Critical Infrastructure Protection & Resilience Asia

Specialized Training

Registration Now Open

Book online today – Click here to Register Online >>

Cyber Defense Strategies: Tools, Techniques, Response and Procedures

1 Day Specialized Training Workshop

Hosted by CyberSecurity Malaysia

Tuesday 17th July 2018


CyberDEF, is a comprehensive cyber security solution for Detection, Eradication and Forensic Investigation against cyber threats. It is a service that helps:
– To strengthen the organization by fortifying the CSIRT team with required skills, policies/procedures and systems.
– To expose the organization towards cyber threats by participating in cyber drills/exercise and intelligence.

CyberDEF also aims to equipped organization with cyber analytic capabilities which are:
– To identify emerging threat patterns To anticipate intrusions and infections To investigate cyber threats
– To analyse the possible threats

CyberDEF Methodology

Cyber Defense Strategies: Tools, Techniques, Response and Procedures

1. Workshop details

This training is specially conducted to equip participants with the intermediate knowledge in incident handling, forensic analysis, threat intelligence and cyber defense strategies in mitigating operational risks. Participants will be exposed to security environment through experience sharing, case studies and hands on exercises by doing relevant analysis with related tools. The Standard Operating Procedure (SOP) will be covered and the way reports should be presented on the analysis findings to the stakeholders.

2. Workshop plan (with time duration)
Module 1 (3 hours):
– Cyber Threat Landscape and Intelligence
– Cyber Defense Strategies in Mitigating Operational Risks
– Security Incident Handling Objective, Importance, Definition, Classification, Response Level, Priorities and Steps
– Digital Forensics First Responder Procedures, Forensic Analysis and Report
Module 2 (1 1/2 hours hands-on):
– Log analysis, Real Sample Incidents and Case Study
Module 3 (1 1/2 hours hands-on):
– Analyzing malware samples, Real Sample Incidents and Case Study

3. Resource requirements by the master trainers (administrative/technical)
– Projector and Audio system

4. Resource requirements for the participants (e.g., laptop, any particular software, network environment, etc.)
– Have a computer system at least 8GB of RAM and 60GB of free disk space

5. Prerequisite for the participants, if any.
– Participants should have a decent knowledge of computer and operating system fundamentals. Computer programming fundamentals and Windows in general experience is recommended.
– Be familiar with using Windows operating systems and be able to troubleshoot general OS connectivity and setup issues.
– Be familiar with VMware or VirtualBox and able to import and configure virtual machines.
– Have a general idea about core programming concepts such as variables, loops and functions in order to quickly grasp the relevant concepts in this area. Programming skill is not necessary but recommended


Dr Aswami Ariffin (DrAA) Senior Vice President & Digital Forensics Scientist CyberSecurity Malaysia

Dr Aswami Ariffin (DrAA) is a digital forensics scientist with vast experience in security assurance, threat intelligence, incident response and digital forensic investigation with various law enforcement agencies/regulatory bodies and provided expert testimonies in court.

Due to his immense contribution in cyber security and fighting cybercrimes, DrAA was awarded ISLA – Information Security Leadership Award in 2009 by (ISC)2 USA including commendation letter from the Attorney General’s Chambers Malaysia and a certificate of appreciation from the Royal Malaysia Police in 2010. He is also appointed as an expert referral with the New South Wales Police, Australia and a member of Interpol Digital Forensics Expert Group.

DrAA is active in research and one of his papers was accepted for publication in the Advances in Digital Forensics IX, 2013. He also involves as a committee member for the digital forensics program of the prestigious International Conference on Availability, Reliability and Security (ARES). He has secured several research and development funds from the government to develop digital forensics and computer security incident response team (CSIRT) capabilities in Malaysia.

Currently, DrAA is Senior Vice President of Cyber Security Responsive Services at CyberSecurity Malaysia. He provides input on strategic direction, technical leadership and marketing strategy for Digital Forensics Department (CyberCSI), Malaysia Computer Emergency Response Team (MyCERT – Cyber999) and Secure Technology Services (STS – CyberDEF).

DrAA is regularly consulted by the government, industries, universities and media on cyber security issues, strategies, research and development; also invitation as keynote speaker in conferences and providing expertise in community work.