EVENT PROGRAMME

  • DAY 1: Opening Ceremony
  • DAY 1: Monday, 15 September 2025
  • DAY 2: Tuesday, 16 September 2025
DAY 1: Opening Ceremony

OPENING CEREMONY PROGRAMME FOR BRUNEI CYBER SECURITY CONFERENCE (CYSEC) 2025

7:45 AM

Arrival and Registration of CySec 2025 Participants, Speakers & Guests

8:30 AM

Arrival of Invited Guest (Government Officials, Corporate Officials, and Diplomats)

9:00 AM

Arrival of the Guest of Honour

Yang Berhormat,

Pengiran Dato Seri Setia Shamhary bin Pengiran Dato Paduka Haji Mustapha,

Minister of Transport and Infocommunications as the Minister-in-charge of Cybersecurity

9:05 AM

Recital of Surah Al-Fatihah

9:10 AM

Opening Remarks by

Shamsul Bahri bin Haji Kamis,

Interim Commissioner of Cyber Security Brunei (CSB)

9:15 AM

Opening Address by the Guest of Honour

9:25 AM

Official Launch of Cyber Security Conference 2025 (CySec 2025) by the Guest of Honour

9:35 AM

Exchanging of Memorandums of Understanding (MOUs)


Certificate Presentation


Featured Speech by

Ir Dr Megat Zuhairy Megat Tajuddin

Chief Executive

National Cyber Security Agency (NACSA), Malaysia

10:00 AM

Guest of Honour tours exhibition booths


Group Photo Session with Guest of Honour (Songket Hall)

DAY 1: Monday, 15 September 2025

OPENING CEREMONY PROGRAMME FOR BRUNEI CYBER SECURITY CONFERENCE (CYSEC) 2025

7:45 AM

Arrival and Registration of CySec 2025 Participants, Speakers & Guests

8:30 AM

Arrival of Invited Guest (Government Officials, Corporate Officials, and Diplomats)

9:00 AM

Arrival of the Guest of Honour

Yang Berhormat,

Pengiran Dato Seri Setia Shamhary bin Pengiran Dato Paduka Haji Mustapha,

Minister of Transport and Infocommunications as the Minister-in-charge of Cybersecurity

9:05 AM

Recital of Surah Al-Fatihah

9:10 AM

Opening Remarks by

Shamsul Bahri bin Haji Kamis,

Interim Commissioner of Cyber Security Brunei (CSB)

9:15 AM

Opening Address by the Guest of Honour

9:25 AM

Official Launch of Cyber Security Conference 2025 (CySec 2025) by the Guest of Honour

9:35 AM

Exchanging of Memorandums of Understanding (MOUs)


Certificate Presentation


Featured Speech by

Ir Dr Megat Zuhairy Megat Tajuddin

Chief Executive

National Cyber Security Agency (NACSA), Malaysia

10:00 AM

Guest of Honour tours exhibition booths


Group Photo Session with Guest of Honour (Songket Hall)

CONFERENCE

 SUTRA HALL
VIP HALL
10:30 AM

Title: Automating Digital Investigation: A Paradigm Shift with Open-Source tool and AI

Presenter: Norazmi Hj Serudin | Cyber Security Brunei (CSB)

More info

Norazmi Hj Serudin

Head of National Digital Forensics Lab | Cyber Security Brunei (CSB)

Conference Synopsis:

One of the most significant challenges in modern digital forensics is managing the exponential growth of digital artifacts. As the volume of data from various sources continues to escalate, traditional investigative methodologies are becoming increasingly inefficient and susceptible to oversight.

Leveraging the application of open-source tools and artificial intelligence to automate key stages of the digital investigation lifecycle. The integration of sophisticated AI models serves to streamline data processing, enhance the speed of analysis, and significantly improve the accuracy of forensic findings. This shift from a human-centric to a technology-assisted model not only expedites case resolution but also enables forensic analysts to concentrate on complex reasoning and strategic insights as opposed to repetitive, labor-intensive tasks.

Title: Cybersecurity and Data Sovereignty in the Cloud


Presenter: Victor Neo | Oracle


Sponsor by: VSTECS

More info

Victor Neo

Brunei Country Manager | Oracle Corporation

Conference Synopsis:

This presentation explores the evolving landscape of cybersecurity and data sovereignty in an increasingly cloud-centric world. It begins by outlining the background of digital government initiatives and the heightened importance of cybersecurity as governments and enterprises shift critical services to the cloud.


The discussion then examines the nature of modern cybersecurity threats, from ransomware and phishing to nation-state attacks, highlighting their implications for both public and private sectors. A key theme of the session is the tension between cybersecurity threats and data sovereignty needs: while organizations must defend against sophisticated cyberattacks, they must also comply with regulations that govern how and where data is stored, processed, and accessed across jurisdictions.


Building on this foundation, the session introduces best practices for cloud security, including data encryption, zero-trust frameworks, and compliance with international standards. Different approaches to cybersecurity will be compared—spanning technological, organizational, and policy-driven strategies—while emphasizing the need for resilience, collaboration, and shared responsibility between cloud providers and end users.


The presentation concludes with key insights and strategic recommendations for governments, enterprises, and service providers, offering a roadmap to balance security, sovereignty, and innovation while safeguarding sensitive data and maintaining trust in the digital economy.

11:00 AM

Title: Beyond Protection: Cyber Governance at Home, Cyber Diplomacy Abroad


Presenter: Frédéric Margotton | High Commission of Canada in Singapore

More info

Frédéric Margotton

Cyber Attaché | High Commission of Canada in Singapore

Conference Synopsis:

Canada’s keynote at Brunei Cyber Week highlights the need to move beyond protection toward cyber governance and diplomacy. Drawing on Canada’s own hard-learned lessons—clear mandates, attribution as a policy act, and the separation of operational and external leads—the speech will argue that foreign ministries must play a larger role in international cyber cooperation. Canada and ASEAN can strengthen resilience together by deepening information sharing and reaffirming that advanced persistent threats to critical infrastructure are unacceptable.

Title: Vibe Coding: Insecure by Default

Presenter: Justin Chong | Swarmnetics

More info

Justin Chong

Principal Consultant | Swarmnetics

Conference Synopsis:

The session explores the opportunities and risks of using generative AI for software development. Through a demo of AI-generated code, the session highlights common weaknesses and vulnerabilities that make such code insecure by default. Attendees will learn practical strategies to build more secure applications, including secure prompting techniques and best practices for code review. The talk concludes with insights on leveraging secure code review services to further improve the security of your applications!

11:30 AM

Title: Sustainable Cybersecurity, Resilient People


Presenter: Dave Gurbani | CyberSafe

More info

Dave Gurbani

Group CEO | Cybersafe Pte. Ltd.

Conference Synopsis:

In an age where organizations face a constant onslaught of cyber threats, sustainability in cybersecurity is no longer optional—it’s essential. This talk examines what truly makes cybersecurity teams effective, resilient, and prepared for the future. Beyond the clutter of tools, checklists, and certifications, real strength is found in developing efficient systems, empowering skilled people, and integrating sustainable processes into the organization’s core. In this session, Dave will be discussing Cybersafe's Three Pillars of Sustainable Cyber.

  • People: nurturing cybersecurity talent, leadership, and cross-functional collaboration to avoid burnout and skill gaps.
  • Processes: the importance of governance frameworks, automation, and playbooks that reduce complexity while driving accountability.
  • Systems: leveraging the right technologies and certifications without falling into the trap of “compliance theater."

Title: Empowering Security Operations with AI

Presenter: Ching Ping Wong | Fortinet

More info

Ching Ping Wong

Senior Business Development Manager, Southeast Asia | Fortinet

Conference Synopsis:

AI is redefining how organizations secure their digital environments, with cyber security being one of its most transformative areas. In this session, Fortinet demonstrates how Generative AI and Agentic AI can be harnessed in NOC/SOC environments to simplify analyst workflows, accelerate incident response, and enhance visibility across users, applications, and cloud resources. Discover how AI-driven security operations deliver stronger protection and greater efficiency—empowering organizations to stay ahead in an increasingly complex digital landscape.

12:00 PM

Lunch and Networking

Lunch and Networking

Threat Intelligence and Incident Response

Cyber Smart Society

1:30 PM

Title: Resilience of Critical Infrastructure: Reducing Multidimensional Vulnerabilities


Presenter: Allan S. Cabanlong | Global Forum on Cyber Expertise (GFCE)

More info

Allan S. Cabanlong

Regional Director, Southeast Asia Hub | Global Forum on Cyber Expertise (GFCE)

Conference Synopsis:

The resilience of critical infrastructure is no longer defined solely by cybersecurity measures. In an interconnected world, where hybrid attacks and systemic disruptions can ripple across sectors, resilience must also integrate economic preparedness, legal harmonization, and community-level adaptability.


At the Brunei Cybersecurity Conference, Allan S. Cabanlong, Regional Director of the Global Forum on Cyber Expertise (GFCE) Southeast Asia Hub, will explore how nations can build multidimensional resilience to protect essential systems such as energy, finance, health, and transportation. Drawing lessons from ASEAN’s regional cooperation, the European Union’s regulatory models, and South Korea’s national preparedness, the session will highlight practical strategies that move beyond technical defenses.


Key themes include strengthening cross-sector collaboration, embedding economic risk-sharing into resilience planning, and empowering communities through awareness and trust-building. The session emphasizes one core message: true resilience is not built in isolation—it is cultivated through trust, collaboration, and adaptability.

Title: Human: The Weakest Link? The Human Factor, the Missing Link in an Evolving Threat Landscape


Presenter: Dr Hj Sharul Tazrajiman Bin Hj Tajuddin | Universiti Teknologi Brunei (UTB)

More info

Dr Hj Sharul Tazrajiman Bin Hj Tajuddin

Senior Assistant Professor & Dean School of Computing and Informatics | Universiti Teknologi Brunei

Conference Synopsis:

For decades, cybersecurity has been framed as a technological arms race, stronger firewalls, smarter AI, faster detection. Despite billions invested in advanced tools and countermeasures, breaches still occur with alarming regularity. Why? Because the human element remains the most unpredictable and often overlooked part of the cybersecurity ecosystem.


This talk explores how human characteristics, traits and behaviors shape the success or failure of cybersecurity countermeasures. From trust and curiosity that make phishing irresistible, to fatigue from endless password policies, it is people not machines that determine whether security stands or falls. This talk will also examine why organizations struggle to keep pace with evolving technologies not because of a lack of investment, but because aligning systems with real-world human behavior remains the greatest challenge.


In line with the conference theme “Beyond Protection: Empowering a Cyber-smart Society,” this session emphasizes that true cybersecurity goes beyond technical shields. Empowerment comes from equipping individuals and organizations with awareness, resilience, and human-centered strategies. By embedding behavioral insights into security design, we can move past the idea of humans as the “weakest link” and instead empower them as the foundation of a cyber-smart society, one where people are not passive liabilities, but active defenders in the digital landscape.

2:00 PM

Title: From Visibility to Action: Advancing Threat Intelligence and Response for a Cyber-Smart Nation


Presenter: Erdiny Mugit | Unified National Networks (UNN)

More info

Erdiny Mugit

Cyber Security Product Manager | UNN

Conference Synopsis:

In today’s evolving cyber threat landscape, visibility alone is no longer enough. Organizations need to understand not just that an attack is occurring but what it means, where it’s coming from, and how to respond effectively. This session explores how enhanced threat intelligence and real-time telemetry are reshaping how defenders detect, contextualize, and respond to threats across infrastructures.

 

By focusing on real-time malicious activity detection, behavioral indicators, and situational awareness at the network edge, the session highlights how timely intelligence can accelerate response and guide mitigation. It also touches on how organizations can prepare to operationalize this intelligence within a 24/7 response framework, forming the foundation for a cyber-smart society built on proactive defense.

Title: Smart Societies Need Smart Security: "HCLSoftware Intelligent Operations and AI in Cyber Defense"

Presenter: Saranga Rajan (Sarang) | HCL Software

Sponsor by: Danawan

More info

Saranga Rajan (Sarang)

Associate Vice President, Intelligent Operations | HCLSoftware (ASEAN & North Asia)

Conference Synopsis:

In today’s hyper-connected world, societies are rapidly evolving into Smart Societies —driven by digital services, intelligent infrastructure, and real-time data. Yet with opportunity comes risk. Every smart system, from transportation and healthcare to finance and utilities, depends on massive flows of sensitive data. When compromised, the impact can disrupt lives, economies, and even national security.

This session, “Smart Societies Need Smart Security: HCLSoftware Intelligent Operations and AI in Cyber Defense,” explores how nations and enterprises can safeguard their digital future. We will outline the key pillars of a Smart Society, explain why data and privacy are its lifeblood, and demonstrate why endpoint security must be the foundation. The discussion will highlight how organizations can move beyond reactive defense toward proactive, continuous compliance and real-time remediation, ensuring resilience, trust, and uninterrupted progress in the age of Smart Societies.

2:30 PM

Title: Establishing a Detection & Response Team: Operationalising the OODA Loop for Cyber Resilience


Presenter: Abdul Fattah Mohd Ali | Bank Islam Brunei Darussalam (BIBD)

More info

Abdul Fattah Mohd Ali

Head of Information Security Management | Bank Islam Brunei Darussalam (BIBD)

Conference Synopsis:

In today’s rapidly evolving cyber and threat landscape, organisations must move beyond traditional perimeter defenses and adopt a proactive, intelligence-driven approach to cybersecurity. This presentation outlines a strategic framework for establishing a Detection and Response Team (DRT). The session will explore how the OODA cycle can be operationalised to enhance the speed, agility, and effectiveness of cyber threat detection and response. Attendees will gain insights into structuring a DRT that continuously observes threat environments, orients itself using contextual intelligence, decides on optimal response strategies, and acts swiftly to mitigate risks.

Title: Bridging the gap: Securing the converged IT/OT network


Presenter: Varun Lathika | Brunei LNG

More info

Varun Lathika

Head of Cybersecurity | Brunei LNG

Conference Synopsis:

-

3:00 PM

Title: What Makes Us Stronger in Cyber

Presenter: Dr. Rudi Lumanto | AJCCA

More info

Dr. Rudi Lumanto

Chairman | The ASEAN Japan Cybersecurity Community Alliance (AJCCA)

Conference Synopsis:

In today’s hyperconnected world, cyberspace has become the place where we live, work, and dream—yet it is also where storms of threats emerge faster than we can predict. From ransomware crippling hospitals to AI-driven attacks reshaping the battlefield, the digital domain is evolving at a speed that challenges even the most advanced defenses.


This presentation will illuminate a fresh perspective on cyber strength—not through technology alone, but through the mindsets, strategies, and connections that make us truly resilient. With vivid illustrations and real-world insights, it will take the audience on a journey from vulnerability to strength, and from isolation to unity. Be prepared not just to listen, but to rethink what it means to stand strong in the digital storm.

Title: Future Threat Here Today: Are you Quantum Safe ready?


Presenter: Eddy Liew | IBM, Malaysia | Innov8 Labs

More info

Eddy Liew

Chief Technology Officer | IBM, Malaysia | Innov8 Labs

Conference Synopsis:

-

3:30 PM

Break

Break

4:00 PM

Prize Presentation: Cyber Battle: Capture The Flag

Prize Presentation: Cyber Battle: Capture The Flag

CYBER BATTLE: CAPTURE THE FLAG 2025

MEETING ROOM 1 & 2
8:00 AM - 4:00 PM

Organised By: I.T Protective Security Services Sdn Bhd

Cyber Battle: Capture The Flag (CTF) is an annual competition for aspiring cyber security enthusiasts in Brunei Darussalam to exercise ethical hacking skills and gain experience with real-life IT scenarios. Joining a CTF competition is one of the most interesting and fun ways to get into the cybersecurity field and for IT professionals to test their skills and get better at what they do.

WORKSHOP

MEETING ROOM 3
MEETING ROOM 4
10.30 AM - 12:00 PM

Workshop Session 1

Title: Financial Crime & Crypto Asset Tracing & Seizing

Presenter: Mr. Goran Jankoski

More info

Mr. Goran Jankoski

International Cybersecurity Consultant | Manager, ICT Risk Supervision

Workshop Abstract:

Through real-world case simulations, participants will learn how to “follow the money” across the blockchain, identify intermediaries, and uncover exchange cash-out points. They will gain hands-on experience with investigative techniques used in ransomware and fraud cases, while learning how to preserve digital evidence and cooperate effectively with VASPs and international partners. By the end of the course, participants will have added powerful tracing and seizure tools to their investigative toolkit, strengthening their ability to respond to emerging financial crime threats.

1:30 PM - 5:00 PM

Title: Cyber Diplomacy and Canada’s Framework on Public Attribution

Presenter: Frédéric Margotton | High Commission of Canada in Singapore

More info

Frédéric Margotton

Cyber Attaché | High Commission of Canada in Singapore

Workshop Abstract:

The two-hour session will provide an overview of Canada’s cyber foreign policy and national cybersecurity strategy, including its approach to public attribution, and aims to support information-sharing and capacity-building efforts among regional partners. The session will be conducted in an interactive format, with space for open discussion and questions.

Title: Financial Crime & Crypto Asset Tracing & Seizing

Presenter: Mr. Goran Jankoski

More info

Mr. Goran Jankoski

International Cybersecurity Consultant | Manager, ICT Risk Supervision

Workshop Abstract:

Through real-world case simulations, participants will learn how to “follow the money” across the blockchain, identify intermediaries, and uncover exchange cash-out points. They will gain hands-on experience with investigative techniques used in ransomware and fraud cases, while learning how to preserve digital evidence and cooperate effectively with VASPs and international partners. By the end of the course, participants will have added powerful tracing and seizure tools to their investigative toolkit, strengthening their ability to respond to emerging financial crime threats.

DAY 2: Tuesday, 16 September 2025
7:45 AM

Registration of Participants


Arrival of Speakers & Guests

8:00 AM

Morning Refreshment

CONFERENCE

SUTRA HALL
 VIP HALL

Emerging Cyber Threats in a Hyper-Connected World

Securing Smart Cities and Critical Infrastructure

8:30 AM

Title: Negara Brunei Darussalam's Journey Towards AI Readiness in Education


Presenter: Mohammad Syafiq bin Haji Abu Bakar | Ministry of Education (MOE)

More info

Mohammad Syafiq bin Haji Abu Bakar

Pegawai Pelajaran, Jabatan Pengurusan Pendidik | Ministry of Education (MOE)

Conference Synopsis:

This presentation highlights Brunei Darussalam’s innovative approach to preparing its education system for the age of Artificial Intelligence. Developed through bottom-up surveys and workshops with over 1000 educators, the process placed teachers’ and school leaders’ voices at the centre, before being aligned with international benchmarks such as UNESCO, ASEAN, and AITI’s AI Governance & Ethics Guide. Rooted in Melayu Islam Beraja values and Wawasan Brunei 2035, the initiative demonstrates how Brunei is shaping guidance that is both globally relevant and uniquely Bruneian. The session will showcase how evidence and engagement were translated into actionable guidance, and why accountability and governance are essential to ensure AI in education is secure, ethical and future-ready - linking education directly to the nation’s broader digital and cybersecurity priorities.

Title: Closing the Gaps: A Unified Approach to Threat Detection and Response with XDR


Presenter: MK Lim | Sangfor

More info

MK Lim

Pre-Sales Manager | Sangfor

Conference Synopsis:

This presentation explores a critical challenge in modern cybersecurity: the fragmented nature of security operations. Despite the use of various tools—from network and cloud defenses to device-level endpoint solutions—a significant gap remains. These disparate systems often operate in isolation, creating blind spots where sophisticated attacks can move unseen between platforms. This leads to delayed responses and overwhelmed security teams.

9:00 AM

Title: Cyber Resilience in Education: Safeguarding Networks, Systems, and Users


Presenter: Muhd Sahrudi Iswandi Hashim | Institute of Brunei Technical Education (IBTE)

More info

Muhd Sahrudi Iswandi Hashim

Divisional Director of the Information Technology Services Division | Institute of Brunei Technical Education (IBTE)

Conference Synopsis:

The expansion of campus-wide networks, cloud systems, and connected devices has created new opportunities for education—but it has also expanded the attack surface for cyber threats. In today’s hyper-connected world, educational institutions must address risks such as AI-driven phishing, ransomware, and vulnerabilities in connected infrastructure.


This presentation explores these emerging threats through the lens of IBTE’s experience in upgrading its network infrastructure and deploying campus-wide Wi-Fi across all IBTE locations. It highlights how enhanced connectivity brings both advantages and vulnerabilities, and how projects like MFA implementation, Azure-based device security, and student system protections are critical to safeguarding institutional data and operations. The session concludes with a call to build resilience through technology, processes, and user awareness—ensuring that connectivity empowers education while remaining secure against evolving cyber risks.

Title: Smarter Protection, Scalable Solution, the CyberSecurity Platform of Choice: SonicWall’s New Gen 8 Firewalls, Cloud Secure Edge and Unified Environment


Presenter: Kenneth Bryan Jayson Frayna | SonicWall

More info

Kenneth Bryan Jayson Frayna

Senior Solutions Engineer | SonicWall Asean

Conference Synopsis:

In keeping your business in today's threat landscape, you need a simple, powerful, accurate, built to scale cybersecurity solution in place. That’s why here at SonicWALL, our latest release delivers exactly what our partners and customers have been asking for: A new Generation of NGFW models with flexible licensing, Embedded Zero Trust Access, and a unified management which can be fully offloaded with a Co-Managed Services backed by experts 24/7. Reducing complexity and helping you focus more on important task such as growing your business further.

9:30 AM

Title: The Human Firewall: Why Awareness Alone Fails Against Modern Online Scam


Presenter: Senior Superintendent of Police Handrie bin Haji Amin | Royal Brunei Police Force (RBPF)

More info

Senior Superintendent of Police Handrie bin Haji Amin

Head of Cyber Crime Investigation Division, Criminal Investigation Department | Royal Brunei Police Force (RBPF)

Conference Synopsis:

This presentation explores the critical role of human behavior in Brunei's cybersecurity landscape, focusing on why traditional awareness programs alone are insufficient in combating modern online scams. Drawing on recent statistics, case studies, and psychological insights, the talk examines the current state of online scams in Brunei, their economic and social impact, and the sophisticated tactics employed by scammers. The speaker will analyze the limitations of existing cybersecurity measures, propose strategies for building a stronger "human firewall" tailored to Brunei's unique cultural context, and discuss future trends in online scams and emerging technologies. By advocating for a holistic, human centered approach to cybersecurity, this presentation aims to inspire action and contribute to strengthening Brunei's digital defenses against evolving cyber threats.

Title: Insights into the Emerging Threat Horizon


Presenter: Eddie Zeng | Recorded Future

More info

Eddie Zeng

Senior Sales Engineer | Recorded Future

Conference Synopsis:

In today’s hyper-connected world, cyber threats are escalating in frequency, sophistication, and impact — and 2025 has proven to be a pivotal year. This 30-minute session will provide a sharp, intelligence-led overview of the emerging threat horizon with insights drawn from real cyber incidents that have impacted businesses and critical sectors across Brunei and the region.

10:00 AM

Break

Break

AI and Automation in Cybersecurity

Combating Misinformation in the Digital Age

10:30 AM

Title: Harmonisatuon of AI with Human Expertise Towards Cyber-Smart Society


Presenter: Muhammad Fahmi bin Mahusin | Progresif Sdn Bhd

More info

Muhammad Fahmi bin Mahusin

Vice President, Enterprise | Progresif Sdn Bhd

Conference Synopsis:

A practical 30-minute session on harmonising AI tools with human judgment to avoid over-reliance. The presentation aim to demonstrate utilizing automation for scale and speed while keeping humans in the loop for context and critical decisions, and how to embed governance and risk management across People, Process, and Technology to keep operations resilient, accountable, and human-centred.

Title: Navigating Emerging Threats and Regulatory Complexity


Presenter: Syazwan Sazali | Brunei Gas Carrier (BGC)

More info

Syazwan Sazali

IT Enterprise Architect and Cybersecurity Analyst | Brunei Gas Carrier (BGC)

Conference Synopsis:

As the maritime industry becomes more digital, it faces rising cyber threats that put vessels, ports, and global supply chains at risk. At the same time, shipping companies must navigate a patchwork of regulations that are often overlapping and costly to comply with. This session explores real-world incidents, the growing complexity of compliance, and practical steps the industry can take to strengthen resilience and safeguard operations.

11:00 AM

Title: Proactive by Design: Architecting the AI-Native Platform for Cyber Resilience

Presenter: Muthukumar Natarajan | Trend Micro

More info

Muthukumar Natarajan

Field CTO , AMEA | Trend Micro

Conference Synopsis:

As cyber threats grow in speed, scale, and sophistication, enterprises face a new imperative: to shift from reactive defense to proactive resilient-by-design strategies. In this topic explores how forward-thinking organizations are adopting AI-native cybersecurity platforms — purpose-built to deliver unified visibility, intelligent automation, and autonomous response across the attack surface.

Title: Threat Protection with Human-Centric Security


Presenter: Lesley Tai | DMOS Technologies

More info

Lesley Tai

CISSP, CCSP, CSSLP, CCISO

Senior Sales Engineer, Proofpoint | DMOS Technologies

Conference Synopsis:

-

11:30 AM

Title: From Prompt to Breach: How Chatbots Break


Presenter: Isyrah Fahmi Osman & Rafie Suhaily | I.T Protective Security Services Sdn Bhd (ITPSS)

More info

Isyrah Fahmi Osman

Head of Research and Development | I.T Protective Security Services Sdn Bhd (ITPSS)

Rafie Suhaily

Operation Officer, Security Research Team | I.T Protective Security Services Sdn Bhd (ITPSS)

Conference Synopsis:

Understand how attackers exploit chatbots and the security risks they introduce. Learn practical prevention and mitigation strategies to reduce data exposure, constrain unsafe actions, and limit impact.

Title: Microsoft Purview: The Unified Solutions for Data Security, Governance, and Compliance in the AI Era


Presenter: Norwaze Mustaqqem Abdullah | Tech One Global

More info

Norwaze Mustaqqem Abdullah

Technology Solutions Specialist | Tech One Global Limited

Conference Synopsis:

As AI adoption accelerates, enterprises face rising risks from fragmented data security tools, inconsistent governance, and mounting regulatory pressure—leaving sensitive data exposed and compliance efforts strained. Microsoft Purview addresses these challenges with a unified, intelligent platform that dynamically secures data across its lifecycle, enhances governance through built-in data quality and lineage, and automates compliance across hybrid and multicloud environments. By consolidating capabilities like data loss prevention, insider risk management, and federated governance into a single experience, Purview empowers organizations to transform operational complexity into clarity, reduce breach exposure, and enforce regulatory policies with precision. With seamless integration across Microsoft 365 and third-party platforms, built-in AI, and continuous innovation, Purview enables businesses to unlock data value responsibly while staying secure, compliant, and audit-ready—positioning them to thrive in the AI-driven future.


12:00 PM

Lunch and Networking

Lunch and Networking

Cloud & DevSecOps Security

Smart Cities, Smarter Security: Challenges & Solutions

1:30 PM

Title: Digital Trust: Strengthening Privacy in Brunei’s Digital Economy


Presenter: Melbourne Lim | Deloitte

More info

Melbourne Lim

Digital Privacy & Trust Specialist | Deloitte

Conference Synopsis:

Digital trust is the foundation of Brunei’s digital economy, where confidence in data protection drives adoption, innovation, and investment. Strengthening privacy safeguards is critical to ensuring responsible use of personal data and aligning with international standards. This session examines Brunei’s evolving regulatory landscape, the challenges organisations face in embedding effective privacy practices, and the opportunities to position privacy as a strategic advantage.

Title: Cyber-Physical Security in Smart Cities: Protecting ICS and Critical Infrastructure


Presenter: Dr. Ali Tufail | Universiti Brunei Darussalam (UBD)

More info

Dr. Ali Tufail

Senior Assistant Professor and Program Leader for the Cybersecurity and Forensics Program, School of Digital Science | Universiti Brunei Darussalam

Conference Synopsis:

Smart cities are no longer a dream of the future, they are already redefining how we work, live, and interact with our surroundings. From intelligent transport systems to digitalized healthcare, and from integration of renewables to data-led governance, cities are more integrated than ever. But that integration also creates complexity and new security risks.


In this session under the theme "Smart Cities, Smarter Security: Challenges & Solutions", I will be sharing concepts from the research community on how we are addressing these challenges. I will highlight new emerging research trends and technologies such as blockchain, AI-based analytics, and cyber-physical security paradigms, and also touch upon the threats to critical infrastructure, which are at the heart of city life.


Drawing on the most up-to-date research, including work on securing industrial control systems, smart waste management, and trusted IoT, I will show how academia and industry are collaborating to build resilience into the very fabric of smart cities. It is not just a question of locking down standalone systems, but of building a holistic, trustworthy, and sustainable vision of city life.


Through a consideration of current realities and the future course of research, this session will explore how we can make sure that with increasing smartness in our cities, their security also gets smarter.

2:00 PM

Title: Cloud & DevSecOps Security


Presenter: Chan Siang Wei | Huawei

More info

Chan Siang Wei

Industrial Solution Sales Specialist | Huawei Technologies (B) Sdn Bhd

Conference Synopsis:

-

Title: XR Digital Twins: Building Cyber-Smart Foundations for Smart Cities


Presenter: Joseph Kim | YMX Singapore Pte. Ltd

More info

Joseph Kim

Data Protection Officer (DPO) and Head of Global Business Development | YMX Singapore Pte. Ltd

Conference Synopsis:

Smart cities are rapidly evolving into highly interconnected cyber-physical systems. While traditional cybersecurity measures such as firewalls and encryption remain vital, they are no longer sufficient on their own. True resilience also depends on the integrity of operational data, the security of remote collaboration, the ability to visualise and simulate cyber-physical risks, and the preparedness of the human workforce.

This session will examine how XR Digital Twin technologies can strengthen these areas by transforming complex engineering and IoT data into trusted, manageable assets; enabling secure, distributed collaboration environments; and providing immersive training platforms where incident response and compliance can be practised in realistic scenarios.

Through selected case studies, the presentation will demonstrate how digital twins bridge the gap between engineering operations and cybersecurity. By embedding security principles into the very fabric of urban infrastructure, smart cities can move beyond protection to achieve greater sustainability, resilience, and trust.

2:30 PM

Title: Strengthening Cybersecurity in Higher Education through AI-Driven Automation


Presenter: Dr. Ghassan Abdulhabeb | Universiti Islam Sultan Sharif Ali (UNISSA)

More info

Dr. Ghassan Abdulhabeb

Associate Professor | Universiti Islam Sultan Sharif Ali (UNISSA)

Conference Synopsis:

Higher education institutions are increasingly targeted by sophisticated cyber threats that jeopardize sensitive student data, research outputs, and digital learning platforms. Conventional security systems, which rely heavily on manual monitoring and reactive measures, often prove inadequate in addressing these complex challenges. Artificial Intelligence (AI)-driven automation offers a transformative approach by enhancing detection precision, enabling real-time incident response, and streamlining compliance with regulatory standards.


Through automated response systems and AI-enabled predictive analytics, universities can reduce vulnerabilities, minimize human error, and accelerate recovery from attacks. This session will demonstrate how AI-driven cybersecurity frameworks can create resilient, proactive, and future-ready security infrastructures in higher education, while safeguarding academic integrity and supporting institutional innovation.

Title: Fortifying your Cyber Resilience Strategy in the Hybrid Environment


Presenter: Kamal Naresh | Rubrik

More info

Kamal Naresh

Account Director | Rubrik

Conference Synopsis:

The pace of migration to cloud environments is astounding with over 90% of IT leaders managing distributed hybrid environments, according to Rubrik's Zero Labs Report. Unfortunately, hybrid environments have created unprecedented hazards including challenges in securing data systemwide, and growth in attack vectors.

It's no wonder - protecting the hybrid and cloud perimeters comes with inherent challenges. With cloud resources decentralised and easy to deploy, it's easy for data to sprawl across multiple accounts, regions, and clouds, making it hard to keep track of what's protected and how.

And let's not forget, big cloud vendors expect customers to take ownership of their data protection. That means you are solely responsible for keeping your cloud data secure.

We will discuss perspectives on:

The limitations on resiliency with native cloud backup tools, and the onus of responsibility on the user The growing challenge on gaining visibility and consolidating management on your data (especially sensitive data) on where they reside and whether they are protected Cyber resiliency in the cloud - keeping your cloud assets safe, while reducing TCO costs Bouncing back (cleanly and swiftly) from threats when - not if - they strike

Identity, Access, and Zero Trust

The Role of Public Policy in Creating a Cyber Smart Society

3:00 PM

Title: From Login to Last Click: Applying Zero Trust to Consumer Identity & Access


Presenter: Wei See Wong | Group-IB

More info

Wei See Wong

Head of Business Development, Asia Pacific (APAC) | Group-IB

Conference Synopsis:

Zero Trust shouldn’t stop at the office door. While enterprises use Zero Trust to authenticate employees, the largest attack surface sits in customer channels—mobile apps and web portals where identity, intent, and devices constantly change. In this session, we extend Zero Trust principles to customer access. Instead of relying on passwords or one-time MFA alone, we continuously verify who is using the service, what device they’re on, and how they behave at every step. Using Group-IB’s fraud intelligence and behavioral analytics—device fingerprinting, mobile biometrics, anomaly detection, and global risk signals—we turn each customer session into a living risk score that drives adaptive decisions: allow, step-up, limit, or block. You’ll learn a practical blueprint for integrating continuous verification into existing anti-fraud stacks to reduce ATO, mule activity, and scam-driven transfers—without breaking customer experience.

Title: Politeknik Brunei’s Role: Supporting a Cyber-Smart Society


Presenter: Ms. Nurul Afizah binti Zinni | Politeknik Brunei

More info

Nurul Afizah binti Zinni

Education Officer / Lecturer, School of Information Communication & Technology (SICT) | Politeknik Brunei

Conference Synopsis:

The presentation highlights the importance of public policy in creating a cyber-smart society and the critical role of academia in supporting these goals. It will explore how digital transformation has created both opportunities and risks, and why policies are essential in guiding safe, secure participation in the digital world.

The talk will also share how Politeknik Brunei contributes to Brunei’s national cybersecurity and digital economy goals through its academic programs. This includes the launch of the Diploma in Cybersecurity (January 2026 intake) and the integration of Cybersecurity Essentials across all ICT programs. These initiatives aim to produce graduates who are not only technically competent but also responsible and cyber-aware, helping to build a resilient and trusted digital nation.

3:30 PM

Title: Guardians of Data: Navigating Digital Trust with the Data Protection Officer


Presenter: Farah Zainal | Authority for Info-communications Technology Industry of Brunei Darussalam (AITI)

More info

Farah Zainal

Manager | Authority for Info-communications Technology Industry of Brunei Darussalam

Conference Synopsis:

With the enactment of the Personal Data Protection Order. 2025, organisations are expected to appoint at least one Data Protection Officer (DPO). The session explores the key roles and responsibilities which extends beyond legal and regulatory compliance, highlighting effective operational safeguards towards a cybersmart society

Title: Smart Society: Empowering Communities


Presenter: Qamaruzzaman Affandy | Brunei Darussalam Central Bank (BDCB)

More info

Qamaruzzaman Affandy

Brunei Darussalam Central Bank (BDCB)

Conference Synopsis:

True cybersecurity resilience is not built on technology and policy alone – it depends on people. An empowered community is the first and most effective line of defence. This presentation outlines how strategic public policy, through education, inclusive programs, and public-private collaboration, can transform citizens from potential targets into active participants in our digital space. By fostering a culture of shared vigilance and equipping individuals and businesses with the right tools and knowledge, we can further build a resilient, cyber-smart society where every individual plays a role in safeguarding Brunei Darussalam’s security and prosperity.

4:00 PM

Speaker Session 4

Speaker Session 15

4:30 PM

Closing Remarks

Closing Remarks

4:35 PM

Refreshment

Refreshment

WORKSHOP

MEETING ROOM 1 & 2
8:00 AM - 12:00 PM 

Title: See It. Stop It. Orchestrate It: Live Demo of Integrated Threat Visibility, Cloaking, and Response with AntareX (Session 1)

Hosted by: Unified National Networks (UNN)

Presenters: Wong Twee Wan & Sivaganesh | Antarex

More info

Wong Twee Wan

Senior Cybersecurity Consultant | Antarex

Sivaganesh

Cyber Threat Intelligence Officer + SOC Manager | Antarex

Antarex Team

Antarex is a regional cybersecurity provider based in Southeast Asia, supporting ISPs, enterprises, and governments in protecting critical network infrastructure. Their strengths include in-house developed solutions, 24/7 regional SOC operations, modular and easy-to-deploy systems, SLA-backed engagements, and compliance support for ISO, NIST, PCI-DSS, and GDPR. Operating across eight countries, Antarex combines local expertise with global security standards.

 

These solutions are brought exclusively through Unified National Networks (UNN) in Brunei, ensuring alignment with national initiatives on cybersecurity and data sovereignty.

Format:

Live demonstration showcasing Antarex’s integrated solutions in action.


Synopsis:

Hosted in collaboration with UNN, Antarex will showcase how its three flagship solutions XNI, DarkShield, and MXOC works together to deliver continuous protection from the edge to the core. Participants will see how visibility, cloaking, and orchestration combine to form a resilient, proactive defence posture:

  • See threats before they escalate
  • Stop attacks before they breach the perimeter
  • Orchestrate rapid, coordinated responses across the SOC
1:30 PM - 5:00 PM

Title: See It. Stop It. Orchestrate It: Live Demo of Integrated Threat Visibility, Cloaking, and Response with AntareX (Session 2)

Hosted by: Unified National Networks (UNN)

Presenters: Wong Twee Wan & Sivaganesh | Antarex

More info

Wong Twee Wan

Senior Cybersecurity Consultant | Antarex

Sivaganesh

Cyber Threat Intelligence Officer + SOC Manager | Antarex

Antarex Team

Antarex is a regional cybersecurity provider based in Southeast Asia, supporting ISPs, enterprises, and governments in protecting critical network infrastructure. Their strengths include in-house developed solutions, 24/7 regional SOC operations, modular and easy-to-deploy systems, SLA-backed engagements, and compliance support for ISO, NIST, PCI-DSS, and GDPR. Operating across eight countries, Antarex combines local expertise with global security standards.

 

These solutions are brought exclusively through Unified National Networks (UNN) in Brunei, ensuring alignment with national initiatives on cybersecurity and data sovereignty.

Format:

Live demonstration showcasing Antarex’s integrated solutions in action.


Synopsis:

Hosted in collaboration with UNN, Antarex will showcase how its three flagship solutions XNI, DarkShield, and MXOC works together to deliver continuous protection from the edge to the core. Participants will see how visibility, cloaking, and orchestration combine to form a resilient, proactive defence posture:

  • See threats before they escalate
  • Stop attacks before they breach the perimeter
  • Orchestrate rapid, coordinated responses across the SOC
MEETING ROOM 3
8:00 AM - 12:00 PM & 1:30 PM - 5:00 PM

Title: Hands On Cybersecurity AI Workshop: Agentic AI Powered Penetration Testing in N8N

Presenter: Ms Kar Wei Loh | Hexcore Labs

More info

Ms Kar Wei Loh

Founder and CTO | Hexcore Labs

Workshop Abstract:

In this hands-on training, you'll learn how to design and deploy an automated AI-driven workflow in n8n to automate penetration testing tasks. The workflow will:

  • Execute commands on target IPs (e.g., Nmap scans, vulnerability checks)
  • Parse and analyze results (extract open ports, services, CVEs)
  • Leverage AI (LLM/GPT) to suggest next steps (prioritized exploits, misconfigurations, remediation tips)
  • Implement conditional workflow logic for dynamic response to findings

N8N’s intuitive interface allows you to design sophisticated automation flows without advanced AI expertise, allowing future-proof flexibility to easily modify and expand your workflows as new tools and techniques emerge.

Workshop Outline:

  • Automate repetitive pentesting tasks with n8n’s no-code/low-code interface
  • Integrate security tools (nmap, searchsploit) via APIs & CLI
  • Use AI (OpenAI, Deepseek, or other available models) to interpret scan data &
  • recommend actions
  • Build conditional logic to trigger alerts or further exploitation
  • Learn of key methods and algorithms to reduce AI hallucination and improve accuracy
  • A     pplylearnt skills to automate other tasks in Cybersecurity through agentic
  • workflows

Prerequisite:

  • Learners should know the following:
  • Run VMs locally
  • Basic linux terminal navigation and commands
  • Basic enumeration and exploitation methodology

Learners should have a working computer that can run Kali VMs comfortably (At least 8gb RAM). They should have setup and installed the provided Kali VM before the workshop.

MEETING ROOM 4
8:30 AM - 12:00 PM & 1:30 PM - 5:00 PM

Title: Financial Crime & Crypto Asset Tracing & Seizing

Presenter: Mr. Goran Jankoski

More info

Mr. Goran Jankoski

International Cybersecurity Consultant | Manager, ICT Risk Supervision

Workshop Abstract:

Through real-world case simulations, participants will learn how to “follow the money” across the blockchain, identify intermediaries, and uncover exchange cash-out points. They will gain hands-on experience with investigative techniques used in ransomware and fraud cases, while learning how to preserve digital evidence and cooperate effectively with VASPs and international partners. By the end of the course, participants will have added powerful tracing and seizure tools to their investigative toolkit, strengthening their ability to respond to emerging financial crime threats.

BUSINESS CENTER 1
8:30 AM - 12:00 PM

Title: Harmonisation of AI and automation with human expertise to address shared challenges and advance the nation's vision of a cyber-smart society.

Presenter: Muhammad Fahmi bin Mahusin | Progresif Sdn Bhd

More info

Muhammad Fahmi bin Mahusin

Vice President, Enterprise | Progresif Sdn Bhd

Workshop Abstract:

This will be a closed-door workshop led by Progresif Enterprise (Fahmi Mahusin), with support from ST Engineering.


Attendance will be by invitation only, extended by Progresif Enterprise to selected representatives from GLCs, Financial Institutions (FI), and Critical Information Infratructure (CII) sectors.

1:30 PM - 5:00 PM

Title: The Private Cloud Advantage: Securing Our AI Investments While Keeping Data Sovereign

Presenter: Ryan Ty | Global Forum on Cyber Expertise (GFCE)

More info

Ryan Ty

Chairman, Cloud Security Alliance (CSA) | Global Forum on Cyber Expertise (GFCE)

Workshop Abstract:

In a world where cyber threats are faster and more complex than ever, traditional reactive security models are no longer enough. This talk will address the foundational infrastructure required to power AI initiatives, presenting two primary options: the public cloud or building a massive on-premise data center. We will then introduce the private cloud as the strategic third option—a powerful, integrated solution that delivers the scalability and agility of the cloud while keeping critical data in-country and under your complete control.


​The session will highlight how a private cloud platform provides a unified, proactive defense for the entire digital attack surface. We will explore how AI-driven tools can move security teams beyond a fragmented approach, enabling them to predict and prioritize risks with unprecedented speed and accuracy. Attendees will learn how to leverage intelligent automation to secure their valuable AI investments from model theft, data poisoning, and other emerging threats, all within an infrastructure that keeps critical data in-country and under their complete control. This talk provides a strategic blueprint for building a resilient and future-proof cybersecurity program.

00
days
00
hours
00
minutes
00
seconds

Have feedback or a question? Drop it here!


Copyright © Brunei Cyber Security Conference 2025