Agenda Day 2

09:00 – 09:45: Cyber offence and defence – mutually exclusive national priorities

Viewpoint 1: National virtual line of defence
  • Optimising readiness and risk-based dynamic posturing
  • CERT’s capacities as the first line of defence
  • Dedicated national cyber research institutes
  • ISPs
  • Viewpoint 2: Cyber armies of the state
    • Dedicated state-owned cyber security divisions
    • Hacktivism motivated by national patriotism
    • State-owned espionage

    09:45 – 10:30: HoneyX: Your guide to making honeypots and honeynets part of your cyber defence strategy

    Viewpoint 1: Passive defence
    • Asset risk analysis
    • Attack types and reporting
    • Intruder identification and network follow through
    Viewpoint 2: Active defence
    • Fighting back
    • Minefield approach to decoy systems
    • Farms and sacrificial lambs
    • Digital breadcrumbs and deception ports

    10:30 – 11:15 : Cyber space – a global war zone with no boundaries

    Viewpoint 1: Where are we today?
  • International collaboration or lack of it
  • Distrust of foreign entities
  • Bugs, vulnerabilities and exploits in virtual monocultures
  • How big is the collaboration iceberg?
  • Viewpoint 2: Watch the surface

    Above the surface

    • Above the water strategies to protect your country and company

    Below the surface

    • Potential strategies for governments and organisations
    • Regional CERTs and institutional organisation unification
    • Viewpoint 3: Cyber weapons and defensive equipment
    • National strategies on strengthening the cyber arsenal
    • Initiatives to speed up the military development of offensive cyber weapons
    • Hybrid attacks
    • Reverse engineering

    11:15 – 12:00: Ethical hacking and the world of hacker hiring

    Viewpoint 1: The white approach
  • Hiring the hacker or create the hacker
  • Penetration testing and knowing your network’s vulnerable areas
  • Viewpoint 2: Effects of social hacking
    • Do we and our staff know what details to give out?
    • How a simple attempt can get into retrieving sensitive information
    Viewpoint 3: Aggressive offence strategies
  • Taking down the originator
  • What is right, what is wrong?
  • Hack the hacker
  • Reverse engineering networks to cripple them
  • 13:00 – 13:45: Hacktivism – a public relations nightmare

    Viewpoint 1: Origins and reasons for attacks
    • Popularity of hacktivism
    • What to say, what not to say
    • Anonymous and Lulzsec = public figures
    Viewpoint 2: Hazards of hacktivism
    • Too much power in the hand of individuals
    • Wikileaks – the starting point of public cyber espionage
    • Freedom of speech and action?
    Viewpoint 3: Policies and strategy
    • Communicate, don’t hide
    • When to tell the world and your clients
    • Stolen encrypted and non-encrypted
    • Lost and irreplaceable

    Speakers Profile

    Shane MacDougall

    Ethical Hacker and Social Engineer

    Shane MacDougall is a Principal Partner in a boutique InfoSec consulting firm in Canada.

    Hord Tipton

    Executive Director

    Hord Tipton is the Executive Director at (ISC)², the largest not-for-profit membership body.

    Zahri Yunos

    Chief Operating Officer - CyberSecurity

    Zahri Yunos is currently the Chief Operating Officer at CyberSecurity Malaysia; a division.

    Prof Fred Piper Founder

    Founder - Information Security Group

    .


    Sponsors include