EVENT PROGRAMME
OPENING CEREMONY PROGRAMME FOR BRUNEI CYBER SECURITY CONFERENCE (CYSEC) 2025
7:45 AM | Arrival and Registration of CySec 2025 Participants, Speakers & Guests |
---|---|
8:30 AM | Arrival of Invited Guest (Government Officials, Corporate Officials, and Diplomats) |
9:00 AM | Arrival of the Guest of Honour Yang Berhormat, Pengiran Dato Seri Setia Shamhary bin Pengiran Dato Paduka Haji Mustapha, Minister of Transport and Infocommunications as the Minister-in-charge of Cybersecurity |
9:05 AM | Recital of Surah Al-Fatihah |
9:10 AM | Opening Remarks by Shamsul Bahri bin Haji Kamis, Interim Commissioner of Cyber Security Brunei (CSB) |
9:15 AM | Opening Address by the Guest of Honour |
9:25 AM | Official Launch of Cyber Security Conference 2025 (CySec 2025) by the Guest of Honour |
9:35 AM | Exchanging of Memorandums of Understanding (MOUs) Certificate Presentation Featured Speech by Ir Dr Megat Zuhairy Megat Tajuddin Chief Executive National Cyber Security Agency (NACSA), Malaysia |
10:00 AM | Guest of Honour tours exhibition booths Group Photo Session with Guest of Honour (Songket Hall) |
OPENING CEREMONY PROGRAMME FOR BRUNEI CYBER SECURITY CONFERENCE (CYSEC) 2025
7:45 AM | Arrival and Registration of CySec 2025 Participants, Speakers & Guests |
---|---|
8:30 AM | Arrival of Invited Guest (Government Officials, Corporate Officials, and Diplomats) |
9:00 AM | Arrival of the Guest of Honour Yang Berhormat, Pengiran Dato Seri Setia Shamhary bin Pengiran Dato Paduka Haji Mustapha, Minister of Transport and Infocommunications as the Minister-in-charge of Cybersecurity |
9:05 AM | Recital of Surah Al-Fatihah |
9:10 AM | Opening Remarks by Shamsul Bahri bin Haji Kamis, Interim Commissioner of Cyber Security Brunei (CSB) |
9:15 AM | Opening Address by the Guest of Honour |
9:25 AM | Official Launch of Cyber Security Conference 2025 (CySec 2025) by the Guest of Honour |
9:35 AM | Exchanging of Memorandums of Understanding (MOUs) Certificate Presentation Featured Speech by Ir Dr Megat Zuhairy Megat Tajuddin Chief Executive National Cyber Security Agency (NACSA), Malaysia |
10:00 AM | Guest of Honour tours exhibition booths Group Photo Session with Guest of Honour (Songket Hall) |
CONFERENCE
SUTRA HALL | VIP HALL | |
---|---|---|
10:30 AM | Title: Automating Digital Investigation: A Paradigm Shift with Open-Source tool and AI
Presenter: Norazmi Hj Serudin | Cyber Security Brunei (CSB) More info ![]() Norazmi Hj Serudin Head of National Digital Forensics Lab | Cyber Security Brunei (CSB) Conference Synopsis: One of the most significant challenges in modern digital forensics is managing the exponential growth of digital artifacts. As the volume of data from various sources continues to escalate, traditional investigative methodologies are becoming increasingly inefficient and susceptible to oversight.
Leveraging the application of open-source tools and artificial intelligence to automate key stages of the digital investigation lifecycle. The integration of sophisticated AI models serves to streamline data processing, enhance the speed of analysis, and significantly improve the accuracy of forensic findings. This shift from a human-centric to a technology-assisted model not only expedites case resolution but also enables forensic analysts to concentrate on complex reasoning and strategic insights as opposed to repetitive, labor-intensive tasks. | Title: Cybersecurity and Data Sovereignty in the Cloud Presenter: Victor Neo | Oracle Sponsor by: VSTECS More info ![]() Victor Neo Brunei Country Manager | Oracle Corporation Conference Synopsis: This presentation explores the evolving landscape of cybersecurity and data sovereignty in an increasingly cloud-centric world. It begins by outlining the background of digital government initiatives and the heightened importance of cybersecurity as governments and enterprises shift critical services to the cloud. The discussion then examines the nature of modern cybersecurity threats, from ransomware and phishing to nation-state attacks, highlighting their implications for both public and private sectors. A key theme of the session is the tension between cybersecurity threats and data sovereignty needs: while organizations must defend against sophisticated cyberattacks, they must also comply with regulations that govern how and where data is stored, processed, and accessed across jurisdictions. Building on this foundation, the session introduces best practices for cloud security, including data encryption, zero-trust frameworks, and compliance with international standards. Different approaches to cybersecurity will be compared—spanning technological, organizational, and policy-driven strategies—while emphasizing the need for resilience, collaboration, and shared responsibility between cloud providers and end users. The presentation concludes with key insights and strategic recommendations for governments, enterprises, and service providers, offering a roadmap to balance security, sovereignty, and innovation while safeguarding sensitive data and maintaining trust in the digital economy. |
11:00 AM | Title: Beyond Protection: Cyber Governance at Home, Cyber Diplomacy Abroad Presenter: Frédéric Margotton | High Commission of Canada in Singapore More info ![]() Frédéric Margotton Cyber Attaché | High Commission of Canada in Singapore Conference Synopsis: Canada’s keynote at Brunei Cyber Week highlights the need to move beyond protection toward cyber governance and diplomacy. Drawing on Canada’s own hard-learned lessons—clear mandates, attribution as a policy act, and the separation of operational and external leads—the speech will argue that foreign ministries must play a larger role in international cyber cooperation. Canada and ASEAN can strengthen resilience together by deepening information sharing and reaffirming that advanced persistent threats to critical infrastructure are unacceptable. | Title: Vibe Coding: Insecure by Default
Presenter: Justin Chong | Swarmnetics More info ![]() Justin Chong Principal Consultant | Swarmnetics Conference Synopsis: The session explores the opportunities and risks of using generative AI for software development. Through a demo of AI-generated code, the session highlights common weaknesses and vulnerabilities that make such code insecure by default. Attendees will learn practical strategies to build more secure applications, including secure prompting techniques and best practices for code review. The talk concludes with insights on leveraging secure code review services to further improve the security of your applications! |
11:30 AM | Title: Sustainable Cybersecurity, Resilient People Presenter: Dave Gurbani | CyberSafe More info ![]() Dave Gurbani Group CEO | Cybersafe Pte. Ltd. Conference Synopsis: In an age where organizations face a constant onslaught of cyber threats, sustainability in cybersecurity is no longer optional—it’s essential. This talk examines what truly makes cybersecurity teams effective, resilient, and prepared for the future. Beyond the clutter of tools, checklists, and certifications, real strength is found in developing efficient systems, empowering skilled people, and integrating sustainable processes into the organization’s core. In this session, Dave will be discussing Cybersafe's Three Pillars of Sustainable Cyber.
| Title: Empowering Security Operations with AI
Presenter: Ching Ping Wong | Fortinet More info ![]() Ching Ping Wong Senior Business Development Manager, Southeast Asia | Fortinet Conference Synopsis: AI is redefining how organizations secure their digital environments, with cyber security being one of its most transformative areas. In this session, Fortinet demonstrates how Generative AI and Agentic AI can be harnessed in NOC/SOC environments to simplify analyst workflows, accelerate incident response, and enhance visibility across users, applications, and cloud resources. Discover how AI-driven security operations deliver stronger protection and greater efficiency—empowering organizations to stay ahead in an increasingly complex digital landscape. |
12:00 PM | Lunch and Networking | Lunch and Networking |
Threat Intelligence and Incident Response | Cyber Smart Society | |
1:30 PM | Title: Resilience of Critical Infrastructure: Reducing Multidimensional Vulnerabilities Presenter: Allan S. Cabanlong | Global Forum on Cyber Expertise (GFCE) More info ![]() Allan S. Cabanlong Regional Director, Southeast Asia Hub | Global Forum on Cyber Expertise (GFCE) Conference Synopsis: The resilience of critical infrastructure is no longer defined solely by cybersecurity measures. In an interconnected world, where hybrid attacks and systemic disruptions can ripple across sectors, resilience must also integrate economic preparedness, legal harmonization, and community-level adaptability. At the Brunei Cybersecurity Conference, Allan S. Cabanlong, Regional Director of the Global Forum on Cyber Expertise (GFCE) Southeast Asia Hub, will explore how nations can build multidimensional resilience to protect essential systems such as energy, finance, health, and transportation. Drawing lessons from ASEAN’s regional cooperation, the European Union’s regulatory models, and South Korea’s national preparedness, the session will highlight practical strategies that move beyond technical defenses. Key themes include strengthening cross-sector collaboration, embedding economic risk-sharing into resilience planning, and empowering communities through awareness and trust-building. The session emphasizes one core message: true resilience is not built in isolation—it is cultivated through trust, collaboration, and adaptability. | Title: Human: The Weakest Link? The Human Factor, the Missing Link in an Evolving Threat Landscape Presenter: Dr Hj Sharul Tazrajiman Bin Hj Tajuddin | Universiti Teknologi Brunei (UTB) More info ![]() Dr Hj Sharul Tazrajiman Bin Hj Tajuddin Senior Assistant Professor & Dean School of Computing and Informatics | Universiti Teknologi Brunei Conference Synopsis: For decades, cybersecurity has been framed as a technological arms race, stronger firewalls, smarter AI, faster detection. Despite billions invested in advanced tools and countermeasures, breaches still occur with alarming regularity. Why? Because the human element remains the most unpredictable and often overlooked part of the cybersecurity ecosystem. This talk explores how human characteristics, traits and behaviors shape the success or failure of cybersecurity countermeasures. From trust and curiosity that make phishing irresistible, to fatigue from endless password policies, it is people not machines that determine whether security stands or falls. This talk will also examine why organizations struggle to keep pace with evolving technologies not because of a lack of investment, but because aligning systems with real-world human behavior remains the greatest challenge. In line with the conference theme “Beyond Protection: Empowering a Cyber-smart Society,” this session emphasizes that true cybersecurity goes beyond technical shields. Empowerment comes from equipping individuals and organizations with awareness, resilience, and human-centered strategies. By embedding behavioral insights into security design, we can move past the idea of humans as the “weakest link” and instead empower them as the foundation of a cyber-smart society, one where people are not passive liabilities, but active defenders in the digital landscape. |
2:00 PM | Title: From Visibility to Action: Advancing Threat Intelligence and Response for a Cyber-Smart Nation Presenter: Erdiny Mugit | Unified National Networks (UNN) More info ![]() Erdiny Mugit Cyber Security Product Manager | UNN Conference Synopsis: In today’s evolving cyber threat landscape, visibility alone is no longer enough. Organizations need to understand not just that an attack is occurring but what it means, where it’s coming from, and how to respond effectively. This session explores how enhanced threat intelligence and real-time telemetry are reshaping how defenders detect, contextualize, and respond to threats across infrastructures.
By focusing on real-time malicious activity detection, behavioral indicators, and situational awareness at the network edge, the session highlights how timely intelligence can accelerate response and guide mitigation. It also touches on how organizations can prepare to operationalize this intelligence within a 24/7 response framework, forming the foundation for a cyber-smart society built on proactive defense. | Title: Smart Societies Need Smart Security: "HCLSoftware Intelligent Operations and AI in Cyber Defense"
Presenter: Saranga Rajan (Sarang) | HCL Software
Sponsor by: Danawan More info ![]() Saranga Rajan (Sarang) Associate Vice President, Intelligent Operations | HCLSoftware (ASEAN & North Asia) Conference Synopsis: In today’s hyper-connected world, societies are rapidly evolving into Smart Societies —driven by digital services, intelligent infrastructure, and real-time data. Yet with opportunity comes risk. Every smart system, from transportation and healthcare to finance and utilities, depends on massive flows of sensitive data. When compromised, the impact can disrupt lives, economies, and even national security.
This session, “Smart Societies Need Smart Security: HCLSoftware Intelligent Operations and AI in Cyber Defense,” explores how nations and enterprises can safeguard their digital future. We will outline the key pillars of a Smart Society, explain why data and privacy are its lifeblood, and demonstrate why endpoint security must be the foundation. The discussion will highlight how organizations can move beyond reactive defense toward proactive, continuous compliance and real-time remediation, ensuring resilience, trust, and uninterrupted progress in the age of Smart Societies. |
2:30 PM | Title: Establishing a Detection & Response Team: Operationalising the OODA Loop for Cyber Resilience Presenter: Abdul Fattah Mohd Ali | Bank Islam Brunei Darussalam (BIBD) More info ![]() Abdul Fattah Mohd Ali Head of Information Security Management | Bank Islam Brunei Darussalam (BIBD) Conference Synopsis: In today’s rapidly evolving cyber and threat landscape, organisations must move beyond traditional perimeter defenses and adopt a proactive, intelligence-driven approach to cybersecurity. This presentation outlines a strategic framework for establishing a Detection and Response Team (DRT). The session will explore how the OODA cycle can be operationalised to enhance the speed, agility, and effectiveness of cyber threat detection and response. Attendees will gain insights into structuring a DRT that continuously observes threat environments, orients itself using contextual intelligence, decides on optimal response strategies, and acts swiftly to mitigate risks. | Title: Bridging the gap: Securing the converged IT/OT network Presenter: Varun Lathika | Brunei LNG More info ![]() Varun Lathika Head of Cybersecurity | Brunei LNG Conference Synopsis: - |
3:00 PM | Title: What Makes Us Stronger in Cyber
Presenter: Dr. Rudi Lumanto | AJCCA More info ![]() Dr. Rudi Lumanto Chairman | The ASEAN Japan Cybersecurity Community Alliance (AJCCA) Conference Synopsis: In today’s hyperconnected world, cyberspace has become the place where we live, work, and dream—yet it is also where storms of threats emerge faster than we can predict. From ransomware crippling hospitals to AI-driven attacks reshaping the battlefield, the digital domain is evolving at a speed that challenges even the most advanced defenses. This presentation will illuminate a fresh perspective on cyber strength—not through technology alone, but through the mindsets, strategies, and connections that make us truly resilient. With vivid illustrations and real-world insights, it will take the audience on a journey from vulnerability to strength, and from isolation to unity. Be prepared not just to listen, but to rethink what it means to stand strong in the digital storm. | Title: Future Threat Here Today: Are you Quantum Safe ready? Presenter: Eddy Liew | IBM, Malaysia | Innov8 Labs More info ![]() Eddy Liew Chief Technology Officer | IBM, Malaysia | Innov8 Labs Conference Synopsis: - |
3:30 PM | Break | Break |
4:00 PM | Prize Presentation: Cyber Battle: Capture The Flag | Prize Presentation: Cyber Battle: Capture The Flag |
CYBER BATTLE: CAPTURE THE FLAG 2025
MEETING ROOM 1 & 2 | |
---|---|
8:00 AM - 4:00 PM | Organised By: I.T Protective Security Services Sdn Bhd
Cyber Battle: Capture The Flag (CTF) is an annual competition for aspiring cyber security enthusiasts in Brunei Darussalam to exercise ethical hacking skills and gain experience with real-life IT scenarios. Joining a CTF competition is one of the most interesting and fun ways to get into the cybersecurity field and for IT professionals to test their skills and get better at what they do. |
WORKSHOP
MEETING ROOM 3 | MEETING ROOM 4 | |
---|---|---|
10.30 AM - 12:00 PM | Workshop Session 1 | Title: Financial Crime & Crypto Asset Tracing & Seizing
Presenter: Mr. Goran Jankoski More info ![]() Mr. Goran Jankoski International Cybersecurity Consultant | Manager, ICT Risk Supervision Workshop Abstract: Through real-world case simulations, participants will learn how to “follow the money” across the blockchain, identify intermediaries, and uncover exchange cash-out points. They will gain hands-on experience with investigative techniques used in ransomware and fraud cases, while learning how to preserve digital evidence and cooperate effectively with VASPs and international partners. By the end of the course, participants will have added powerful tracing and seizure tools to their investigative toolkit, strengthening their ability to respond to emerging financial crime threats. |
1:30 PM - 5:00 PM | Title: Cyber Diplomacy and Canada’s Framework on Public Attribution
Presenter: Frédéric Margotton | High Commission of Canada in Singapore More info ![]() Frédéric Margotton Cyber Attaché | High Commission of Canada in Singapore Workshop Abstract: The two-hour session will provide an overview of Canada’s cyber foreign policy and national cybersecurity strategy, including its approach to public attribution, and aims to support information-sharing and capacity-building efforts among regional partners. The session will be conducted in an interactive format, with space for open discussion and questions. | Title: Financial Crime & Crypto Asset Tracing & Seizing
Presenter: Mr. Goran Jankoski More info ![]() Mr. Goran Jankoski International Cybersecurity Consultant | Manager, ICT Risk Supervision Workshop Abstract: Through real-world case simulations, participants will learn how to “follow the money” across the blockchain, identify intermediaries, and uncover exchange cash-out points. They will gain hands-on experience with investigative techniques used in ransomware and fraud cases, while learning how to preserve digital evidence and cooperate effectively with VASPs and international partners. By the end of the course, participants will have added powerful tracing and seizure tools to their investigative toolkit, strengthening their ability to respond to emerging financial crime threats. |
7:45 AM | Registration of Participants Arrival of Speakers & Guests |
---|---|
8:00 AM | Morning Refreshment |
CONFERENCE
SUTRA HALL | VIP HALL | |
---|---|---|
Emerging Cyber Threats in a Hyper-Connected World | Securing Smart Cities and Critical Infrastructure | |
8:30 AM | Title: Negara Brunei Darussalam's Journey Towards AI Readiness in Education Presenter: Mohammad Syafiq bin Haji Abu Bakar | Ministry of Education (MOE) More info ![]() Mohammad Syafiq bin Haji Abu Bakar Pegawai Pelajaran, Jabatan Pengurusan Pendidik | Ministry of Education (MOE) Conference Synopsis: This presentation highlights Brunei Darussalam’s innovative approach to preparing its education system for the age of Artificial Intelligence. Developed through bottom-up surveys and workshops with over 1000 educators, the process placed teachers’ and school leaders’ voices at the centre, before being aligned with international benchmarks such as UNESCO, ASEAN, and AITI’s AI Governance & Ethics Guide. Rooted in Melayu Islam Beraja values and Wawasan Brunei 2035, the initiative demonstrates how Brunei is shaping guidance that is both globally relevant and uniquely Bruneian. The session will showcase how evidence and engagement were translated into actionable guidance, and why accountability and governance are essential to ensure AI in education is secure, ethical and future-ready - linking education directly to the nation’s broader digital and cybersecurity priorities. | Title: Closing the Gaps: A Unified Approach to Threat Detection and Response with XDR Presenter: MK Lim | Sangfor More info ![]() MK Lim Pre-Sales Manager | Sangfor Conference Synopsis: This presentation explores a critical challenge in modern cybersecurity: the fragmented nature of security operations. Despite the use of various tools—from network and cloud defenses to device-level endpoint solutions—a significant gap remains. These disparate systems often operate in isolation, creating blind spots where sophisticated attacks can move unseen between platforms. This leads to delayed responses and overwhelmed security teams. |
9:00 AM | Title: Cyber Resilience in Education: Safeguarding Networks, Systems, and Users Presenter: Muhd Sahrudi Iswandi Hashim | Institute of Brunei Technical Education (IBTE) More info ![]() Muhd Sahrudi Iswandi Hashim Divisional Director of the Information Technology Services Division | Institute of Brunei Technical Education (IBTE) Conference Synopsis: The expansion of campus-wide networks, cloud systems, and connected devices has created new opportunities for education—but it has also expanded the attack surface for cyber threats. In today’s hyper-connected world, educational institutions must address risks such as AI-driven phishing, ransomware, and vulnerabilities in connected infrastructure. This presentation explores these emerging threats through the lens of IBTE’s experience in upgrading its network infrastructure and deploying campus-wide Wi-Fi across all IBTE locations. It highlights how enhanced connectivity brings both advantages and vulnerabilities, and how projects like MFA implementation, Azure-based device security, and student system protections are critical to safeguarding institutional data and operations. The session concludes with a call to build resilience through technology, processes, and user awareness—ensuring that connectivity empowers education while remaining secure against evolving cyber risks. | Title: Smarter Protection, Scalable Solution, the CyberSecurity Platform of Choice: SonicWall’s New Gen 8 Firewalls, Cloud Secure Edge and Unified Environment Presenter: Kenneth Bryan Jayson Frayna | SonicWall More info ![]() Kenneth Bryan Jayson Frayna Senior Solutions Engineer | SonicWall Asean Conference Synopsis: In keeping your business in today's threat landscape, you need a simple, powerful, accurate, built to scale cybersecurity solution in place. That’s why here at SonicWALL, our latest release delivers exactly what our partners and customers have been asking for: A new Generation of NGFW models with flexible licensing, Embedded Zero Trust Access, and a unified management which can be fully offloaded with a Co-Managed Services backed by experts 24/7. Reducing complexity and helping you focus more on important task such as growing your business further. |
9:30 AM | Title: The Human Firewall: Why Awareness Alone Fails Against Modern Online Scam Presenter: Senior Superintendent of Police Handrie bin Haji Amin | Royal Brunei Police Force (RBPF) More info ![]() Senior Superintendent of Police Handrie bin Haji Amin Head of Cyber Crime Investigation Division, Criminal Investigation Department | Royal Brunei Police Force (RBPF) Conference Synopsis: This presentation explores the critical role of human behavior in Brunei's cybersecurity landscape, focusing on why traditional awareness programs alone are insufficient in combating modern online scams. Drawing on recent statistics, case studies, and psychological insights, the talk examines the current state of online scams in Brunei, their economic and social impact, and the sophisticated tactics employed by scammers. The speaker will analyze the limitations of existing cybersecurity measures, propose strategies for building a stronger "human firewall" tailored to Brunei's unique cultural context, and discuss future trends in online scams and emerging technologies. By advocating for a holistic, human centered approach to cybersecurity, this presentation aims to inspire action and contribute to strengthening Brunei's digital defenses against evolving cyber threats. | Title: Insights into the Emerging Threat Horizon Presenter: Eddie Zeng | Recorded Future More info ![]() Eddie Zeng Senior Sales Engineer | Recorded Future Conference Synopsis: In today’s hyper-connected world, cyber threats are escalating in frequency, sophistication, and impact — and 2025 has proven to be a pivotal year. This 30-minute session will provide a sharp, intelligence-led overview of the emerging threat horizon with insights drawn from real cyber incidents that have impacted businesses and critical sectors across Brunei and the region. |
10:00 AM | Break | Break |
AI and Automation in Cybersecurity | Combating Misinformation in the Digital Age | |
10:30 AM | Title: Harmonisatuon of AI with Human Expertise Towards Cyber-Smart Society Presenter: Muhammad Fahmi bin Mahusin | Progresif Sdn Bhd More info ![]() Muhammad Fahmi bin Mahusin Vice President, Enterprise | Progresif Sdn Bhd Conference Synopsis: A practical 30-minute session on harmonising AI tools with human judgment to avoid over-reliance. The presentation aim to demonstrate utilizing automation for scale and speed while keeping humans in the loop for context and critical decisions, and how to embed governance and risk management across People, Process, and Technology to keep operations resilient, accountable, and human-centred. | Title: Navigating Emerging Threats and Regulatory Complexity Presenter: Syazwan Sazali | Brunei Gas Carrier (BGC) More info ![]() Syazwan Sazali IT Enterprise Architect and Cybersecurity Analyst | Brunei Gas Carrier (BGC) Conference Synopsis: As the maritime industry becomes more digital, it faces rising cyber threats that put vessels, ports, and global supply chains at risk. At the same time, shipping companies must navigate a patchwork of regulations that are often overlapping and costly to comply with. This session explores real-world incidents, the growing complexity of compliance, and practical steps the industry can take to strengthen resilience and safeguard operations. |
11:00 AM | Title: Proactive by Design: Architecting the AI-Native Platform for Cyber Resilience
Presenter: Muthukumar Natarajan | Trend Micro More info ![]() Muthukumar Natarajan Field CTO , AMEA | Trend Micro Conference Synopsis: As cyber threats grow in speed, scale, and sophistication, enterprises face a new imperative: to shift from reactive defense to proactive resilient-by-design strategies. In this topic explores how forward-thinking organizations are adopting AI-native cybersecurity platforms — purpose-built to deliver unified visibility, intelligent automation, and autonomous response across the attack surface. | Title: Threat Protection with Human-Centric Security Presenter: Lesley Tai | DMOS Technologies More info ![]() Lesley Tai CISSP, CCSP, CSSLP, CCISO Senior Sales Engineer, Proofpoint | DMOS Technologies Conference Synopsis: - |
11:30 AM | Title: From Prompt to Breach: How Chatbots Break Presenter: Isyrah Fahmi Osman & Rafie Suhaily | I.T Protective Security Services Sdn Bhd (ITPSS) More info ![]() Isyrah Fahmi Osman Head of Research and Development | I.T Protective Security Services Sdn Bhd (ITPSS) ![]() Rafie Suhaily Operation Officer, Security Research Team | I.T Protective Security Services Sdn Bhd (ITPSS) Conference Synopsis: Understand how attackers exploit chatbots and the security risks they introduce. Learn practical prevention and mitigation strategies to reduce data exposure, constrain unsafe actions, and limit impact. | Title: Microsoft Purview: The Unified Solutions for Data Security, Governance, and Compliance in the AI Era Presenter: Norwaze Mustaqqem Abdullah | Tech One Global More info ![]() Norwaze Mustaqqem Abdullah Technology Solutions Specialist | Tech One Global Limited Conference Synopsis: As AI adoption accelerates, enterprises face rising risks from fragmented data security tools, inconsistent governance, and mounting regulatory pressure—leaving sensitive data exposed and compliance efforts strained. Microsoft Purview addresses these challenges with a unified, intelligent platform that dynamically secures data across its lifecycle, enhances governance through built-in data quality and lineage, and automates compliance across hybrid and multicloud environments. By consolidating capabilities like data loss prevention, insider risk management, and federated governance into a single experience, Purview empowers organizations to transform operational complexity into clarity, reduce breach exposure, and enforce regulatory policies with precision. With seamless integration across Microsoft 365 and third-party platforms, built-in AI, and continuous innovation, Purview enables businesses to unlock data value responsibly while staying secure, compliant, and audit-ready—positioning them to thrive in the AI-driven future. |
12:00 PM | Lunch and Networking | Lunch and Networking |
Cloud & DevSecOps Security | Smart Cities, Smarter Security: Challenges & Solutions | |
1:30 PM | Title: Digital Trust: Strengthening Privacy in Brunei’s Digital Economy Presenter: Melbourne Lim | Deloitte More info ![]() Melbourne Lim Digital Privacy & Trust Specialist | Deloitte Conference Synopsis: Digital trust is the foundation of Brunei’s digital economy, where confidence in data protection drives adoption, innovation, and investment. Strengthening privacy safeguards is critical to ensuring responsible use of personal data and aligning with international standards. This session examines Brunei’s evolving regulatory landscape, the challenges organisations face in embedding effective privacy practices, and the opportunities to position privacy as a strategic advantage. | Title: Cyber-Physical Security in Smart Cities: Protecting ICS and Critical Infrastructure Presenter: Dr. Ali Tufail | Universiti Brunei Darussalam (UBD) More info ![]() Dr. Ali Tufail Senior Assistant Professor and Program Leader for the Cybersecurity and Forensics Program, School of Digital Science | Universiti Brunei Darussalam Conference Synopsis: Smart cities are no longer a dream of the future, they are already redefining how we work, live, and interact with our surroundings. From intelligent transport systems to digitalized healthcare, and from integration of renewables to data-led governance, cities are more integrated than ever. But that integration also creates complexity and new security risks. In this session under the theme "Smart Cities, Smarter Security: Challenges & Solutions", I will be sharing concepts from the research community on how we are addressing these challenges. I will highlight new emerging research trends and technologies such as blockchain, AI-based analytics, and cyber-physical security paradigms, and also touch upon the threats to critical infrastructure, which are at the heart of city life. Drawing on the most up-to-date research, including work on securing industrial control systems, smart waste management, and trusted IoT, I will show how academia and industry are collaborating to build resilience into the very fabric of smart cities. It is not just a question of locking down standalone systems, but of building a holistic, trustworthy, and sustainable vision of city life. Through a consideration of current realities and the future course of research, this session will explore how we can make sure that with increasing smartness in our cities, their security also gets smarter. |
2:00 PM | Title: Cloud & DevSecOps Security Presenter: Chan Siang Wei | Huawei More info ![]() Chan Siang Wei Industrial Solution Sales Specialist | Huawei Technologies (B) Sdn Bhd Conference Synopsis: - | Title: XR Digital Twins: Building Cyber-Smart Foundations for Smart Cities Presenter: Joseph Kim | YMX Singapore Pte. Ltd More info ![]() Joseph Kim Data Protection Officer (DPO) and Head of Global Business Development | YMX Singapore Pte. Ltd Conference Synopsis: Smart cities are rapidly evolving into highly interconnected cyber-physical systems. While traditional cybersecurity measures such as firewalls and encryption remain vital, they are no longer sufficient on their own. True resilience also depends on the integrity of operational data, the security of remote collaboration, the ability to visualise and simulate cyber-physical risks, and the preparedness of the human workforce.
This session will examine how XR Digital Twin technologies can strengthen these areas by transforming complex engineering and IoT data into trusted, manageable assets; enabling secure, distributed collaboration environments; and providing immersive training platforms where incident response and compliance can be practised in realistic scenarios.
Through selected case studies, the presentation will demonstrate how digital twins bridge the gap between engineering operations and cybersecurity. By embedding security principles into the very fabric of urban infrastructure, smart cities can move beyond protection to achieve greater sustainability, resilience, and trust. |
2:30 PM | Title: Strengthening Cybersecurity in Higher Education through AI-Driven Automation Presenter: Dr. Ghassan Abdulhabeb | Universiti Islam Sultan Sharif Ali (UNISSA) More info ![]() Dr. Ghassan Abdulhabeb Associate Professor | Universiti Islam Sultan Sharif Ali (UNISSA) Conference Synopsis: Higher education institutions are increasingly targeted by sophisticated cyber threats that jeopardize sensitive student data, research outputs, and digital learning platforms. Conventional security systems, which rely heavily on manual monitoring and reactive measures, often prove inadequate in addressing these complex challenges. Artificial Intelligence (AI)-driven automation offers a transformative approach by enhancing detection precision, enabling real-time incident response, and streamlining compliance with regulatory standards. Through automated response systems and AI-enabled predictive analytics, universities can reduce vulnerabilities, minimize human error, and accelerate recovery from attacks. This session will demonstrate how AI-driven cybersecurity frameworks can create resilient, proactive, and future-ready security infrastructures in higher education, while safeguarding academic integrity and supporting institutional innovation. | Title: Fortifying your Cyber Resilience Strategy in the Hybrid Environment Presenter: Kamal Naresh | Rubrik More info ![]() Kamal Naresh Account Director | Rubrik Conference Synopsis: The pace of migration to cloud environments is astounding with over 90% of IT leaders managing distributed hybrid environments, according to Rubrik's Zero Labs Report. Unfortunately, hybrid environments have created unprecedented hazards including challenges in securing data systemwide, and growth in attack vectors.
It's no wonder - protecting the hybrid and cloud perimeters comes with inherent challenges. With cloud resources decentralised and easy to deploy, it's easy for data to sprawl across multiple accounts, regions, and clouds, making it hard to keep track of what's protected and how.
And let's not forget, big cloud vendors expect customers to take ownership of their data protection. That means you are solely responsible for keeping your cloud data secure.
We will discuss perspectives on: The limitations on resiliency with native cloud backup tools, and the onus of responsibility on the user The growing challenge on gaining visibility and consolidating management on your data (especially sensitive data) on where they reside and whether they are protected Cyber resiliency in the cloud - keeping your cloud assets safe, while reducing TCO costs Bouncing back (cleanly and swiftly) from threats when - not if - they strike |
Identity, Access, and Zero Trust | The Role of Public Policy in Creating a Cyber Smart Society | |
3:00 PM | Title: From Login to Last Click: Applying Zero Trust to Consumer Identity & Access Presenter: Wei See Wong | Group-IB More info ![]() Wei See Wong Head of Business Development, Asia Pacific (APAC) | Group-IB Conference Synopsis: Zero Trust shouldn’t stop at the office door. While enterprises use Zero Trust to authenticate employees, the largest attack surface sits in customer channels—mobile apps and web portals where identity, intent, and devices constantly change. In this session, we extend Zero Trust principles to customer access. Instead of relying on passwords or one-time MFA alone, we continuously verify who is using the service, what device they’re on, and how they behave at every step. Using Group-IB’s fraud intelligence and behavioral analytics—device fingerprinting, mobile biometrics, anomaly detection, and global risk signals—we turn each customer session into a living risk score that drives adaptive decisions: allow, step-up, limit, or block. You’ll learn a practical blueprint for integrating continuous verification into existing anti-fraud stacks to reduce ATO, mule activity, and scam-driven transfers—without breaking customer experience. | Title: Politeknik Brunei’s Role: Supporting a Cyber-Smart Society Presenter: Ms. Nurul Afizah binti Zinni | Politeknik Brunei More info ![]() Nurul Afizah binti Zinni Education Officer / Lecturer, School of Information Communication & Technology (SICT) | Politeknik Brunei Conference Synopsis: The presentation highlights the importance of public policy in creating a cyber-smart society and the critical role of academia in supporting these goals. It will explore how digital transformation has created both opportunities and risks, and why policies are essential in guiding safe, secure participation in the digital world. The talk will also share how Politeknik Brunei contributes to Brunei’s national cybersecurity and digital economy goals through its academic programs. This includes the launch of the Diploma in Cybersecurity (January 2026 intake) and the integration of Cybersecurity Essentials across all ICT programs. These initiatives aim to produce graduates who are not only technically competent but also responsible and cyber-aware, helping to build a resilient and trusted digital nation. |
3:30 PM | Title: Guardians of Data: Navigating Digital Trust with the Data Protection Officer Presenter: Farah Zainal | Authority for Info-communications Technology Industry of Brunei Darussalam (AITI) More info ![]() Farah Zainal Manager | Authority for Info-communications Technology Industry of Brunei Darussalam Conference Synopsis: With the enactment of the Personal Data Protection Order. 2025, organisations are expected to appoint at least one Data Protection Officer (DPO). The session explores the key roles and responsibilities which extends beyond legal and regulatory compliance, highlighting effective operational safeguards towards a cybersmart society | Title: Smart Society: Empowering Communities Presenter: Qamaruzzaman Affandy | Brunei Darussalam Central Bank (BDCB) More info ![]() Qamaruzzaman Affandy Brunei Darussalam Central Bank (BDCB) Conference Synopsis: True cybersecurity resilience is not built on technology and policy alone – it depends on people. An empowered community is the first and most effective line of defence. This presentation outlines how strategic public policy, through education, inclusive programs, and public-private collaboration, can transform citizens from potential targets into active participants in our digital space. By fostering a culture of shared vigilance and equipping individuals and businesses with the right tools and knowledge, we can further build a resilient, cyber-smart society where every individual plays a role in safeguarding Brunei Darussalam’s security and prosperity. |
4:00 PM | Speaker Session 4 | Speaker Session 15 |
4:30 PM | Closing Remarks | Closing Remarks |
4:35 PM | Refreshment | Refreshment |
WORKSHOP
MEETING ROOM 1 & 2 | |
---|---|
8:00 AM - 12:00 PM | Title: See It. Stop It. Orchestrate It: Live Demo of Integrated Threat Visibility, Cloaking, and Response with AntareX (Session 1)
Hosted by: Unified National Networks (UNN)
Presenters: Wong Twee Wan & Sivaganesh | Antarex More info ![]() Wong Twee Wan Senior Cybersecurity Consultant | Antarex ![]() Sivaganesh Cyber Threat Intelligence Officer + SOC Manager | Antarex Antarex Team Antarex is a regional cybersecurity provider based in Southeast Asia, supporting ISPs, enterprises, and governments in protecting critical network infrastructure. Their strengths include in-house developed solutions, 24/7 regional SOC operations, modular and easy-to-deploy systems, SLA-backed engagements, and compliance support for ISO, NIST, PCI-DSS, and GDPR. Operating across eight countries, Antarex combines local expertise with global security standards.
These solutions are brought exclusively through Unified National Networks (UNN) in Brunei, ensuring alignment with national initiatives on cybersecurity and data sovereignty. Format: Live demonstration showcasing Antarex’s integrated solutions in action. Synopsis: Hosted in collaboration with UNN, Antarex will showcase how its three flagship solutions XNI, DarkShield, and MXOC works together to deliver continuous protection from the edge to the core. Participants will see how visibility, cloaking, and orchestration combine to form a resilient, proactive defence posture:
|
1:30 PM - 5:00 PM | Title: See It. Stop It. Orchestrate It: Live Demo of Integrated Threat Visibility, Cloaking, and Response with AntareX (Session 2)
Hosted by: Unified National Networks (UNN)
Presenters: Wong Twee Wan & Sivaganesh | Antarex More info ![]() Wong Twee Wan Senior Cybersecurity Consultant | Antarex ![]() Sivaganesh Cyber Threat Intelligence Officer + SOC Manager | Antarex Antarex Team Antarex is a regional cybersecurity provider based in Southeast Asia, supporting ISPs, enterprises, and governments in protecting critical network infrastructure. Their strengths include in-house developed solutions, 24/7 regional SOC operations, modular and easy-to-deploy systems, SLA-backed engagements, and compliance support for ISO, NIST, PCI-DSS, and GDPR. Operating across eight countries, Antarex combines local expertise with global security standards.
These solutions are brought exclusively through Unified National Networks (UNN) in Brunei, ensuring alignment with national initiatives on cybersecurity and data sovereignty. Format: Live demonstration showcasing Antarex’s integrated solutions in action. Synopsis: Hosted in collaboration with UNN, Antarex will showcase how its three flagship solutions XNI, DarkShield, and MXOC works together to deliver continuous protection from the edge to the core. Participants will see how visibility, cloaking, and orchestration combine to form a resilient, proactive defence posture:
|
MEETING ROOM 3 | |
---|---|
8:00 AM - 12:00 PM & 1:30 PM - 5:00 PM | Title: Hands On Cybersecurity AI Workshop: Agentic AI Powered Penetration Testing in N8N
Presenter: Ms Kar Wei Loh | Hexcore Labs More info ![]() Ms Kar Wei Loh Founder and CTO | Hexcore Labs Workshop Abstract: In this hands-on training, you'll learn how to design and deploy an automated AI-driven workflow in n8n to automate penetration testing tasks. The workflow will:
N8N’s intuitive interface allows you to design sophisticated automation flows without advanced AI expertise, allowing future-proof flexibility to easily modify and expand your workflows as new tools and techniques emerge.
Workshop Outline:
Prerequisite:
Learners should have a working computer that can run Kali VMs comfortably (At least 8gb RAM). They should have setup and installed the provided Kali VM before the workshop. |
MEETING ROOM 4 | |
---|---|
8:30 AM - 12:00 PM & 1:30 PM - 5:00 PM | Title: Financial Crime & Crypto Asset Tracing & Seizing
Presenter: Mr. Goran Jankoski More info ![]() Mr. Goran Jankoski International Cybersecurity Consultant | Manager, ICT Risk Supervision Workshop Abstract: Through real-world case simulations, participants will learn how to “follow the money” across the blockchain, identify intermediaries, and uncover exchange cash-out points. They will gain hands-on experience with investigative techniques used in ransomware and fraud cases, while learning how to preserve digital evidence and cooperate effectively with VASPs and international partners. By the end of the course, participants will have added powerful tracing and seizure tools to their investigative toolkit, strengthening their ability to respond to emerging financial crime threats. |
BUSINESS CENTER 1 | |
---|---|
8:30 AM - 12:00 PM | Title: Harmonisation of AI and automation with human expertise to address shared challenges and advance the nation's vision of a cyber-smart society.
Presenter: Muhammad Fahmi bin Mahusin | Progresif Sdn Bhd More info ![]() Muhammad Fahmi bin Mahusin Vice President, Enterprise | Progresif Sdn Bhd Workshop Abstract: This will be a closed-door workshop led by Progresif Enterprise (Fahmi Mahusin), with support from ST Engineering. Attendance will be by invitation only, extended by Progresif Enterprise to selected representatives from GLCs, Financial Institutions (FI), and Critical Information Infratructure (CII) sectors. |
1:30 PM - 5:00 PM | Title: The Private Cloud Advantage: Securing Our AI Investments While Keeping Data Sovereign
Presenter: Ryan Ty | Global Forum on Cyber Expertise (GFCE) More info ![]() Ryan Ty Chairman, Cloud Security Alliance (CSA) | Global Forum on Cyber Expertise (GFCE) Workshop Abstract: In a world where cyber threats are faster and more complex than ever, traditional reactive security models are no longer enough. This talk will address the foundational infrastructure required to power AI initiatives, presenting two primary options: the public cloud or building a massive on-premise data center. We will then introduce the private cloud as the strategic third option—a powerful, integrated solution that delivers the scalability and agility of the cloud while keeping critical data in-country and under your complete control. The session will highlight how a private cloud platform provides a unified, proactive defense for the entire digital attack surface. We will explore how AI-driven tools can move security teams beyond a fragmented approach, enabling them to predict and prioritize risks with unprecedented speed and accuracy. Attendees will learn how to leverage intelligent automation to secure their valuable AI investments from model theft, data poisoning, and other emerging threats, all within an infrastructure that keeps critical data in-country and under their complete control. This talk provides a strategic blueprint for building a resilient and future-proof cybersecurity program. |
Have feedback or a question? Drop it here!
Copyright © Brunei Cyber Security Conference 2025