learning Framework for Network Intrusion Detection Dr. Kalpana B N, Dr. Karthi M, St. Joseph’s Group of Institutions |
| Reserve Papers |
| Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants Sathwik Ram Prakki, Subhajeet Singha, Quick Heal |
| The MITRE of GenAI’s ATT&CK Samir Mody, K7 Computing |
| Tracing the Origin: Fingerprints in MSC File for Clustering and Attribution Kazuya Nomura, Rintaro Koike, NTT Security Holdings |
| 18 months Long running IDATLoader Campaigns in eCrime World Niranjan Jayanand, Archana Manoharan, CyberProof |
