Haven’t decided yet to register for DECODE 2021? Check out the A-List of keynote speakers during the 2-day virtual conference set November 10-11.

Decode-2021-Approved-Keynote-Speakers-v2-White

Join Trend Micro’s Threat Research Engineer Janus Agcaoili as he presents data on the REvil ransomware’s recent attacks, some findings regarding its attack patterns, and tools that it uses to accomplish its routines.

251101969-1563838777288903-5957769953621721960-n

OSINT Intelligence Analyst Ritu Gill will be discussing the factors to consider with online privacy, how people can be compromised online, and the risk management strategies for staying secure.

250869931-1563867233952724-2295622396222346553-n

Join Drexx Laggui of the Department of Information and Communications Technology as he talks about how digital evidence submitted for examination should be maintained in such a way that the integrity of the data is preserved.

250802185-1563869427285838-9166944370584211634-n

Assistant Chief for the Cyber Security Unit of the PNP-ACG PLtCol John Paul P. Ferrancullo will be detailing how the PNP-ACG works in creating a safer cyber environment to enforce its mission.

251080554-1563942507278530-2298816630417573613-n

Join Director and Data Scientist for Trend Micro, Dr. Jon Oliver as he presents an overview of both technical and legal approaches and recommendations to privacy protection.

251568473-1563942890611825-1549085794012513280-n

Trend Micro’s Senior Threat Researcher Matsukawa Bakuei discusses how fraudulent affiliates and fraudulent ad network vendors can turn Browser Notification Spam into Browser Notification Scam.

253660037-1563944293945018-6442941207692794549-n

Delivery Head of ECCI International Swapnil Bora discusses the National Institute of Standards and Technology (NIST) Cybersecurity Framework 1.1 that provides voluntary guidance for enterprises to better manage and mitigate cybersecurity risk by listing organization-specific and customizable activities.

251853097-1564561670549947-7602389287258229170-n

Join Trend Micro’s Senior Threat Researcher and Threat Hunter Lala Manly as she talks about how cyber-criminals exploit the human factor – our traits and fears – to circumvent cybersecurity.

251719654-1564586650547449-3272592648078358859-n

Trend Micro’s Threat Researcher Jaromir Horejsi talks about how the entire infection chain of the exploit kit, including the banking trojan’s internal functions, such as anti-analysis, persistence, encryption of the configuration files, form grabbing, and web injects.

251663219-1564609210545193-6001587945357506446-n

Open source intelligence (OSINT) specialist at QOMPLX, Steven Harris talks about how we can conduct external reconnaissance on their own companies to learn how to improve their cyber security.

251827831-1564606703878777-8677787269522904491-n

View the full schedule below.

251600245-1563159564023491-4154284650704068344-n
250824529-1563159657356815-2935057776094666264-n

Haven’t registered yet? Register for FREE at bit.ly/DECODEPH2021

Facebook Comments