PROGRAMME


Day 1 | 6 Nov 2017

TIME PROGRAM
OIC-CERT Board Meeting No. 5/2017 (Close Session)
0900 am – 1035 am OIC-CERT Board Meeting
1035 am – 1045 am Morning Break
1045 am – 1200 pm OIC-CERT Board Meeting
1200 pm – 1400 pm Lunch
   
OIC-CERT Strategic Matters (Close Session)
1400 pm – 1700 pm Discussions on the OIC-CERT Strategic Matters
  End of Program

Day 2 | 7 Nov 2017

TIME PROGRAM
OIC-CERT Annual Conference 2017 (Open Session)
Theme: Uncovering Future Threats
The ever-changing cyber threats are constantly a concern for mankind. It is pertinent to uncover the threats looming on the horizon and making sure all levels of the organisations are well prepared to face any circumstances. With the right focuses and efforts, the effects and damages caused by these threats can be minimized.
0900 am – 0935 am Arrival of VIPs/VVIPs
0935 am – 0940 am Welcoming Address
Mr. Mursal Valiyev,
Deputy Head of Special State Protection Service & Head of Special Communication and Information Security State Agency
0940 am – 0945 am Speech
Eng. Badar Ali Said Al Salehi,
Chair, Organization of Islamic Cooperation – Computer Emergency Response Team (OIC-CERT) / Director General, Oman National CERT (OCERT)
0945 am – 0950 am Speech
Mr. Wajdi Alquliti,
Director of IT Department, Organisation of Islamic Cooperation (OIC)
0950 am – 1000 am Keynote Address
Mr. Atesh Rzayev,
Technical Director, Delta Telecom Ltd
1000 am – 1030 am Morning Break / Press Conference
1030 am – 1130 am

Session 1: Hidden Figures : Origin of the Threats (Management)
The ever-changing cyber threats are constantly a concern for mankind. It is pertinent to uncover the threats looming on the horizon and making sure all levels of the organisations are well prepared to face any circumstances. With the right focuses and efforts, the effects and damages of these threats can be minimized. This session will discuss the threats origin from different sources including social media.

Moderator: General Tan Sri Dato' Seri Panglima Mohd Azumi Bin Mohamed (Retired), CyberSecurity Malaysia
Speaker 1: Mr. Tural Mammadov, Azerbaijan Government CERT (CERT.GOV.AZ)
Speaker 2: Mr. Ammar Jafri, Pakistan Information Security Association (PISA-CERT)
Speaker 3: Mr. Jacomo Piccolini, Team Cymru

1130 am – 1230 pm

Session 2: Against the Dark Arts (Technical)
Cyber criminals use various technologies to attack security vulnerabilities that exist on various platforms such as the mobile and application based. The Bitcoin and Block Chain technology are also fast emerging as the new financial platform which posed a hidden danger to users. Existing cyber security defences focus on constructing a perimeter around the potential victim and identifying the payload in order to stop attacks from getting through. This session will discuss the different approaches in mitigating cyber attacks such as focusing on the attacker’s history, behaviour, delivery mechanism, and infrastructure.

Moderator: Dr. Muhammad Salman Saefuddin, Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center (Id-SIRTII/CC)
Speaker 1: Professor Dr. Mohsen Kahani, Ferdowsi University of Mashhad – Computer Emergency Response Team (FUM-CERT)
Speaker 2: Mr. Necati Ertuğrul, MAY Cyber Technologies
Speaker 3: Mr. Deng Rui, Videntifier Technologies EHF.

1230 pm – 1400 pm Lunch
1400 pm – 1500 pm

Session 3: Yellow Brick Road (Policy and Process)
Cyber security road into the future might favour criminals as the internet technology such as cloud computing and Internet of Things provide platforms for more threats. New challenges might emerge evolving cyber threats that will blur the distinction between cyber and physical attacks entailing psychological harm. This session will discuss the need for new governance and security solutions in curtailing these new challenges.

Moderator: Mr. Shamsul Bahri Kamis, Brunei Computer Emergency Response Team (BruCERT)
Speaker 1: Mr. Thomas Schreck, FIRST
Speaker 2: Mr. Artyom Sinitsyn, Microsoft
Speaker 3: Mr. Stanislas De Maupeou, Thales

1500 pm – 1515 pm Afternoon Break
1515 pm – 1615 pm

Session 4: Shedding the Lights (Management / Technical / Policy and Process)
What would be the best way to uncover future threats? Will sharing cyber threat intelligence drastically improve cyber defence methods within organisations? Will real time advisories be possible? How sophisticated the attackers are and how fancy their malware was? This session will wrap up the issues discussed during the day by exploring the possibility of sharing information to overcome threats in the future.

Moderator: Mr. Wajdi H. Al-Quliti, Organization of Islamic Cooperation (OIC)
Speaker 1: Prof. Datuk Dr. Shahrin Sahib@Sahibuddin, Technical University of Malaysia Malacca (UTeM)
Speaker 2: Mr. Huzeyfe ÖNAL, BGA Bilgi Güvenliği A.Ş.
Speaker 3: Mr. Helmi Rais, Alliacom

1615 pm – 1630 pm Closing Remark
1630 pm End of Program

Day 3 | 8 Nov 2017

TIME PROGRAM
OIC-CERT Workshop (Open Session)
0900 am – 1000 am

OIC-CERT Workshop 1 - National Frameworks for Cybersecurity Education
One of the biggest security challenges is that different senior management roles view cyber security from different perspectives, and have different priorities. This can result in a sort of decision-making “Security Bermuda Triangle” sort of decision making. To overcome the issues, this workshop will act as an exercise involving all parties from the private and government departments into a simulated business environment facing a series of unexpected cyber threats while trying to maximize profit and maintain confidence. A comprehensive interactive training platform with specific requirements and cyber security policies is used to simulate the cyber issues where it will boost training efficiency at all levels of the organisations.

Instructor: Kaspersky Lab

1000 am – 1030 am Morning Break
1030 am – 1200 pm OIC-CERT Workshop 1 (Con’t)
1200 pm – 1400 pm Lunch
1400 pm – 1700 pm

OIC-CERT Workshop 2 - Utilizing Endpoint Analysis Data on Big Data Platforms to Discover Threats Against Large Scale Enterprises
Identifying Information leakages in large scale enterprises are increasingly challenging because espionage acts are mostly executed on legitimate applications without a known signature. New trends like BYOD are also increasing diversity of network traffic patterns for corporate networks. In this workshop, methods for endpoint and log data analysis will be evaluated to identify and track malicious software in large scale enterprises. Also, advantages of using an open source big data platform like Elasticsearch will be demonstrated.

Instructor: MAY Cyber Technologies

1500 pm – 1530 pm Afternoon Break
1530 pm – 1700 pm OIC-CERT Workshop 2 (Cont’d)
1700 pm End of Program

Day 4 | 9 Nov 2017

TIME PROGRAM
Forum Session at ADA University and Tour of Baku City
0930 am – 1000 am Welcome Statement
Mr. Fariz Ismailzade, Vice Rector of ADA University
1030 am – 1230 pm

Transforming Education with Technology
In this session, the panellists will present an update of education on Information Communication Technologies

Moderator: Dr. Araz Yusubov, School of IT & Engineering of ADA University, Azerbaijan ACM Chapter
Panellist 1 : Dr. Abzetdin Adamov, School of IT & Engineering, ADA University, IEEE Azerbaijan Computer Society Chapter
Panellist 2 : Mr. Rashad Aliyev, School of IT & Engineering, ADA University
Panellist 3 : Mr. Rahid Alekberli, Chief Information Officer, ADA University
Panellist 4 : Mr. Rashad Aliyev, PENTESTON, Hackathon Azerbaijan
Panellist 5 : Ms. Ellada Mustafayeva, Cyber Security Center under the Ministry of Transport, Communication and High Technologies

1230 pm – 1245 pm

-  Closing Ceremony
-  Group Photo

1245 pm – 1400 pm Lunch
1400 pm – 1700 pm Tour of Baku City
1700 pm End of Program