EN

Program

Program

December 3 (Wed.)

December 3 (Wed.)

December 3 (Wed.)

09:50

10:00

09:50

10:00

09:50

10:00

Opening

Opening

Opening

10:00

|

10:35

10:00

|

10:35

10:00

10:35

APT

APT

APT

[Keynote] APT Threat Landscape in APAC 2025

[Keynote] APT Threat Landscape in APAC 2025

[Keynote] APT Threat Landscape in APAC 2025

Charles Li

TeamT5

Charles Li

TeamT5

Charles Li

TeamT5

10:50

|

11:25

10:50

|

11:25

10:50

11:25

APT

APT

APT

Unmasking MetaRAT: A New PlugX Variant in China-Linked APT Operation

Unmasking MetaRAT: A New PlugX Variant in China-Linked APT Operation

Unmasking MetaRAT: A New PlugX Variant in China-Linked APT Operation

Yoshihiro Ishikawa

LAC Co., Ltd.

Takuma Matsumoto

LAC Co., Ltd.

Yoshihiro Ishikawa

LAC Co., Ltd.

Takuma Matsumoto

LAC Co., Ltd.

Yoshihiro Ishikawa

LAC Co., Ltd.

Takuma Matsumoto

LAC Co., Ltd.

11:40

|

12:15

11:40

|

12:15

11:40

12:15

APT

APT

APT

Exploring Timeline and Threat Actor Behind Compromised Ivanti Devices

Exploring Timeline and Threat Actor Behind Compromised Ivanti Devices

Exploring Timeline and Threat Actor Behind Compromised Ivanti Devices

Fyodor Yarochkin

Trend Micro

Fyodor Yarochkin

Trend Micro

Fyodor Yarochkin

Trend Micro

12:15

13:25

12:15

13:25

12:15

13:25

Lunch Break

Lunch Break

Lunch Break

13:25

|

14:00

13:25

|

14:00

13:25

14:00

Incident Response

Incident Response

Incident Response

Incident Response at the Edge: Unmasking VPN Breaches

Incident Response at the Edge: Unmasking VPN Breaches

Incident Response at the Edge: Unmasking VPN Breaches

Greg Chen

TeamT5

Greg Chen

TeamT5

Greg Chen

TeamT5

Name

Company

Name

Company

14:15

|

14:50

14:15

|

14:50

14:15

14:50

APT

APT

APT

Exploiting Trust: When a Trusted Security Solution Becomes a DPRK Trojan Horse

Exploiting Trust: When a Trusted Security Solution Becomes a DPRK Trojan Horse

Exploiting Trust: When a Trusted Security Solution Becomes a DPRK Trojan Horse

Jeonggak Lyu

The Korea Financial Security Institute (FSI)

Gyuyeon Kim

The Korea Financial Security Institute (FSI)

Sungwook Jang

The Korea Financial Security Institute (FSI)

Jeonggak Lyu

The Korea Financial Security Institute (FSI)

Gyuyeon Kim

The Korea Financial Security Institute (FSI)

Sungwook Jang

The Korea Financial Security Institute (FSI)

Jeonggak Lyu

The Korea Financial Security Institute (FSI)

Gyuyeon Kim

The Korea Financial Security Institute (FSI)

Sungwook Jang

The Korea Financial Security Institute (FSI)

14:50

15:15

14:50

15:15

14:50

15:15

Tea Break

Tea Break

Tea Break

15:15

|

15:50

15:15

|

15:50

15:15

15:50

APT

APT

APT

CamoFei Meets the Tali

CamoFei Meets the Tali

CamoFei Meets the Tali

Julian-Ferdinand Vögele

Recorded Future

Still Hsu

TeamT5

Aleksandar Milenkoski

SentinelLabs

Julian-Ferdinand Vögele

Recorded Future

Still Hsu

TeamT5

Aleksandar Milenkoski

SentinelLabs

Julian-Ferdinand Vögele

Recorded Future

Still Hsu

TeamT5

Aleksandar Milenkoski

SentinelLabs

16:05

|

16:35

16:05

|

16:35

16:05

16:35

Information Warfare

Information Warfare

Information Warfare

Collaborative Manipulation: China-Russia Information Warfare Targeting Japan

Collaborative Manipulation: China-Russia Information Warfare Targeting Japan

Collaborative Manipulation: China-Russia Information Warfare Targeting Japan

Wataru Suyama

Constella Security Japan inc.

Wataru Suyama

Constella Security Japan inc.

Wataru Suyama

Constella Security Japan inc.

Name

Company

Name

Company

December 4 (Thur.)

December 4 (Thur.)

December 4 (Thur.)

10:00

|

10:35

10:00

|

10:35

10:00

10:35

Cybercrime

Cybercrime

Cybercrime

Data Scraping: the Threat Landscape and Best Practices

Data Scraping: the Threat Landscape and Best Practices

Data Scraping: the Threat Landscape and Best Practices

Oded Anderman

Meta Platforms Inc.

Oded Anderman

Meta Platforms Inc.

Oded Anderman

Meta Platforms Inc.

TeamT5

Company

Name

Company

10:50

|

11:25

10:50

|

11:25

10:50

11:25

Cybercrime

Cybercrime

Cybercrime

The Modern “Pump-and-Dump” Scheme Targeting the Securities Brokerage Industry

The Modern “Pump-and-Dump” Scheme Targeting the Securities Brokerage Industry

The Modern “Pump-and-Dump” Scheme Targeting the Securities Brokerage Industry

Michael Ching

DarkLab

Ruth Ng

DarkLab

Danni Evans

DarkLab

Michael Ching

DarkLab

Ruth Ng

DarkLab

Danni Evans

DarkLab

Michael Ching

DarkLab

Ruth Ng

DarkLab

Danni Evans

DarkLab

11:40

|

12:15

11:40

|

12:15

11:40

12:15

Incident Response

Incident Response

Incident Response

ShortFix: When Social Video Platforms Become Infostealer Delivery Channels

ShortFix: When Social Video Platforms Become Infostealer Delivery Channels

ShortFix: When Social Video Platforms Become Infostealer Delivery Channels

Satoshi Kamekawa

ITOCHU Cyber & Intelligence Inc.

Satoshi Kamekawa

ITOCHU Cyber & Intelligence Inc.

Satoshi Kamekawa

ITOCHU Cyber & Intelligence Inc.

Name

Company

Name

Company

12:15

13:25

12:15

13:25

12:15

13:25

Lunch Break

Lunch Break

Lunch Break

13:25

|

14:00

13:25

|

14:00

13:25

14:00

Cybercrime

Cybercrime

Cybercrime

Tracking Criminal Activity in I2P: Evidence and Lessons from Real-World Monitoring

Tracking Criminal Activity in I2P: Evidence and Lessons from Real-World Monitoring

Tracking Criminal Activity in I2P: Evidence and Lessons from Real-World Monitoring

Lorenzo Nicolodi

Microlab.red

Lorenzo Nicolodi

Microlab.red

Lorenzo Nicolodi

Microlab.red

Name

Company

Name

Company

14:15

|

14:50

14:15

|

14:50

14:15

14:50

Cybercrime

Cybercrime

Cybercrime

Scaling East: Russian-Speaking Cybercrime Operations, Infrastructure, and AI-Enabled Growth

Scaling East: Russian-Speaking Cybercrime Operations, Infrastructure, and AI-Enabled Growth

Scaling East: Russian-Speaking Cybercrime Operations, Infrastructure, and AI-Enabled Growth

Rachelle Goddin

Team Cymru

Rachelle Goddin

Team Cymru

Rachelle Goddin

Team Cymru

Name

Company

Name

Company

14:50

15:15

14:50

15:15

14:50

15:15

Tea Break

Tea Break

Tea Break

15:15

|

15:50

15:15

|

15:50

15:15

15:50

Cybercrime

Cybercrime

Cybercrime

Tracking Network Infrastructure behind Industrial-Scale scams

Tracking Network Infrastructure behind Industrial-Scale scams

Tracking Network Infrastructure behind Industrial-Scale scams

Swapneel Patnekar

Shreshta IT Technologies Pvt. Ltd.

Swapneel Patnekar

Shreshta IT Technologies Pvt. Ltd.

Swapneel Patnekar

Shreshta IT Technologies Pvt. Ltd.

Name

Company

Name

Company

16:05

|

16:40

16:05

|

16:40

16:05

16:40

Incident Response

Incident Response

Incident Response

Incident Case Studies and Keys to Rapid Response

Incident Case Studies and Keys to Rapid Response

Incident Case Studies and Keys to Rapid Response

Hajime Yanagishita

MACNICA, Inc.

Taro Imai

MACNICA, Inc.

Hajime Yanagishita

MACNICA, Inc.

Taro Imai

MACNICA, Inc.

Hajime Yanagishita

MACNICA, Inc.

Taro Imai

MACNICA, Inc.

Name

Company