AI Deception for Defence and Security: Active Threat Hunting & Internet of Battlefield Things (IoBT)

AI Deception
Overview

This two-and-a-half-day hands-on masterclass starts with an overview of Artificial Intelligence (AI) algorithms and explores the threat model space of different AI
techniques. It then provides an in-depth analysis of different AI adversarial attacks including adversarial poisoning attacks, adversarial evasion attacks, adversarial
attacks against malware detection and differential privacy and model theft techniques.

The course is concluded with defense mechanisms to protect AI engines from adversarial attacks and reviews different testing techniques to identify vulnerabilities of different AI engines against adversarial learning techniques.

What you will learn from this Masterclass:

  • IDENTIFY the threat model space of different Artificial Intelligence (AI) techniques.
  • UNDERSTAND and ANALYSE different AI adversarial attacks.
  • LEARN defense mechanisms to protect AI engines from attacks.
  • REVIEW different testing techniques to identify vulnerabilities of different AI engines.
  • IDENTIFY critical AI usages within your organisation and your roadmap.
  • EXECUTE security modeling for AI usages (threats, adversaries, attack vectors).
  • BETTER understanding of secure incorporation of AI technology.
Who will attend
  • CEOs
  • CTOs
  • COOs
  • Chief Data Officers
  • Chief Information Officers
  • Chief Innovation Officers
  • Chief Digital Officers
  • CxOs (Analytics, Data, Information, Innovation, Technology)
  • Algorithms Engineers/Scientists
  • Scientists Engineers Developers
  • Software Engineers
  • VP’s/Directors/Heads of AI/Machine Learning/Data Science/Technology Innovation/Applied AI
Trainer

Expert Trainer has served for more than a decade in a variety of industrial and academic positions with leading players in Cyber-Security and Artificial Intelligence and is currently director of the Cyber Science Lab in the University of Guelph, Ontario, Canada. The Cyber Science Lab (CSL) is a research lab focused on advancing knowledge and practice in security and privacy of Artificial Intelligence systems to build trustable AI agents for a variety of threat hunting, threat attribution and digital forensics tasks.

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


Risk and Threat Assessment for Security Projects

Overview

Through this workshop, attendees will learn unique quantitative and qualitative methodologies for risk and threat assessment that is fully compliant with the strictest international standards and provides Risk Assessments Planning and the foundation for Implementation of security solutions for:

  • Countries and Corporations
  • Critical Infrastructures and Assets
    - Information Security
    - Maritime and Airport Security
  • Mega Events
  • VIP Installations and Dignitaries

What you will learn from this Masterclass:

  • EXPLORE methodological tools which enable you to track and analyse possible security risks of critical infrastructure.
  • IDENTIFY the major threats and vulnerabilities using an accurate structured procedure.
  • ANALYSE "real life" worldwide security events.
  • MASTER the innovative method of "Red Team" Simulation.
  • RECEIVE theoretical and practical training using the learnt methodology.
Who will attend
  • Professionals engaged in security planning.
  • Security officers and security experts of critical infrastructure and facilities in government organisations, public and commercial sectors.
  • Intelligence officials in security Governmental and Public organisations as well as the private sectors.
Trainer

Expert Trainer is a retired Colonel from the Israeli Defense Forces – IDF with practical and operative knowledge in research and analysis, risk and threat assessment.
Expert Trainer designed, managed and implemented a variety of complex projects and solutions
for Intelligence, Counter Terrorism, Command and Control (C&C). He is also a research fellow in the ICT - International Institute for Counter Terrorism and has won creative thinking award: Director of Intelligence – IDF (Israel Defense Force).

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


Managing Internet of Things (IoT) Security Risks

Managing IoT - September 2019_1
Overview

This 2-day Managing Internet of Things (IoT) Security Risks Masterclass provides delegates a strategic understanding on the new threats and paradigms emerging from IoT while guiding on the right approaches in handling such threats. Due to the nature of IoT and its ubiquity, security needs to be addressed in a fundamentally different way; the devices are no longer important, but their data is. Based on the zero-trust networking, assume breach and cattle-vs-pets paradigms, this Masterclass will help delegates look at IoT security in a whole different way. 

What you will learn from this Masterclass:

  • Recognise the new threats IoT pose for an enterprise
  • Identify the threats and limitations at the technical level
  • Integrate IoT security in your existing security management
  • Determine proper responses to IoT threats
  • Refocus your security efforts to stay in control
Who will attend
  • Corporate Business Continuity
  • Corporate Infrastructure
  • Information Security 

  • Information Security and Risk

  • Network administrators
  • Network Architecture
  • Network Security Systems
  • Network Services

  • Payment and Fraud
Security
  • Payment Systems & Risk
Group
  • Security Programme
  • Security
Information Security Policy
  • System Administration
Trainer

Armed with more than 30 years of experience in this industry, Expert Trainer is an independent security consultant. Expert Trainerhas been involved in many large-scale projects including mobile security, banking security, industrial automation, covering technical and non-technical aspects.

Expert Trainer started as a technical security tester and has delivered courses on mobile security in Abu Dhabi, Kuala Lumpur, Singapore and Capetown. He has international experience in most European countries, the Caribbean, Asia and the Middle East.

Expert Trainer has consulted a large number industries ranging from ministries of Dutch government, utilities companies, banking sectors, Europol, payment providers, and Dutch Telecom operators.

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


Maritime Cyber Security

Maritime Cyber Security
Overview

This workshop aims to increase awareness and provide knowledge on maritime cyber security through case studies and practical examples that attendees will be able to apply as best practises to their organisations, in order to optimise resources allocation and achieve maximum return-on-investment in the maritime sector.

It will provide the inputs required for building and maintaining a comprehensive cyber security strategy based on a risk-management approach as well as offer insights for those who want to enrich their business cyber security capability maturity.

What you will learn from this workshop: 

  • DEVELOP an understanding & awareness of key aspects of maritime cyber security.
  • UNDERSTAND the vulnerabilities of on-board and at-shore, widely used, IT and OT systems.
  • VALUE the importance of developing a risk-based cyber security strategy and policy implementation.
  • ADOPT the most suitable code of practice for cyber threat risk mitigation and contingency planning.
  • MAKE an informed decision on resources allocation for cyber security measures, tools and infrastructure.
  • IDENTIFY and select capability development content that will generate maximum impact for your organisation.
  • ACT as ambassadors in promoting a people-focused cyber culture within your organisation.
Who should attend
  • Senior managers who are looking to raise awareness on cyber security within their organisations.
  • Leaders who wish to be considered as pioneers in cyber security.
  • First line supervisors who wish to equip themselves with practical knowledge that will be applied to protect their everyday business activities from cyber threats.
  • All staff engaged, directly or indirectly, in the maritime sector (ports, shipping operators, brokers, insurers, government officials, lead auditors etc).
Trainer

Expert Trainer has over 19 years of professional experience as a navy warfare officer in NATO, EU and UN operations. Since joining the Hellenic Navy in 2003,
he rose to the rank of Lieutenant Commander, and was awarded medals and honorary awards for participation in international missions. During his time with the navy, he worked part-time as an instructor and lecturer with the Hellenic Naval Academy and the Hellenic Air Force.

Expert Trainer has worked as Editor in Chief for the Institute of International Relations at Panteion University's monthly newsletter on Naval Strategy and Maritime Security. He has also taught maritime security and cyber security at the University of Plymouth as a Visiting Research Fellow.

Table-top Exercises

Apart from case study analysis on real-life maritime-related cyber breaches, delegates will also develop a 10-step cyber security policy for your
organisation.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


Cyber Security & Resilience for Critical National Infrastructure and Technologies.

Cyber Security and Resilience
Overview

Day 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. There will be live demonstrations of end-to-end attacks and real-world case studies.

Day 2 will focus on defending against the cyber security threats and risks, and will include technical, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices.

What you will learn from this Masterclass:

  • APPLY knowledge of offensive and defensive cyber security.
  • EQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.
  • IDENTIFY the technical, procedural and human requirements for defensive activities.
  • MEASURE the effectiveness of security controls using security audits and monitoring.
  • NAVIGATE the cyber security threat landscape.
  • OUTLINE the people, processes and technology used to defend an organisation from cyber security attacks.
Who will attend
  • Director, Head of Department, Managers, Supervisors, Executives and Officers of:

    • Counter-Intelligence Investigation
    • Human Resources
    • Information Security
    • Information Technology (IT)
    • Insider Threat Analysts
    • Insider Threat Program Managers
    • Legal
    • Network Administration
    • Physical Security
    • Software Engineering
Trainer

Expert Trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management, specialising in network architectures and vulnerability management.  He worked for the UK MOD, researching cyber threats to critical national infrastructure and technologies.

Expert Trainer provides cyber security support to both private sector organisations and Defence, including information governance, risk management, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly, making him ideal for roles where both hard cyber skills and architectural rigor are required.

Expert Trainer has many years’ experience in the design, development and implementation of secure networks, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics, including SIEM and log analysis. He has also conducted a number of security audits, social engineering & OSINT campaigns, awareness training and penetration tests for a variety of organisations across Europe and Asia.

Case Studies

Live end-to-end attack demonstrations. 

 A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails, mobile phones attacks, USB attacks, ransomware, wireless Internet attacks, and password attacks.

The attack chain. 

Case studies/examples of different types of attacks. Please elaborate more. A walk through of some of the high profile cyber-attacks that have occurred in the past few years, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks. 

Defensive case studies/examples.  

A variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks. A number of specific examples from the instructor’s personal and professional experience will be given, including taking a layered approach to security, and protecting against human threats.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


Insider Threat Management

Overview

This 2-day workshop on Insider Threat Management will help delegates gain a strategic understanding of risks and threats within an organisation. This workshop covers how to identify Internal Threats and its different types of Internal Threats to how to conduct a risk assessment of their organisation to deter and manage Internal Threats. This workshop presents an in-depth view of the Insider Threat problems and teaches delegates how to develop a proven and comprehensive Insider Threat Risk Mitigation Framework for detecting, deterring and managing Insider Threats.

What you will learn from this workshop: 

  • DETER, DETECT AND MITIGATE actions by insiders who represent a threat to national security and organisations.
  • RECOGNISE actions and behaviours that can signify an Insider Threat.
  • ASSESS current Insider Threat Programme for weaknesses and make enhancements.
  • IDENTIFY Insider Threat risks, vulnerabilities and weaknesses within an organisation.
  • IMPLEMENT risk mitigation strategies and actionable steps that can be taken.
  • DEVELOP and IMPLEMENT an Insider Threat Awareness and Reporting Program.
Who should attend

Anyone involved in the development, oversight, or operation of an Insider Threat or risk management program:

  • Chief Information Security Officer
  • Chief Security Officer
  • Chief Risk Officer
  • Counterintelligence Investigators
  • Facility Security Officer
  • Human Resource Manager
  • Legal Manager
  • Network Security Officer
  • Security Officer
Trainer

Expert Trainer is a highly experienced senior law enforcement, security and incident management practitioner. He has over 37 years of leadership experience in both law enforcement and the security industry. Having spent over 33 years in law enforcement with the Hong Kong Police, Peter reached the rank of Assistant Commissioner
and was awarded the Police Distinguished Service Medal (P.D.S.M.) for his exemplary service and contribution to Hong Kong.

Expert Trainer has been a speaker at numerous international conferences, including: The California Association of Hostage Negotiators, USA; The Interpol Strategic Planners Conference, France; The Razak School of Government, Malaysia; The ASEAN Regional Forum on Bio-Preparedness and Disaster Response Conference, Philippines; the Asia Emergency Management Conference; and the Risk and Resilience Conference, Singapore.

Table-top Exercises

Case study exercises will be guided by Expert Trainer and will also include:

  • Case Management on Handling Insider Threats
  • How to Develop an Insider Threat Program Blueprint.
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download