Mr. Harin Fernando
Minister of Telecommunication and Digital Infrastructure
Guest of Honour
H.E. Mr. Y.K. Sinha
Indian High Commissioner to Sri Lanka
Vice Admiral (Rtd.) Shekhar Sinha
Indian Infosec Consortium
Mr. Lal Dias
Sri Lanka CERT-CC
Dr. Sankalpa Gamwarige
Director and Head Technology Forum
Prof. Sudharshan Seneviratne
Former High Commissioner of Sri Lanka to India
Panel Discussion for Corporates
Cyber Security should be ‘business back’ or ‘technology forward’
Layers-7 Seguro Consultoria
Mr. Wasantha Perera
Head of Information Security and Compliance
Colombo Stock Exchange
Mr. Channa de Silva
Chief Executive Officer
Ms. Shalini Ratwatte
Microsoft's South East Asia
Mr. Hisham Nazeem
Head of IT GRC, Head of Business Systems, Strategic Group IT
John Keells Holdings PLC
CEO & MD at Bharti Airtel Lanka Pvt Ltd
Darknet promises anonymity and thus illusions of security for contraband activities.However, this illusion holds good only if the other determinants of equation maintain a specific state. This presentation would analyze some of the many effective ways of breaking anonymity of people on darkness - using interesting audio files or using cross domain on tor n or using siebel attacks and some more and if time permits we would analyze how to deanonymize the so called secure bitcoin transactions.
Sahir Hidayatullah & Raviraj Doshi
CEO, Smokescreen | CTO, Smokescreen
This talk will analyse the cyber kill-chain, explaining how deception can be used at each layer of the chain. The speakers will highlight the benefits of how deception technology gives organizations a way to reliably detect targeted attacks in real-time, without false positives, and with far less resources than typical defences employed today. In the presentation they will deconstruct attacks of the last few years to develop a model of ‘full stack deception’ that can lure even the most skilled attackers away from critical assets into a virtual world, where their motives are revealed.
Security Researcher, Co-founder Null - Open Security
In this presentation I will share the recent case studies where the backdoors in crypto systems of the IT Infrastructures have shaked the world. These case studies have proved that we can not take our crypto-systems for granted and now we need to closely test, audit and secure our crypto systems than before. Next We will try to understand various crypto systems in our environment & How they are backdoored. Highlight of the talk - the innovative ways to detect the flaws in our crypto system with specially designed tests and audits. I will also share and advisory on understanding of Crypto related Security Incidents & how to respond to them.
Osanda Malith Jayathissa
Independent Security Researcher and Penetration Tester
This presentation would be on the recent research of mine regarding how the BIGINT data type in MySQL can lead to SQL Injection attacks. The speaker will be demonstrating and explaining live injection examples.
CEO & Founder, ForensicsGuru
In an Information age, evidence resides in digital format across a multitude of devices, be it networks, computers, phones or hand held devices. This session provides an insight on the kind of evidence that you can extract from different types of media and the different points to consider when we do a deep dive into digital data. There will also be deep insights with discussions of actual cases.