Featured Speakers - Afternoon

2.00 pm - Guarding the Gateways: Navigating Modern Supply Chain Threats

Dr Yuriy Bulygin, CEO & Founder, Eclypsium

Eclypsium_Yuriy Bulygin.jpeg

Dr. Yuriy Bulygin is the CEO and founder of Eclypsium, the digital supply chain security company. Eclypsium’s award winning Supply Chain Security Platform protects enterprises’ critical hardware, firmware, and software. Prior to Eclypsium, Dr. Yuriy was Chief Threat Researcher and led the Microprocessor Security Analysis team at Intel Corporation, as well as the Advanced Threat Research team at Intel Security. He is also the creator of CHIPSEC, the popular open-source firmware and hardware supply chain security assessment framework.

Yuriy’s passion for cybersecurity emerged after attending a lecture in cryptography by Professor Gabidulin and reading The Codebreakers by David Kahn. This pulled him to study cryptography and eventually teach security. When he joined INTEL, he found that the complexity of modern computers is far beyond what he knew about and it is constantly increasing. There are layers upon layers of software code in every piece of equipment, in every device we rely on. He spent over a decade discovering security vulnerabilities in all these systems and building mitigations for the X86 ecosystem. This eventually led him to create the open source CHIPSEC framework to explore this complexity of modern systems.

When others started using it to find vulnerabilities, discover compromised firmware, or just poke around hardware systems, Yuriy founded Eclypsium with his co-founder, Alex Bazhaniuk. Since then, Eclypsium has been on a mission to protect devices from supply chain risks.

 

2.30 pm - The View from Google Safe Browsing: Insights from Protecting 5 billion Devices

Kelly Hope Harrington, Senior Staff Engineer, Safe Browsing, Google

Google_Kelly Hope Harrington

Kelly Hope Harrington is a Senior Staff Software Engineer on the Safe Browsing team at Google, where she is the technical lead for malware detection. She has over ten years of experience working on protections against web-based threats like malware, unwanted software, phishing, and social engineering. Kelly received a B.S. in Computer Science from Carnegie Mellon University.

 

3.00 pm - A Technical Perspective on Android Scam Malware

Ng Chang Yue, Principal Technical Specialist, CSIT

CSIT_Ng CY

Chang Yue has over a decade of experience working in the cybersecurity and vulnerability research domain, for various enterprise and mobile systems. Over the years, he has led teams that performed research spanning a range of digital technologies, to develop solutions that serve Singapore’s cyber defence needs.

 

3.45 pm - Security Assessments for Generative AI

Dr Christopher W. Perr, Director, Offensive Security, Oracle

Oracle CW Perr

C.W. Perr, PhD, is the director of Offensive Security for Oracle where he leads a team of security engineers and troublemakers who toil to identify risks and vulnerabilities in Oracle products. He works closely with partner teams within Oracle to constantly raise the security bar. Before Oracle, C.W. was a 2005 Computer Science graduate of the United States Air Force Academy where he went on to serve as a Space and Missile officer in the United States Air Force. C.W. left active duty as a Captain to pursue academics at Auburn University where he obtained a Master’s in Software Engineering and shortly after a PhD in Industrial and Systems Engineering. His PhD thesis centered on cybersecurity and SCADA systems. After graduating, C.W. worked at Sandia National Laboratory where he conducted cybersecurity research in “service to the national interest”. C.W.’s unique background has brought him to a position where he enjoys using his experiences as a leader, researcher, and security engineer daily.

 

4.15 pm - Titan Code Analysis: Vulnerability Discovery with Large Code Models

AP Shar Lwin Khin, Associate Professor in Computer Science (Practice), SMU

crop_SMU_SHAR Lwin Khin

Shar Lwin Khin is an Associate Professor of Computer Science (Practice) at the School of Computing and Information Systems at SMU and is the co-PI for the Titan Code Analysis project, alongside Professor David Lo and Assistant Professor Ouh Eng Lieh. Shar graduated with a PhD from Nanyang Technological University in 2014. He teaches Web Application and Cybersecurity courses at Bachelor and Master levels at SMU and has worked on multiple industry projects as a postdoc at the Interdisciplinary Centre for Security, Reliability and Trust (SnT), the University of Luxembourg.

Frank Liauw, Lead Cybersecurity Engineer, GovTech

Govtech_Frank Liauw

Frank Liauw is a Lead Cybersecurity Engineer from GovTech Cybersecurity Group (CSG) Advanced Cybersecurity Capabilities (ACC). Frank leads the Research & Innovation Team that identify non-obvious cyber problems, explore cyber implications of emerging technologies, innovate solutions and re-engineer processes for greater effectiveness.