Advanced Strategies & Tools against AI-Driven Threats

AIthreats
Overview

Highlights:

  • 2 days in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

This course will equip participants with the knowledge and skills to identify, analyse, and combat AI-generated disinformation as well as actively test defences
via red-teaming

  • Get an overview on influence operations, forgeries, disinformation and AI
  • Learn the tools and techniques that are used to detect AI generated threats
  • Understand the role of LLMs in influence ops
  • Learn how to use AI tools to create online assets for blue-teaming and red teaming.
Who should attend

This training program is designed for senior intelligence analysts, cybersecurity experts, law enforcement officials, policymakers, and professionals involved in countering advanced influence operations.

Trainer

About Our Expert Trainer

Our trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information about the venue will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced Influence Operations Attribution Training Program

AdvIO
Overview

Highlights:

  • 1 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

  • An overview of the global online influence operations.
  • Understand the role of domains in influence operations
  • Learn advanced tools and techniques through hands-on activities.
  • Develop attribution strategies through 'hands-on' activities.
Who should attend

This training program is designed for senior intelligence analysts, cybersecurity experts, law enforcement officials, policymakers, and professionals involved in countering advanced influence operations.

Trainer

About Our Expert Trainer

Our trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information about the venue will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Offensive Cyber Security for Critical Infrastructure Masterclass

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

Day 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. This session includes 'live"demonstrations of end-to-end attacks and real-world case studies.

Day 2 will focus on defending against the cyber security threats and risks, and will include technical, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices.

  • APPLY knowledge of offensive and defensive cyber security.
  • EQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.
  • IDENTIFY the technical, procedural and human requirements for defensive activities.
  • MEASURE the effectiveness of security controls using security audits and monitoring.
  • NAVIGATE the cyber security threat landscape.
  • OUTLINE the people, processes and technology used to defend an organisation from cyber security attacks.
  •  
Who should attend
  • Director, Head of Department, Managers, Supervisors, Executives and Officers of:

    • Counter-Intelligence Investigation
    • Human Resources
    • Information Security
    • Information Technology (IT)
    • Insider Threat Analysts
    • Insider Threat Program Managers
    • Legal
    • Network Administration
    • Physical Security
    • Software Engineering
Trainer

About Our Expert Trainer

Our trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management, specialising in network architectures and vulnerability management.  He worked for the UK MOD, researching cyber threats to critical national infrastructure and technologies.

Expert Trainer provides cyber security support to both private sector organisations and Defence, including information governance, risk management, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly, making him ideal for roles where both hard cyber skills and architectural rigor are required.

Expert Trainer has many years’ experience in the design, development and implementation of secure networks, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics, including SIEM and log analysis. He has also conducted a number of security audits, social engineering & OSINT campaigns, awareness training and penetration tests for a variety of organisations across Europe and Asia.

Case Studies

 A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails, mobile phones attacks, USB attacks, ransomware, wireless Internet attacks, and password attacks.

The attack chain. 

Case studies/examples of different types of attacks. A walk through of some of the high profile cyber-attacks that have occurred in the past few years, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks. 

Defensive case studies/examples.  

A variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Industry Insights
Brochure Download


Detecting Radicalisation via Cyber and Social Media Intelligence

Overview

Highlights:

  • One day in-person course in Singapore
  • Certificate of Completion

What you will learn from this Masterclass:

As terror operatives and supporters exploit the web and social media to recruit followers and plan their attacks, we also see more terror groups also add instant messaging platforms and end-to-end encryption apps to their tool kit. To combat the next terror attacks, authorities  need to be equipped not just with advanced defence capabilities, but also with expertise in AI, big data analytics and the latest technology tools.

Who should attend
  • Counterterrorism, Law Enforcement Officers & Policy Makers
  • Risk Managers, Security Personnel
Trainer

About Our Expert Trainer:

  • A former extremist turned undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells.
  • An Expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism.
  • He testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.
  • Currently a Professor of Public Safety, Crime & Intelligence Analysis
  • Co-author of the acclaimed book, "Undercover Jihadi".
Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This session will be held at one of the hotel venues in Singapore. Participants will receive more information closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Offensive Cyber Security for Critical Infrastructure Masterclass

Overview

Day 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. There will be live demonstrations of end-to-end attacks and real-world case studies.

Day 2 will focus on defending against the cyber security threats and risks, and will include technical, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices.

What you will learn from this Masterclass:

  • APPLY knowledge of offensive and defensive cyber security.
  • EQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.
  • IDENTIFY the technical, procedural and human requirements for defensive activities.
  • MEASURE the effectiveness of security controls using security audits and monitoring.
  • NAVIGATE the cyber security threat landscape.
  • OUTLINE the people, processes and technology used to defend an organisation from cyber security attacks.
  •  
Who will attend
  • Director, Head of Department, Managers, Supervisors, Executives and Officers of:

    • Counter-Intelligence Investigation
    • Human Resources
    • Information Security
    • Information Technology (IT)
    • Insider Threat Analysts
    • Insider Threat Program Managers
    • Legal
    • Network Administration
    • Physical Security
    • Software Engineering
Trainer

Expert Trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management, specialising in network architectures and vulnerability management.  He worked for the UK MOD, researching cyber threats to critical national infrastructure and technologies.

Expert Trainer provides cyber security support to both private sector organisations and Defence, including information governance, risk management, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly, making him ideal for roles where both hard cyber skills and architectural rigor are required.

Expert Trainer has many years’ experience in the design, development and implementation of secure networks, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics, including SIEM and log analysis. He has also conducted a number of security audits, social engineering & OSINT campaigns, awareness training and penetration tests for a variety of organisations across Europe and Asia.

Case Studies

Live end-to-end attack demonstrations. 

 A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails, mobile phones attacks, USB attacks, ransomware, wireless Internet attacks, and password attacks.

The attack chain. 

Case studies/examples of different types of attacks. Please elaborate more. A walk through of some of the high profile cyber-attacks that have occurred in the past few years, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks. 

Defensive case studies/examples.  

A variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks. A number of specific examples from the instructor’s personal and professional experience will be given, including taking a layered approach to security, and protecting against human threats.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

For more information, please write to hello@q8asia.com.sg

Industry Insights
Brochure Download


[Expert Led Digital Masterclass] Managing Internet of Things Security Risks

Overview

This 2-day Managing Internet of Things (IoT) Security Risks Masterclass provides delegates a strategic understanding on the new threats and paradigms emerging from IoT while guiding on the right approaches in handling such threats. Due to the nature of IoT and its ubiquity, security needs to be addressed in a fundamentally different way; the devices are no longer important, but their data is. Based on the zero-trust networking, assume breach and cattle-vs-pets paradigms, this Masterclass will help delegates look at IoT security in a whole different way. 

What you will learn from this Masterclass:

  • Recognise the new threats IoT pose for an enterprise
  • Identify the threats and limitations at the technical level
  • Integrate IoT security in your existing security management
  • Determine proper responses to IoT threats
  • Refocus your security efforts to stay in control
Who should attend
  • Corporate Business Continuity
  • Corporate Infrastructure
  • Information Security 

  • Information Security and Risk

  • Network administrators
  • Network Architecture
  • Network Security Systems
  • Network Services

  • Payment and Fraud
Security
  • Payment Systems & Risk
Group
  • Security Programme
  • Security
Information Security Policy
  • System Administration
Trainer

Armed with more than 30 years of experience in this industry, our Expert Trainer is an independent security consultant.  He has been involved in many large-scale projects including mobile security, banking security, industrial automation, covering technical and non-technical aspects.

Our trainer started as a technical security tester and has delivered courses on mobile security in Abu Dhabi, Kuala Lumpur, Singapore and Capetown. He has international experience in most European countries, the Caribbean, Asia and the Middle East.

He has also consulted a large number industries ranging from ministries of Dutch government, utilities companies, banking sectors, Europol, payment providers, and Dutch Telecom operators.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information to follow about the venue closer to the date of the course.

Industry Insights
Brochure Download


[Expert-Led Digital Masterclass] Intelligence Gathering in Today’s Digital Age

Overview

This course features four of our most popular courses for Intelligence, Security and Defence professionals in one single bundle:

  1. Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT)
  2. Human Intelligence (HUMINT) Techniques and Procedures
  3. Digital Surveillance Techniques
  4. Real World Surveillance Techniques

Highlights:

  • 4 modules, each module is taught over two days with more than 12 hours worth of content
  • Remote Access on the go, from your desktop or on your mobile device
  • On-demand Expert Knowledge and access to materials, software after each module
  • Certificate of Completion

What will you learn in this Masterclass?

  • MASTER the latest techniques in digital investigations.
  • ADOPT the latest cutting-edge tools in the  interception, disruption and exploitation skills for intelligence gathering work.
  • STRENGTHEN effective deployment techniques and procedures.
  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence
Who should attend?

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely.

Let us know if you have any questions by sending them to hello@q8asia.com.sg.

Brochure Download


AI Deception: Machine Learning in Adversarial Environments

AI Deception
Overview

This two-and-a-half-day hands-on masterclass starts with an overview of Artificial Intelligence (AI) algorithms and explores the threat model space of different AI
techniques. It then provides an in-depth analysis of different AI adversarial attacks including adversarial poisoning attacks, adversarial evasion attacks, adversarial
attacks against malware detection and differential privacy and model theft techniques.

The course is concluded with defense mechanisms to protect AI engines from adversarial attacks and reviews different testing techniques to identify vulnerabilities of different AI engines against adversarial learning techniques.

What you will learn from this Masterclass:

  • IDENTIFY the threat model space of different Artificial Intelligence (AI) techniques.
  • UNDERSTAND and ANALYSE different AI adversarial attacks.
  • LEARN defense mechanisms to protect AI engines from attacks.
  • REVIEW different testing techniques to identify vulnerabilities of different AI engines.
  • IDENTIFY critical AI usages within your organisation and your roadmap.
  • EXECUTE security modeling for AI usages (threats, adversaries, attack vectors).
  • BETTER understanding of secure incorporation of AI technology.
Who will attend
  • CEOs
  • CTOs
  • COOs
  • Chief Data Officers
  • Chief Information Officers
  • Chief Innovation Officers
  • Chief Digital Officers
  • CxOs (Analytics, Data, Information, Innovation, Technology)
  • Algorithms Engineers/Scientists
  • Scientists Engineers Developers
  • Software Engineers
  • VP’s/Directors/Heads of AI/Machine Learning/Data Science/Technology Innovation/Applied AI
Trainer

Expert Trainer has over 20 years of experience in innovating security algorithms in Data Science & Cryptography and 20 patented inventions in algorithms, cyber-security, and cryptography and data science. An expert in is harnessing Artificial Intelligence and Machine Learning technology to cyber-security applications.

In the last 12 years, he has held leadership positions in research and innovation groups, including management of up to 16 research/innovation/data science/cryptography/security experts.

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


Risk and Threat Assessment for Security Projects

Overview

Through this workshop, attendees will learn unique quantitative and qualitative methodologies for risk and threat assessment that is fully compliant with the strictest international standards and provides Risk Assessments Planning and the foundation for Implementation of security solutions for:

  • Countries and Corporations
  • Critical Infrastructures and Assets
    - Information Security
    - Maritime and Airport Security
  • Mega Events
  • VIP Installations and Dignitaries

What you will learn from this Masterclass:

  • EXPLORE methodological tools which enable you to track and analyse possible security risks of critical infrastructure.
  • IDENTIFY the major threats and vulnerabilities using an accurate structured procedure.
  • ANALYSE "real life" worldwide security events.
  • MASTER the innovative method of "Red Team" Simulation.
  • RECEIVE theoretical and practical training using the learnt methodology.
Who will attend
  • Professionals engaged in security planning.
  • Security officers and security experts of critical infrastructure and facilities in government organisations, public and commercial sectors.
  • Intelligence officials in security Governmental and Public organisations as well as the private sectors.
Trainer

Expert Trainer is a retired Colonel from the Israeli Defense Forces – IDF with practical and operative knowledge in research and analysis, risk and threat assessment.
Expert Trainer designed, managed and implemented a variety of complex projects and solutions
for Intelligence, Counter Terrorism, Command and Control (C&C). He is also a research fellow in the ICT - International Institute for Counter Terrorism and has won creative thinking award: Director of Intelligence – IDF (Israel Defense Force).

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


Managing Internet of Things (IoT) Security Risks

Managing IoT - September 2019_1
Overview

This 2-day Managing Internet of Things (IoT) Security Risks Masterclass provides delegates a strategic understanding on the new threats and paradigms emerging from IoT while guiding on the right approaches in handling such threats. Due to the nature of IoT and its ubiquity, security needs to be addressed in a fundamentally different way; the devices are no longer important, but their data is. Based on the zero-trust networking, assume breach and cattle-vs-pets paradigms, this Masterclass will help delegates look at IoT security in a whole different way. 

What you will learn from this Masterclass:

  • Recognise the new threats IoT pose for an enterprise
  • Identify the threats and limitations at the technical level
  • Integrate IoT security in your existing security management
  • Determine proper responses to IoT threats
  • Refocus your security efforts to stay in control
Who will attend
  • Corporate Business Continuity
  • Corporate Infrastructure
  • Information Security 

  • Information Security and Risk

  • Network administrators
  • Network Architecture
  • Network Security Systems
  • Network Services

  • Payment and Fraud
Security
  • Payment Systems & Risk
Group
  • Security Programme
  • Security
Information Security Policy
  • System Administration
Trainer

Armed with more than 30 years of experience in this industry, Expert Trainer is an independent security consultant. Expert Trainerhas been involved in many large-scale projects including mobile security, banking security, industrial automation, covering technical and non-technical aspects.

Expert Trainer started as a technical security tester and has delivered courses on mobile security in Abu Dhabi, Kuala Lumpur, Singapore and Capetown. He has international experience in most European countries, the Caribbean, Asia and the Middle East.

Expert Trainer has consulted a large number industries ranging from ministries of Dutch government, utilities companies, banking sectors, Europol, payment providers, and Dutch Telecom operators.

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download