BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Q8 - ECPv4.5.5//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Q8
X-ORIGINAL-URL:https://q8asia.com.sg
X-WR-CALDESC:Events for Q8
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240822
DTEND;VALUE=DATE:20240823
DTSTAMP:20260415T015345
CREATED:20240327T061733Z
LAST-MODIFIED:20240716T050744Z
UID:4794-1724284800-1724457599@q8asia.com.sg
SUMMARY:Offensive Cyber Security for Critical Infrastructure Masterclass
DESCRIPTION:									Overview\n									Who should attend\n									Trainer\n									Case Studies\n									Partners\n									Venue\n									Industry Insights\n									Brochure Download\n									Overview \nHighlights: \n\n2 day in-person masterclass in Singapore.\nCertificate of Completion upon request\n\nWhat you will learn from this Masterclass: \nDay 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. This session includes ‘live”demonstrations of end-to-end attacks and real-world case studies. \nDay 2 will focus on defending against the cyber security threats and risks\, and will include technical\, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices. \n\nAPPLY knowledge of offensive and defensive cyber security.\nEQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.\nIDENTIFY the technical\, procedural and human requirements for defensive activities.\nMEASURE the effectiveness of security controls using security audits and monitoring.\nNAVIGATE the cyber security threat landscape.\nOUTLINE the people\, processes and technology used to defend an organisation from cyber security attacks.\n \n\n									Who should attend \n\n\nDirector\, Head of Department\, Managers\, Supervisors\, Executives and Officers of: \n\nCounter-Intelligence Investigation\nHuman Resources\nInformation Security\nInformation Technology (IT)\nInsider Threat Analysts\nInsider Threat Program Managers\nLegal\nNetwork Administration\nPhysical Security\nSoftware Engineering\n\n\n\n									Trainer \nAbout Our Expert Trainer \nOur trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management\, specialising in network architectures and vulnerability management.  He worked for the UK MOD\, researching cyber threats to critical national infrastructure and technologies. \nExpert Trainer provides cyber security support to both private sector organisations and Defence\, including information governance\, risk management\, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly\, making him ideal for roles where both hard cyber skills and architectural rigor are required. \nExpert Trainer has many years’ experience in the design\, development and implementation of secure networks\, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics\, including SIEM and log analysis. He has also conducted a number of security audits\, social engineering & OSINT campaigns\, awareness training and penetration tests for a variety of organisations across Europe and Asia. \n									Case Studies \n A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails\, mobile phones attacks\, USB attacks\, ransomware\, wireless Internet attacks\, and password attacks. \nThe attack chain.  \nCase studies/examples of different types of attacks. A walk through of some of the high profile cyber-attacks that have occurred in the past few years\, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks.  \nDefensive case studies/examples.   \nA variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks.   \n									Partners \nInterested to be part of this training? \nPlease contact us at hello@q8asia.com.sg to discuss your requirements. \n									Venue \nThis Masterclass will be held at Orchard Hotel Singapore.  \nMore information will be shared with the participants closer to the date of the masterclass. For assistance\, please write to hello@q8asia.com.sg \n									Industry Insights\n									Brochure Download \n\n\n\n\n\n\n \n \n \n—Albania (355)Algeria (213)Andorra (376)Angola (244)Anguilla (264)Antigua and Barbuda (268)Argentina (54)Armenia (374)Aruba (297)Ascension Island (247)Australia (61)Austria (43)Azerbaijan (994)Bahamas (242)Bahrain (973)Bangladesh (880)Barbados (246)Belarus (375)Belgium (32)Belize (501)Benin (229)Bermuda (441)Bhutan (975)Bolivia (591)Bosnia (387)Botswana (267)Brazil (55)Brunei (673)Bulgaria (359)Burkina Faso (226)Burundi (257)Cambodia (855)Cameroon (237)Canada (1)Cape Verde Islands (238)Cayman Islands (345)Central Africa Republic (236)Chad (235)Chile (56)China (86)Columbia (57)Comoros Island (269)Congo (242)Cook Islands (682)Costa Rica (506)Croatia (385)Cuba (53)Cyprus (357)Czech Republic (420)Democratic Republic of Congo (Zaire) (243)Denmark (45)Diego Garcia (246)Djibouti (253)Dominica Islands (767)Dominican Republic (809)Ecuador (593)Egypt (20)El Salvador (503)Equatorial Guinea (240)Eritrea (291)Estonia (372)Ethiopia (251)Faeroe Islands (298)Falkland Islands (500)Fiji Islands (679)Finland (358)France (33)French Guiana  (594)French Polynesia (689)Gabon (241)Georgia (995)Germany (49)Ghana (233)Gibraltar (350)Greece (30)Greenland (299)Grenada (473)Guadeloupe (590)Guam (671)Guatemala (502)Guinea Bissau (245)Guinea Republic (224)Guyana (592)Haiti (509)Honduras (503)Hong Kong (852)Hungary (36)Iceland (354)India (91)Indonesia (62)Iran (98)Iraq (964)Ireland (353)Israel (972)Italy (39)Ivory Coast (225)Jamaica (876)Japan (81)Jordan (962)Kazakhstan (7)Kenya (254)Kiribati (686)Korea\, North (850)Korea\, South (82)Kuwait (965)Kyrgyzstan (996)Laos (856)latvia (371)Lebanon (961)Lesotho (266)Liberia (231)Libya (218)Liechtenstein (423)Lithuania (370)Luxembourg (352)Macau (853)Macedonia (Fyrom) (389)Madagascar (261)Malawi (265)Malaysia (60)Maldives Republic (960)Mali (223)Malta (356)Mariana Islands (670)Marshall Islands (692)Martinique (596)Mauritius (230)Mayotte Islands (269)Mexico (52)Micronesia (691)Moldova (373)Monaco (377)Mongolia (976)Montserrat (664)Morocco (212)Mozambique (258)Myanmar (Burma) (95)Namibia (264)Nauru (674)Nepal (977)Netherlands (31)Netherlands Antilles (599)New Caledonia (687)New Zealand (64)Nicaragua (505)Niger (227)Nigeria (234)Niue Island (683)Norfolk Island (672)Norway (47)Oman (968)Pakistan (92)Palau (680)Palestine (970)Panama (507)Papua New Guinea (675)Paraguay (595)Peru (51)Philippines (63)Poland (48)Portugal (351)Puerto Rico (787)Qatar (974)Reunion Island (262)Romania (40)Russia (7)Rwanda (250)Samoa (American) (684)Samoa (Western) (685)San Marino (378)Sao Tome & Principe (239)Saudi Arabia (966)Senegal (221)Serbia (381)Seychelles (248)Sierra Leone (232)Singapore (65)Slovak Republic (421)Slovenia (386)Solomon Islands (677)Somalia (252)South Africa (27)Spain (34)Sri Lanka (94)St Helena (290)St Kitts & Nevia (869)St Lucia (758)Sudan (249)Surinam (597)Swaziland (268)Sweden (46)Switzerland (41)Syria (963)Taiwan (886)Tajikistan (992)Tanzania (255)Thailand (66)The Gambia (220)Togo (228)Tonga (676)Trinidad & Tobago (868)Tunisia (216)Turkey (90)Turkmenistan (993)Turks & Caicos Islands (649)Tuvalu (688)Uganda (256)Ukraine (380)United Arab Emirates (971)United Kingdom (44)Uruguay (598)USA (1)Uzbekistan (998)Vanuatu (678)Venezuela (58)Vietnam (84)Wallis & Futuna Islands (681)Yemen Arab Republic (967)Zambia (260)Zimbabwe (263) \n \n \n \n \nHow did you learn about this training?Email campaignLink from other websiteEvent brochureMagazine adSearch engineNewsgroup postColleagues recommendationAdvanced notice by postGoogle Ad WordsSocial media sitesWord of mouthSales contactOther\n \n \n\n
URL:https://q8asia.com.sg/event/offensive-cyber-security-for-critical-infrastructure-aug/
LOCATION:442\, Orchard Road\, 238879\, Singapore
GEO:1.3076475;103.8284994
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-ADDRESS=442 Orchard Road 238879 Singapore;X-APPLE-RADIUS=500;X-TITLE=442\, Orchard Road:geo:103.8284994,1.3076475
CATEGORIES:Government Services,Science & Technologies,Security & Defence
ATTACH;FMTTYPE=image/png:https://q8asia.com.sg/wp-content/uploads/2024/03/Offensive-CyberSec-for-Critical-Infrastructure-Teams-Dale-Unwin-Apr2024-title-1.png
ORGANIZER;CN="Q8%20Asia":MAILTO:hello@q8asia.com.sg
END:VEVENT
END:VCALENDAR