͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏
͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

|
 | 🔒 Elastic Hands-on Security Workshop By: Chidambaram Muthupalaniappan APJ-ASEAN Regional, Senior Solutions Architect Team Lead, Elastic Sann Ngamsiridesh Principal Solutions Architect, Strategic and Key Enterprise Accounts, Thailand Elastic
Cybersecurity threats are evolving, and organizations must modernize their security operations to scale effectively while maintaining business continuity. This Elastic Masterclass offers a hands-on experience, focusing on common workflows and analyses used by security analysts daily. Packed with real-world use cases, the workshop will teach you how to take a proactive approach to threat detection and response.
📌 Key Highlights: Utilize Elastic Security for Incident Response (IR) Master common cybersecurity workflows Create dynamic, security-focused visualizations Proactively detect and respond to threats in real-time Apply comprehensive IR with case management workflows
💻 What to bring: |
| | |  | 🔍 The Pentest Roadmap: Steps to Identify and Eliminate Cyber Threats By Vinod Senthil, Cyber Security Expert, Ultimate Cyber Technology Co., Ltd. 🌐🔒 Cyber threats are evolving rapidly, putting businesses at risk. This one-hour workshop will demystify penetration testing (Pentest), showing how it proactively strengthens your cybersecurity defense. 🌟 Key Highlights: - Learn the pentesting process and its business benefits. - Strengthen your organization's defense against cyber threats. - Ideal for both decision-makers and technical experts. 📌 Remark: - Coffee break for 30 pax - Classroom Théâtre setup for 40 pax - E-Certificate provided upon completion - 45 SEATS LIMITED! |
| | |  | 🔍 Sumo Logic Threat Detection, Investigation, and Response (TDIR) Workshop By Kwek Wee Chong Senior Solutions Engineer, Sumo Logic 🌐🔒
Empower your SOC analysts with Sumo Logic's cloud-native platform! This hands-on workshop will guide you in prioritizing actionable threats, automating security workflows, and leveraging out-of-the-box detections to reduce manual effort—allowing your team to focus on critical security tasks.
📌 Key Highlights: Learn practical skills for real-time threat detection and response Automate workflows to improve efficiency Prioritize actionable threats with advanced tools
🎓 Certificate provided 💻 What to bring: Your own laptop for interactive sessions |
| | |  | 🛡️ Securing Business by Stopping Intolerable L7 Events By Anshul Saxena CEO, Haltdos Dive into cutting-edge strategies to combat application-layer (L7) attacks with Anshul Saxena, CEO of Haltdos. These attacks, often targeting the most critical components of business infrastructure, require precise and effective mitigation tactics to ensure operational continuity and data protection. 📌 Key Highlights: Understanding prominent L7 attack scenarios affecting industries Advanced techniques to identify and block application-layer threats Building robust defense mechanisms for business-critical applications Insights into Haltdos' solutions for real-time threat prevention
|
| | |  | 🔄 Continuous Security Validation at the Heart of CTEM By Jeric Lim Channel Director, APAC, Pentera Explore the critical role of Continuous Threat Exposure Management (CTEM) in reducing risk across the entire attack surface. Jeric Lim, Channel Director at Pentera, sheds light on why most breaches today stem from misconfigurations, supply chain gaps, credential vulnerabilities, and application interfaces—not just traditional vulnerabilities.
📌 Key Highlights: Understanding the evolving causes of breaches beyond vulnerabilities How CTEM enables proactive risk reduction strategies Identifying and addressing security gaps across your attack surface Implementing a continuous security validation process
|
| | |  | 🛡️ Google Cybershield™ For National Security By Jeremy Ho Head of Security Sales, GCS, Thailand, Google Cloud Security Discover how Google Cybershield™ is transforming national security through cutting-edge cybersecurity strategies and innovative solutions. Jeremy Ho, Head of Security Sales at Google Cloud, will delve into essential topics that safeguard critical infrastructures and data. 📌 Key Highlights: Advanced cybersecurity strategies for national protection Cloud and infrastructure security enhancements Data protection, privacy, and compliance innovations Resilience and recovery in the face of evolving cyber threats Governance models driving collaboration and innovation
|
| | |  | 💰 Ways to Lose and Recover Stolen Cryptocurrency By Dmitrii Sandzhiev Growth Lead, Match Systems Cryptocurrency theft is a growing concern in the digital era, but recovery is not impossible. Dmitrii Sandzhiev, Growth Lead at Match Systems, will share key strategies and tools to help you recover stolen crypto and protect your digital assets. 📌 Key Highlights: Common and uncommon techniques for crypto recovery Using on-chain analysis to trace stolen assets Strategies to prevent fraud and money losses Gaining skills in cryptocurrency recovery and asset tracing
|
| | | See Full Program and Reserve The Seats! |
|
|  | | |  |  |  | | | | About VNU Asia Pacific VNU Asia Pacific is part of VNU Group, a globally operating exhibition company with offices in Utrecht, Shanghai, Bangkok and consolidates the international exhibition business of Royal Dutch Jaarbeurs. In Southeast Asia, Jaarbeurs formed a Joint Venture with TCC Group, a leading corporate conglomerate in the fast-growing region. From its business hub located in Bangkok, VNU Asia Pacific covers all key exhibition markets in South East Asia. |
|
|
|
|
| |
|
No comments