The Lean LaunchPad (LLP) Singapore: Cybersecurity Track is a 10-week experiential learning programme focused on commercialization of potential cybersecurity technological innovation, organized by NUS Enterprise in partnership with Singapore Cybersecurity Consortium and supported by the National Research Foundation (NRF) and the Cyber Security Agency of Singapore (CSA).

Adjunct Prof. Virginia Cha of NUS Business School designs and delivers the Lean LaunchPad curriculum for the Cybersecurity Track. Prof. Abhik Roychoudhury, Academic Director of the Consortium, curates the cybersecurity content with contributions from experts in the Consortium community.

We are also delighted to see members of the Consortium actively contributing in the role of mentors to startups, including Eugene Aseev (Acronis), Gil Gilad (Custodio Technologies), and David Ong (Attila Cybertech). One of Consortium's seed projects, undertaken by Cloak, is taking part in the learning journey as well!

Session 1: 25 April 2018

Cybersecurity expert sharing:
"Your Granny's Method to Ignite Your Startup" by Dr Prateek Saxena (NUS)

LLP Cybersecurity Day1-1
LLP Cybersecurity Day1-2
LLP Cybersecurity Day1-3
LLP Cybersecurity Day1-4
LLP Cybersecurity Day1-5
LLP Cybersecurity Day1-6
LLP Cybersecurity Day1-7
LLP Cybersecurity Day1-8
LLP Cybersecurity Day1-9
LLP Cybersecurity Day1-10
previous arrowprevious arrow
next arrownext arrow
LLP Cybersecurity Day1-1
LLP Cybersecurity Day1-2
LLP Cybersecurity Day1-3
LLP Cybersecurity Day1-4
LLP Cybersecurity Day1-5
LLP Cybersecurity Day1-6
LLP Cybersecurity Day1-7
LLP Cybersecurity Day1-8
LLP Cybersecurity Day1-9
LLP Cybersecurity Day1-10
previous arrow
next arrow
Shadow

Session 2: 7 May 2018

Cybersecurity expert sharing:
"'RIE' – A VIEW FROM 'R'" by Prof. Abhik Roychoudhury (NUS)
"Secure Clock Synchronization for Time-Critical IoT Applications" by Prof. David Yau (SUTD)

LLP Cybersecurity Day2-5
LLP Cybersecurity Day2-4
LLP Cybersecurity Day2-3
LLP Cybersecurity Day2-2
LLP Cybersecurity Day2-1
previous arrowprevious arrow
next arrownext arrow
LLP Cybersecurity Day2-5
LLP Cybersecurity Day2-4
LLP Cybersecurity Day2-3
LLP Cybersecurity Day2-2
LLP Cybersecurity Day2-1
previous arrow
next arrow
Shadow

Session 3: 16 May 2018

Cybersecurity expert sharing:
"Starting Up Safely" by Dr. Jonathan Pan (Ministry of Home Affairs)

LLP Cybersecurity Day3-5
LLP Cybersecurity Day3-4
LLP Cybersecurity Day3-3
LLP Cybersecurity Day3-2
LLP Cybersecurity Day3-1
previous arrowprevious arrow
next arrownext arrow
LLP Cybersecurity Day3-5
LLP Cybersecurity Day3-4
LLP Cybersecurity Day3-3
LLP Cybersecurity Day3-2
LLP Cybersecurity Day3-1
previous arrow
next arrow
Shadow

Session 4: 28 May 2018

Cybersecurity expert sharing:
"From Desktop to Mobile - Threats and Opportunities" by Assoc. Prof. Gao Debin (SMU)

LLP Cybersecurity Day4-8
LLP Cybersecurity Day4-7
LLP Cybersecurity Day4-6
LLP Cybersecurity Day4-5
LLP Cybersecurity Day4-4
LLP Cybersecurity Day4-3
LLP Cybersecurity Day4-2
LLP Cybersecurity Day4-1
previous arrowprevious arrow
next arrownext arrow
LLP Cybersecurity Day4-8
LLP Cybersecurity Day4-7
LLP Cybersecurity Day4-6
LLP Cybersecurity Day4-5
LLP Cybersecurity Day4-4
LLP Cybersecurity Day4-3
LLP Cybersecurity Day4-2
LLP Cybersecurity Day4-1
previous arrow
next arrow
Shadow

Session 5: 6 June 2018

Cybersecurity expert sharing:
"Cyber-security: The Journey from Formal Methods, Program Analysis to Data Analytics" by Assoc. Prof. Liu Yang (NTU)
"Data Breaches: Security Challenges and Opportunities" by Mr Dai Zhongmin (Institute for Infocomm Research)

LLP Cybersecurity Day5-5
LLP Cybersecurity Day5-4
LLP Cybersecurity Day5-3
LLP Cybersecurity Day5-2
LLP Cybersecurity Day5-1
previous arrowprevious arrow
next arrownext arrow
LLP Cybersecurity Day5-5
LLP Cybersecurity Day5-4
LLP Cybersecurity Day5-3
LLP Cybersecurity Day5-2
LLP Cybersecurity Day5-1
previous arrow
next arrow
Shadow

Presentation Day: 25 June 2018

Team Presentations:
"A lightweight hardware security module to protect and authenticate your high-res camera feed" by STRAIT (Project from NTU)
"Training of AI models without data leakage" by Cloak
"Simplified vulnerability management for application source codes and binaries" by Scantist
"Securing and improving reliability of IoT systems" by IoT365 (Project from NUS)
"An integrative security assessment tool for critical infrastructure systems" by CyberSAGE (Project from ADSC)

LLP Cybersecurity Final 12
LLP Cybersecurity Final 11
LLP Cybersecurity Final 10
LLP Cybersecurity Final 9
LLP Cybersecurity Final 8
LLP Cybersecurity Final 7
LLP Cybersecurity Final 6
LLP Cybersecurity Final 5
LLP Cybersecurity Final 4
LLP Cybersecurity Final 3
LLP Cybersecurity Final 2
LLP Cybersecurity Final 1
previous arrowprevious arrow
next arrownext arrow
LLP Cybersecurity Final 12
LLP Cybersecurity Final 11
LLP Cybersecurity Final 10
LLP Cybersecurity Final 9
LLP Cybersecurity Final 8
LLP Cybersecurity Final 7
LLP Cybersecurity Final 6
LLP Cybersecurity Final 5
LLP Cybersecurity Final 4
LLP Cybersecurity Final 3
LLP Cybersecurity Final 2
LLP Cybersecurity Final 1
previous arrow
next arrow
Shadow