Special Interest Groups (SIGs) are targeted avenues for members, researchers, and government agencies to exchange knowledge and explore collaborations for collective interest.
The Threat Intelligence aspect covers technologies to detect malicious activities which include anomalies in network and endpoint access, suspicious user / insider behaviour, malware, Denial of Service attacks, and so on. The current trend in predictive / proactive defense overlaps the developments in Big Data, Data Analytics, and Deep Learning fields.
The Incident Response aspect covers technologies to evaluate and prioritise detected threats to assist human operators in crisis resolution and risk mitigation, as well as regulatory considerations to minimize impact of breaches across the board.
The Data Protection aspect covers technologies to protect confidentiality and integrity of data. This also involves access control considerations including user authentication.
The Data Privacy aspect covers technologies as well as regulations in order to preserve privacy of data owners without crippling the usability of the data, thus enabling new applications, smarter devices, and enhancing the digital lifestyle.
The group interests span all aspects of security for mobile devices: mobile applications, mobile platforms including software, firmware and hardware, mobile network, mobile malware, and mobile user behaviour.
Mobile security involves consideration of constraints underlying embedded devices as well as features unique to mobile lifestyle such as the ready availability of certain information (real-time location, contacts, etc.) compared to traditional computing.
The group interests span technologies for building secure software and constructing secure complex systems from various software and hardware components, as well as technologies for finding and patching vulnerabilities in existing or third-party software.
These involve testing methodologies, standards and compliance, design and development best practices, and also user / developer interfacing considerations, such as the need to reduce false alarms and to prioritize vulnerabilities for fixing.
Cyber-Physical System (CPS) Security is concerned with protecting complex infrastructure with large networks of devices such as public utilities and urban transportation. There is an emphasis on preserving correct, safe execution of (usually critical) processes that produce as well as use information shared across components, while accounting for physical and operational constraints of the system.
Internet of Things (IoT) shares the interconnected feature of CPS, with more emphasis on the connectivity technologies instead of the integrated system. As such IoT Security is concerned with confidentiality, integrity, availability and privacy of the exchanged information across devices.
The SIGs are dynamic groups and more groups can be formed as interest arises.
The Technology Talk II featured talks along the theme of Cyber Defense for Organizations from technical, organizational, and regulatory perspective. The WACI (Wild and Crazy Ideas) session in the afternoon will feature ideas pitching and problem statements that call for collective brainstorming, collaborative effort, or partnerships towards solutions.
The first Technology Talk was held at the Consortium space at NUS School of Computing.
Black Hat Asia 2017 will be held at the Marina Bay Sands in Singapore, March 28-31, 2017. InfoSec professionals from around the world will gather to learn from the brightest minds in the industry. Black Hat Asia opens with hands-on Training for security practitioners March 28-29 followed by the main conference March 30—31 featuring applicable and relevant security Briefings presented by top researchers, solutions and products in the Business Hall, and open-source tool demonstrations at Arsenal. Network with the industry’s top talent and stay up to date on the latest in AppSec, exploit development, platform security, and more.
As the first dedicated platform in Asia to address the enormous potential of the IoT revolution, the first edition of IoT Asia in 2014 was ahead of its competition. It was seen as a transformational platform for addressing challenges and identifying real opportunities within the IoT landscape. Fast forward to 2017, IoT Asia continues to provide insights for 4,500 attendees across the entire IoT value chain, addressing the interests of technology solution providers and enablers as well as end-user and potential IoT technology adopters across multiple industries. As a key player in Asia’s IoT community, IoT Asia 2017 will focus on Smart Cities, IoT Data Analytics, Design Applications, Wearables, Enablers, Industrial IoT, Cybersecurity, and Robotics.