Loading Events

« All Events

  • This event has passed.

Cyber- Terrorism + Cyber-Attacks: Protecting One’s Organisation from Devastating Impact

Jun 27, 2016 - Jun 29, 2016

Cyber Terrorism

The workshop will provide delegates with a solid understanding the systemic issues of cyber-attack, it’s motivations attack methodologies and defences, and the impact of cyber-attack.  It will include the tools, technologies, policies, methodologies, to understand cybersecurity, intelligence, and countermeasures and their related roles in the direct threats posed by cyber-attacks.

The workshop will promote initiatives that increase ROI while addressing risks within organisations and provide a deep understanding of the direct issues cyber-attack, its countermeasures and fundamental protection methods.

The workshop will utilise videos, demonstrations, case studies, and interactive working group exercises to ensure delegates learn fundamental concepts in a dynamic learning environment.

Key benefits of attending this workshop:

  • UNDERSTAND key trends, issues, and their impact and their key importance to cyber defence
  • SHARPEN AND FOCUS the communication between Intelligence and security to combat cyber terrorism
  • APPRECIATE key elements faced by industry in fighting cyber-attack
  • UNDERSTAND why breaches happen, what to do about them, and how to prevent them
  • IDENTIFY the motivation behind cyber terrorism, its tools, techniques, and methodologies.
  • GAIN CRITICAL INSIGHT and information on the convergence of business, information security, and intelligence
  • IMPLEMENT countermeasures through security and intelligence related strategies focused on the threats posed by cyber terrorism
  • RECEIVE personalised assistance in resolving cybersecurity challenges facing delegates’ organisations today.

  • CEOs, CIOs, CFOs, CTOs, CSOs, CISOs
  • Chief Legal Officers, Chief Audit Executives
  • Presidents, Senior Vice Presidents, Executive Vice Presidents and Vice Presidents
  • Chief Risk and Chief Compliance Officers
  • Chief Strategist and Chief Marketing Officers
  • Intelligence Officers
  • Board of Directors
  • Head of Information Security and Risk

  • Senior Security Consultants
  • Head of GRC

  • Head of Network Services

  • Information Security Officer

  • Head of Payment Systems & Risk
Group
  • Senior Security Programme Manager
  • Head of Corporate Infrastructure
  • Senior Network Security Officer

  • Head of Payment and Fraud
Security
  • Head of Network Architecture
  • Senior Network Security Systems Officer
  • Head of Corporate Business Continuity
  • Head of Security
Information Security Policy

 

Workshop Trainer: 

Armed with 24 years of experience, the trainer has presented at international conferences and summits on the issues and challenges within global cyberspace cybersecurity, as well as related national and economic security and persistent threats, in the USA, Canada, Australia and the UK.

His skills lie in working on global cyberspace issues, cybersecurity, threat environments, and speaking globally at conferences, universities, workshops, and seminars on cybersecurity + national level cybersecurity cyber risk, cybersecurity + international security, cyber related terrorism & cybercrime, open source intelligence, the global cybersecurity advanced persistent threat in cyberspace.  He also researches cyber trends, and threats including cyber warfare, cyber conflict, information dominance + asymmetric warfare, cyber related national and economic security and social engineering.

As a subject matter expert in cybersecurity, workshop trainer is an accomplished course author in Applied Penetration Testing, Network Security Assessment, and Framework for Information Security Testing (FIST), Network Security Assessment, and Open Source Security Tools. He has aided in the development of enterprise security assessment methodologies, and is versed in aspects of information security, security assessments, information operations, business, and cyber intelligence information collection.

The trainer has a pragmatic, focused, and practical approach to deliver cyber solutions in strategic, tactical, and operationally dynamic environments.  He has helped organisations stay ahead of the security curve through a proactive approach to cybersecurity.  With over 24 years of extensive security and technology experience, he has worked with the Fortune Fifty, and has personally lead and managed major security related security vulnerability assessment and penetration testing engagements for North American and international organisations in the private and government sectors.

Guest Speaker 1: 

Based in the Vulcan Alberta, Canada, CSCSS Executive Vice President, Guest Speaker 1, leads the Centres Defence Intelligence Group.

Guest Speaker 1 was recruited in to Centre for Strategic Cyberspace + Security Science (CSCSS) in 2012. He was rapidly promoted to Executive Vice-President, Defence & Intelligence Group. Guest Speaker 1 provides Cyber-Intelligence to the CSCSS executive as well as submitting reports and blogs to the CSCSS web site. Guest Speaker 1 is a contributor to CSCSS Training Programmes, CSCSS CYBERIMMERSION, CSCSS Defence Intelligence Group, and CSCSS Cybercrime Intelligence Services. Papers published by CSCSS include attack analysis, intelligence updates and GeoPolitical analysis.

Guest Speaker 1 works fill-time as an Intelligence Analyst. He describes himself as an Intelligence evangalist, using his military experience to provide training, team and process development to people and organisations who want to use intelligence.  

Guest Speaker 2: 

Guest Speaker 2 has over 25 years of focused experience in Cyber Security and Information Assurance. Guest Speaker 2 was selected by NATO (North Atlantic Treaty Organization) to represent the United States as the sole advisory subject matter expert on Cyber Defense for the IRCSG (Industrial Resources and Communications Services Group).

He is a highly experienced advisor, risk assessor and technology architect specialising in all phases of the security engineering process including regulatory compliance, policy formulation, cyber attribution and forensics, risk analysis, operations, training and managing of information security. 

Guest Speaker 2 is a consultant, author and lecturer, within the United States and internationally and is an adjunct lecturer for many graduate programs in cyber security, counter-terrorism, and Capitol Technology University Board Trustee.

Guest Speaker 2's professional certifications include: Master Business Continuity Planner, Certified Data Professional, Certified Information Systems Security Professional, Certified Business Continuity Planner and Certified Homeland Security Professional.

EXCLUSIVE Case Studies:

Data Breach Scenario: The dynamics of the exercise force participants to formulate a plan, adjust quickly, and think about strategies, outcomes and leadership roles when dealing with crisis

Setting Up and Running Effective Cyber Security Programmes: Revisit the issues and challenges: A Guided -­‐ Practical exercise to analyse a case study organisation and how to move from an insecure cyber stance to a ‘secure’ cybersecurity stance

On the Attack: will focus on and illustrate key concepts surrounding cybersecurity and effective testing, it will break down testing at each step, Planning, Operations, Reconnaissance, Enumeration, Analysis, Exploitation; the processes involved including management, execution and how attacks are coordinated.

Port Knocking: will focus on stealth and how to a hacker may implement and a hidden ‘backdoor’ into an organisation though ‘Port Knocking”, how it works, how it bypasses security measures such as scanning, and the threat it poses. 

Cyber Simulation Exercise:

Cyber Shock: The exercise requires critical decision-making and delivers a unique experience by allowing all participants to feel pressure as they make fast paced assessments, decisions and to see the impact and consequences of their actions in “real-time”.

Practical Exercise:

Google Hacking 

Interested in partnering with us?

Please contact us to discuss your requirements.
Click here to get in touch with us.

Workshop Venue:

M Hotel Singapore

81, Anson Road

Singapore 079908

T: (65) 6224 1133

F: (65) 6224 3173

Website: www.m-hotel.com

 

For room reservations, please contact:

Priscilla Pey

Assistant Director of Sales

M Hotel Singapore

D: (65) 6500 6202

M: (65) 9339 3854

E: priscilla.pey@millenniumhotels.com


Details

Start:
Jun 27, 2016
End:
Jun 29, 2016

Organiser

Open Forum Enterprise Pte Ltd
Phone:
(65) 6635 8836
Email:
tickets@openforum.com.sg
Website:
http://www.openforum.com.sg/

Venue

M Hotel Singapore
81, Anson Road
Singapore, 079908 Singapore
+ Google Map
Phone:
(65) 6224 1133
Website:
www.m-hotel.com