EN

Agenda

Agenda

December 3 (Wed.)

09:50

10:00

Opening

10:00

|

10:35

10:00

10:35

APT

APT Threat Landscape in APAC 2025

Charles Li

TeamT5

Charles Li

TeamT5

10:50

|

11:25

10:50

11:25

APT

Unmasking MetaRAT: A New PlugX Variant in China-Linked APT Operation

Yoshihiro Ishikawa

LAC Co., Ltd.

Takuma Matsumoto

LAC Co., Ltd.

Yoshihiro Ishikawa

LAC Co., Ltd.

Takuma Matsumoto

LAC Co., Ltd.

11:40

|

12:15

11:40

12:15

APT

Exploring Timeline and Threat Actor Behind Compromised Ivanti Devices

Fyodor Yarochkin

Trend Micro

Fyodor Yarochkin

Trend Micro

12:15

13:25

Lunch Break

13:25

|

14:00

13:25

14:00

Incident Response

Incident Response at the Edge: Unmasking VPN Breaches

Greg Chen

TeamT5

Sharon Liu

TeamT5

Greg Chen

TeamT5

Sharon Liu

TeamT5

14:15

|

14:50

14:15

14:50

APT

Exploiting Trust: When a Trusted Security Solution Becomes a DPRK Trojan Horse

Jeonggak Lyu

The Korea Financial Security Institute (FSI)

Gyuyeon Kim

The Korea Financial Security Institute (FSI)

Sungwook Jang

The Korea Financial Security Institute (FSI)

Jeonggak Lyu

The Korea Financial Security Institute (FSI)

Gyuyeon Kim

The Korea Financial Security Institute (FSI)

Sungwook Jang

The Korea Financial Security Institute (FSI)

14:50

15:15

Tea Break

15:15

|

15:50

15:15

15:50

APT

CamoFei Meets the Taliban

Julian-Ferdinand Vögele

Recorded Future

Still Hsu

TeamT5

Aleksandar Milenkoski

SentinelLabs

Julian-Ferdinand Vögele

Recorded Future

Still Hsu

TeamT5

Aleksandar Milenkoski

SentinelLabs

16:05

|

16:40

16:05

16:40

Information Warfare

Collaborative Manipulation: China-Russia Information Warfare Targeting Japan

Wataru Suyama

Constella Security Japan inc.

Wataru Suyama

Constella Security Japan inc.

December 4 (Thur.)

09:50

10:00

Opening

10:00

|

10:35

10:00

10:35

Cybercrime

Data Scraping: The Threat Landscape and Best Practices

Oded Anderman

Meta Platforms Inc.

Oded Anderman

Meta Platforms Inc.

10:50

|

11:25

10:50

11:25

Cybercrime

The Modern “Pump-and-Dump” Scheme Targeting the Securities Brokerage Industry

Michael Ching

DarkLab

Ruth Ng

DarkLab

Danni Evans

DarkLab

Michael Ching

DarkLab

Ruth Ng

DarkLab

Danni Evans

DarkLab

11:40

|

12:15

11:40

12:15

Incident Response

ShortFix: When Social Video Platforms Become Infostealer Delivery Channels

Satoshi Kamekawa

ITOCHU Cyber & Intelligence Inc.

Satoshi Kamekawa

ITOCHU Cyber & Intelligence Inc.

12:15

13:25

Lunch Break

13:25

|

14:00

13:25

14:00

Cybercrime

Tracking Criminal Activity in I2P: Evidence and Lessons from Real-World Monitoring

Lorenzo Nicolodi

Microlab.red

Lorenzo Nicolodi

Microlab.red

14:15

|

14:50

14:15

14:50

Cybercrime

Scaling East: Russian-Speaking Cybercrime Operations, Infrastructure, and AI-Enabled Growth

Rachelle Goddin

Team Cymru

Rachelle Goddin

Team Cymru

14:50

15:15

Tea Break

15:15

|

15:50

15:15

15:50

Cybercrime

Tracking Network Infrastructure Behind Industrial-Scale Scams

Swapneel Patnekar

Shreshta IT Technologies Pvt. Ltd.

Swapneel Patnekar

Shreshta IT Technologies Pvt. Ltd.

16:05

|

16:40

16:05

16:40

Incident Response

Incident Case Studies and Keys to Rapid Response

Hajime Yanagishita

MACNICA, Inc.

Taro Imai

MACNICA, Inc.

Hajime Yanagishita

MACNICA, Inc.

Taro Imai

MACNICA, Inc.