Upcoming Events

  • 25 August 2017: Technology Talk III

    The 3rd Technology Talk will be an NUS Edition - part of Around-the-Campuses Technology Talk Series, jointly held with the National Cybersecurity R&D Lab (NCL) User Forum. (Event details)

  • Cybersecurity Camp II

    The 2nd Cybersecurity Camp will be held in Singapore on December 14-15, 2017 at the campus of National University of Singapore.
    Application details coming soon! (Event details)

Special Interest Groups

Special Interest Groups (SIGs) are targeted avenues for members, researchers, and government agencies to exchange knowledge and explore collaborations for collective interest.

Threat Intelligence and Incident Response

Threat Intelligence and Incident Response

The Threat Intelligence aspect covers technologies to detect malicious activities which include anomalies in network and endpoint access, suspicious user / insider behaviour, malware, Denial of Service attacks, and so on. The current trend in predictive / proactive defense overlaps the developments in Big Data, Data Analytics, and Deep Learning fields.

The Incident Response aspect covers technologies to evaluate and prioritise detected threats to assist human operators in crisis resolution and risk mitigation, as well as regulatory considerations to minimize impact of breaches across the board.

Registered SIG members

SIG Lead

NUS

Data Security and Privacy

Data Protection and Privacy

The Data Protection aspect covers technologies to protect confidentiality and integrity of data. This also involves access control considerations including user authentication.

The Data Privacy aspect covers technologies as well as regulations in order to preserve privacy of data owners without crippling the usability of the data, thus enabling new applications, smarter devices, and enhancing the digital lifestyle.

Registered SIG members

SIG Lead

I2R

Mobile Security

Mobile Security

The group interests span all aspects of security for mobile devices: mobile applications, mobile platforms including software, firmware and hardware, mobile network, mobile malware, and mobile user behaviour.

Mobile security involves consideration of constraints underlying embedded devices as well as features unique to mobile lifestyle such as the ready availability of certain information (real-time location, contacts, etc.) compared to traditional computing.

Registered SIG members

SIG Lead

SMU

System and Software Security

System and Software Security

The group interests span technologies for building secure software and constructing secure complex systems from various software and hardware components, as well as technologies for finding and patching vulnerabilities in existing or third-party software.

These involve testing methodologies, standards and compliance, design and development best practices, and also user / developer interfacing considerations, such as the need to reduce false alarms and to prioritize vulnerabilities for fixing.

Registered SIG members

SIG Lead

NTU

Cyber-Physical System and IoT Security

Cyber-Physical System and IoT Security

Cyber-Physical System (CPS) Security is concerned with protecting complex infrastructure with large networks of devices such as public utilities and urban transportation. There is an emphasis on preserving correct, safe execution of (usually critical) processes that produce as well as use information shared across components, while accounting for physical and operational constraints of the system.

Internet of Things (IoT) shares the interconnected feature of CPS, with more emphasis on the connectivity technologies instead of the integrated system. As such IoT Security is concerned with confidentiality, integrity, availability and privacy of the exchanged information across devices.

Registered SIG members

SIG Lead

SUTD

Cybercrime and Investigation

Cybercrime and Investigation

The Cybercrime and Investigation SIG focuses on measures and technologies for better cybercrime investigation and attack attribution. The group interests include digital forensics and anti-forensics, investigative triaging, and solving challenges in handling large volumes of case exhibits and digitisation.

Distinct from the Threat Intelligence and Incident Response topic, which leans towards organizational defense, this topic is applicable to cybercrime determent and law enforcement.

Registered SIG members

SIG Lead

MHA

More

More Possibilities

The SIGs are dynamic groups and more groups can be formed as interest arises.

Past Events

TechTalk II

Technology Talk II and WACI Day 2017 (16 June 2017)

The second Technology Talk on the theme of Cyber Defense for Organizations was held along with the inaugural WACI (Wild and Crazy Ideas) Day.
Read article

Catalonia

Visit by Mr. Joan Puate, Catalonia Digital Cluster (11 May 2017)


ADSC

Visit by ADSC and Prof. David Nicol (3 May 2017)


kaspersky

Visit by Kaspersky Lab HQ Delegation (26 April 2017)


Visit-UAS

Visit by Professors from Swiss Universities of Applied Sciences (10 March 2017)


SG-CRC 2017

SG-CRC 2017 (21 - 22 February 2017)

At the SG-CRC 2017 conference co-organized by the Consortium, members contributed industry perspectives through Lightning Talks and exhibition.
Read article


Cybersecurity Camp 2017

Cybersecurity Camp (19 - 20 February 2017)

The inaugural Cybersecurity Camp was a two-day workshop comprising lessons and a 24-hour hackathon.
Read article


Technology Talk Nov 2016

Kick-Off Event - Technology Talk (2 November 2016)

The first Technology Talk was held at the Consortium space at NUS School of Computing.
Read article


Launch 2016

Consortium Launch (20 September 2016)

The Singapore Cybersecurity Consortium (SGCSC) was launched at TechVenture 2016.
Read article

Related Events

Black Hat Asia 2017

Black Hat Asia 2017

Black Hat Asia 2017 will be held at the Marina Bay Sands in Singapore, March 28-31, 2017. InfoSec professionals from around the world will gather to learn from the brightest minds in the industry. Black Hat Asia opens with hands-on Training for security practitioners March 28-29 followed by the main conference March 30—31 featuring applicable and relevant security Briefings presented by top researchers, solutions and products in the Business Hall, and open-source tool demonstrations at Arsenal. Network with the industry’s top talent and stay up to date on the latest in AppSec, exploit development, platform security, and more.

IoT Asia 2017

29-30 March 2017
Singapore EXPO, Singapore
#iotasia

IoT Asia 2017

As the first dedicated platform in Asia to address the enormous potential of the IoT revolution, the first edition of IoT Asia in 2014 was ahead of its competition. It was seen as a transformational platform for addressing challenges and identifying real opportunities within the IoT landscape. Fast forward to 2017, IoT Asia continues to provide insights for 4,500 attendees across the entire IoT value chain, addressing the interests of technology solution providers and enablers as well as end-user and potential IoT technology adopters across multiple industries. As a key player in Asia’s IoT community, IoT Asia 2017 will focus on Smart Cities, IoT Data Analytics, Design Applications, Wearables, Enablers, Industrial IoT, Cybersecurity, and Robotics.