This event has ended. Visit the official site or create your own event on Sched.
Welcome to the Interactive Agenda for SecurityWeek’s 2021 APAC ICS Cyber Security Conference! 
Back To Schedule
Wednesday, June 23 • 2:15pm - 3:00pm
Breaking Entrypoint: An In-depth Data Breaches Analysis to the Critical Infrastructure of the Asia Pacific

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Recently, many enterprises globally have suffered from leaks of sensitive customer or employee information due to APT attacks, malware attacks, insider leaks, or mis-configured settings. Data breaches have a considerable impact: harming corporate reputations, causing business to be lost, and causing risk for customers. If bad actors acquire leaked data , we can easily imagine the harmful consequences. The critical infrastructures of Asia Pacific countries such as Taiwan, Japan, and Singapore are equally affected by these risks. If sensitive information about employees or external services leaks, hackers can easily apply it to social engineering or advanced continuous penetration attacks. Furthermore, a critical infrastructure security incident can cause more than financial loss – it can also create a threat to the safety of physical equipment or to people’s lives and property.

This is a series of research including data gathered from the USA, Asia Pacific, and global ICS vendors. This part will collect publicly leaked data and share some of the traps and fun that we found during the analysis and focus on Asia Pacific. We will also share how we have used our unique automatic analytical process for building on the cloud to conduct big data analysis on more than 10 billion pieces of data from 200 plus datasets, with a particular focus on the analysis of data leakage, password habits, follow-up effect, and cross-country analysis of Asia’s critical infrastructure service providers. Based on the in-depth analysis of our data, we will try to provide predictions and warnings to high-risk CI sectors that may be invaded due to information leakage. Finally, we will advise how to perform prevention and mitigation measures.

avatar for Mars Cheng

Mars Cheng

Threat Researcher, TXOne Networks
Mars Cheng is a threat researcher for TXOne Networks, blending background and experience in both ICS/SCADA and Enterprise cybersecurity systems. Mars has directly contributed to more than 10 CVE-IDs, and has had work published in three Science Citation Index (SCI) applied cryptography... Read More →
avatar for YenTing Lee

YenTing Lee

Cyber Threat Researcher, TXOne Networks
YenTing Lee is a Cyber Threat Researcher at the TXOne Networks IoT/ICS Security Research Labs. Before joining TXOne, YenTing was a Section Head at the Taiwan National Center for Cyber Security Technology (NCCST). He has experience in both ICS/SCADA and Cyber Offensive and Defensive... Read More →

Wednesday June 23, 2021 2:15pm - 3:00pm GMT+08