Header Ads

🔈 Cybersec Asia x TICW 2025 (Powered by NCSA): Gain Key Cybersecurity Insights – Limited Seats Available! Industry Leaders!

͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­ ͏ ‌     ­
 ͏  ͏  ͏  ͏ ͏  ͏  ͏  ͏ ͏  ͏  ͏  ͏ ͏  ͏  ͏  ͏ ͏  ͏  ͏  ͏ ͏  ͏  ͏  ͏

🎯 Don't Miss Out!

Explore Exclusive Workshops at Cybersec Asia 2025

🔒 The Cyber Influence Hostile Campaign Kill Chain

By:
Mr. Ori Kaplan
Chief Business Officer, 9500 Group


Explore the emerging field of Cyber for Influence and uncover the evolving threat of hostile influence and narrative campaigns targeting corporations and governments. This workshop will cover the Cyber for Influence Kill Chain, detailing the stages, threat actor tactics, and strategies to mitigate these risks. Participants will learn about the vital role of monitoring social network discourse and how to develop effective incident response and crisis management methodologies.


📌 Key Highlights:

  • Gain insights into the Cyber for Influence Kill Chain

  • Understand the tactics of threat actors and mitigation strategies

  • Emphasize collaboration between CISOs, PR teams, and executives

  • Explore tools and techniques to detect and counter influence threats


💻 What to bring: Your own laptop for interactive sessions

📱 Mobile Forensics: Unlocking Critical Evidence

The Importance of Including Mobile Devices in Investigations

By Andrew Smith

Director of Digital Forensics & Training Services

ICMS Cyber Solution (Thailand) Co., Ltd.


Director of Digital Forensics & Training Services, ICMS Cyber Solution (Thailand) Co., Ltd. 🔍💼

Explore the pivotal role mobile devices play in modern investigations. This workshop begins with an overview of digital forensic principles and the chain of custody, followed by a deep dive into mobile forensics.


📌 Key Highlights:

  • Understanding mobile forensics and device types

  • Overview of extraction methods: logical, physical, filesystem, and cloud

  • Types of retrievable data and legal considerations

  • Challenges in mobile forensic investigations

  • Practical demonstration of forensic tools


Gain the knowledge and skills to unlock critical evidence and enhance your investigations. 🌐🔒

🔍 Sumo Logic Threat Detection, Investigation, and Response (TDIR) Workshop

By Kwek Wee Chong
Senior Solutions Engineer, Sumo Logic 🌐🔒


Empower your SOC analysts with Sumo Logic's cloud-native platform! This hands-on workshop will guide you in prioritizing actionable threats, automating security workflows, and leveraging out-of-the-box detections to reduce manual effort—allowing your team to focus on critical security tasks.


📌 Key Highlights:

  • Learn practical skills for real-time threat detection and response

  • Automate workflows to improve efficiency

  • Prioritize actionable threats with advanced tools


🎓 Certificate provided
💻
What to bring: Your own laptop for interactive sessions

🔒 Elastic Hands-on Security Workshop
By:

Chidambaram Muthupalaniappan
APJ-ASEAN Regional, Senior Solutions Architect Team Lead, Elastic

Sann Ngamsiridesh
Principal Solutions Architect, Strategic and Key Enterprise Accounts, Thailand Elastic


Cybersecurity threats are evolving, and organizations must modernize their security operations to scale effectively while maintaining business continuity. This Elastic Masterclass offers a hands-on experience, focusing on common workflows and analyses used by security analysts daily. Packed with real-world use cases, the workshop will teach you how to take a proactive approach to threat detection and response.


📌 Key Highlights:

  • Utilize Elastic Security for Incident Response (IR)

  • Master common cybersecurity workflows

  • Create dynamic, security-focused visualizations

  • Proactively detect and respond to threats in real-time

  • Apply comprehensive IR with case management workflows

💻 What to bring:

  • Your own laptop for hands-on practical sessions

  • Elastic will be used as the vector database for examples and labs


🔐 Panel Discussion: Industry Leaders' Roundtable:

Navigating Cyber Threats and Building Trust

Panelists:

  • Tithirat Siripattanalert, Head of Digital Infrastructure, True Digital Group Co., Ltd.

  • Phong Sam, CISO, Central Group

  • Virag Thakkar, Global Head - Cyber Security, Thai Union

  • Mr. Chatchawarn Jirupathum, CISO, RMA Group


Moderator:

  • Captain Serge Christiaans, CISO & Airline Captain


This panel discussion will explore the evolving cybersecurity landscape, where industry leaders will share their insights on:

  • Combating emerging cyber threats

  • Strengthening collaboration

  • Enhancing transparency

  • Building trust among stakeholders in the digital ecosystem

🌐 Key Highlights:

  • Real-world strategies for overcoming cyber threats

  • How to foster trust and confidence in the digital space

  • Collaborative efforts for stronger cybersecurity

🔐 Panel Discussion: Building an Ecosystem for Digital and Cybersecurity Industry

Speakers:

  • BK Soon, Vice Chair, CREST Asia

  • Nicolaj Geller Christensen, CEO, Digital Hub Denmark

  • Lukas Fabijonavicius, Acting Head of ICT Lab at the Innovation Agency


Moderator:
AVM Chalermchai Wonggate, Director of Cybersecurity Research Center, NCSA

Join us for a dynamic panel discussion where industry experts will share their insights on:

  • Building a sustainable ecosystem for the growth of the digital and cybersecurity industries

  • Innovative ideas to foster industry collaboration

  • Real-world strategies for developing an environment that supports cybersecurity and digital transformation

🌐 Key Highlights:

  • Building industry partnerships

  • Leveraging innovation for industry growth

  • Strengthening the digital and cybersecurity ecosystem


🌟 More Sessions, More Insights

Join Us at Cybersec Asia 2025! 🔍

For any inquiries or further information, please feel free to contact us
at 
hello@cybersec-asia.net


Best regards,
Cybersec Asia Team


About VNU Asia Pacific

VNU Asia Pacific is part of VNU Group, a globally operating exhibition company with offices in Utrecht, Shanghai, Bangkok and consolidates the international exhibition business of Royal Dutch Jaarbeurs. In Southeast Asia, Jaarbeurs formed a Joint Venture with TCC Group, a leading corporate conglomerate in the fast-growing region. From its business hub located in Bangkok, VNU Asia Pacific covers all key exhibition markets in South East Asia.

No comments

Powered by Blogger.