www.govware.sg Open in urlscan Pro
2606:4700:20::681a:ecf  Public Scan

Submitted URL: https://buzz.f5.com/NjUzLVNNQy03ODMAAAGHTyVDXawVwfZChfhqVJCjPvD3d642wpUVAufrFUH6I38KFzsmPy4vRSQhvZdMNC6CWsmgouI=
Effective URL: https://www.govware.sg/govware-2022-full-agenda/ransomware-ransom-war-evolving-landscape-threats-cloud-databases?mkt_to...
Submission: On October 07 via api from SG — Scanned from DE

Form analysis 4 forms found in the DOM

<form class="p-form p-form--type-widget-wishlist-email">
  <div class="p-form__group p-form__group--email">
    <div class="p-form__group__label-wrapper">
      <label class="p-form__group__label">Email this List</label>
    </div>
    <div class="p-form__group__control-wrapper">
      <input type="email" class="p-form__group__control" required="" placeholder="john@email.com">
    </div>
  </div>
  <div class="p-form__actions">
    <div class="p-form__actions__secondary">
      <button class="p-button p-button--secondary button--secondary js-wishlist-back-to-wishlist"><i class="fal fa-arrow-left"></i> Wishlist</button>
    </div>
    <div class="p-form__actions__primary">
      <button class="p-button p-button--primary button--primary js-wishlist-body-emailpdf">Email this List</button>
    </div>
  </div>
</form>

Name: icalFormPOST __cal/v3?id=3571

<form name="icalForm" method="POST" action="__cal/v3?id=3571" class="">
  <input type="hidden" name="LOCATION" value="Level 3, Room GW2 | Sands Expo and Convention Centre"><input type="hidden" name="TIMEZONEID" value=""><input type="hidden" name="ENDTIME" value="20-Oct-2022 15:00"><input type="hidden" name="STARTTIME"
    value="20-Oct-2022 13:30"><input type="hidden" name="DESCRIPTION"
    value="The attackers are targeting cloud databases used for modern applications to subvert the integrity and confidentiality of the stored data. Databases, including MongoDB, Elasticsearch, etc., are being infected with ransomware and exploited in the wild to conduct data exfiltration and data destruction. This talk will present a threat landscape of ransomware and botnet infections in the databases deployed for modern applications. The talk unveils the techniques and tactics for detecting ransomware and botnet infections in cloud databases by practically demonstrating the detection of real-world infections using developed tools. The audience can use the tools to conduct an efficient security assessment of cloud databases against severe infections. The talk equips threat researchers and penetration testers to build threat intelligence that can be consumed at a large scale. The audience will visualise real-time ransomware detection in cloud databases, including interesting insights into how these databases are compromised. &nbsp;"><input
    type="hidden" name="HTMLDESCRIPTION"
    value="<p>The attackers are targeting cloud databases used for modern applications to subvert the integrity and confidentiality of the stored data. Databases, including MongoDB, Elasticsearch, etc., are being infected with ransomware and exploited in the wild to conduct data exfiltration and data destruction. This talk will present a threat landscape of ransomware and botnet infections in the databases deployed for modern applications. The talk unveils the techniques and tactics for detecting ransomware and botnet infections in cloud databases by practically demonstrating the detection of real-world infections using developed tools. The audience can use the tools to conduct an efficient security assessment of cloud databases against severe infections. The talk equips threat researchers and penetration testers to build threat intelligence that can be consumed at a large scale. The audience will visualise real-time ransomware detection in cloud databases, including interesting insights into how these databases are compromised.</p> <p>&amp;nbsp;</p>"><input
    type="hidden" name="summary" value="&quot;Ransomware&quot; or &quot;Ransom-War:&quot; Evolving Landscape of Threats in Cloud Databases (GovWare 2022)"><input type="hidden" name="name"
    value="&quot;Ransomware&quot; or &quot;Ransom-War:&quot; Evolving Landscape of Threats in Cloud Databases (GovWare 2022)">
  <div class="p-form__group form__group">
    <div class="p-form__group__controls form__group__controls">
      <button type="submit" class="button" id="vCalSubmitButton">Add to Calendar</button>
    </div>
  </div>
</form>

Name: searchformPOST __search

<form name="searchform" action="__search" class="w-search__form" method="post">
  <div class="w-search__form__title"> Search </div>
  <div class="p-form__group form__group">
    <div class="p-form__group__controls form__group__controls"><input class="w-search__form__input" id="q" type="text" name="q" placeholder="Search"></div>
  </div>
  <div class="p-form__group form__group">
    <div class="p-form__group__controls form__group__controls"><button class="w-search__form__submit" name="searchSubmitButton" id="searchSubmitButton" type="submit">Search</button></div>
  </div>
</form>

POST __zone/dologin

<form action="__zone/dologin" class="w-zone-login__form zoneloginform" method="post">
  <input value="LOGIN" id="formID" type="hidden" name="formID">
  <div class="p-form__group form__group">
    <div class="p-form__group__title form__group__title"><label required="required" for="username" class="p-form__group__title__label form__group__title__label" showrequiredicon="true">Username *</label></div>
    <div class="p-form__group__controls form__group__controls"><input autocomplete="off" class="w-zone-login__form__input" id="username" type="text" required="required" name="username" placeholder="Username"></div>
  </div>
  <div class="p-form__group form__group">
    <div class="p-form__group__title form__group__title"><label required="required" for="password" class="p-form__group__title__label form__group__title__label" showrequiredicon="true">Password *</label></div>
    <div class="p-form__group__controls form__group__controls"><input autocomplete="off" class="w-zone-login__form__input" id="password" type="password" required="required" name="password" placeholder="Password"></div>
  </div>
  <div class="p-form__group form__group">
    <div class="p-form__group__controls form__group__controls"><button class="button w-zone-login__form__submit" name="loginSubmitButton" id="loginSubmitButton" type="submit">Login</button></div>
  </div>
</form>

Text Content

 * Upcoming Events
 * Home
 * GovWare Conference & Exhibition
   * Speakers
   * Agenda
   * Passes and Rates
   * Expo & Sponsors
   * Plan Your Visit
   * Media Accreditation
   * 2021 Highlights
   * 2019 Highlights
 * GovWare Focus Series
   * 2020 Highlights
 * News & Media
 * Contact Us
 * Search

 * LinkedIn
 * Twitter
 * Facebook

Learn. Engage. Innovate.


0


WISHLIST

Add some favourites to your wishlist to get started!
Email this List Download
Generating...
Email this List

Wishlist
Email this List



 * Upcoming Events
 * Home
 * GovWare Conference & Exhibition
   * Speakers
   * Agenda
   * Passes and Rates
   * Expo & Sponsors
   * Plan Your Visit
   * Media Accreditation
   * 2021 Highlights
   * 2019 Highlights
 * GovWare Focus Series
   * 2020 Highlights
 * News & Media
 * Contact Us
 * Search

 * LinkedIn
 * Twitter
 * Facebook

 * Join the Community
 * Contact Us


GOVWARE 2022 FULL AGENDA

Loading


"RANSOMWARE" OR "RANSOM-WAR:" EVOLVING LANDSCAPE OF THREATS IN CLOUD DATABASES

20 Oct 2022
13:30 - 15:00
Level 3, Room GW2 | Sands Expo and Convention Centre
Cloud Native Security

The attackers are targeting cloud databases used for modern applications to
subvert the integrity and confidentiality of the stored data. Databases,
including MongoDB, Elasticsearch, etc., are being infected with ransomware and
exploited in the wild to conduct data exfiltration and data destruction. This
talk will present a threat landscape of ransomware and botnet infections in the
databases deployed for modern applications. The talk unveils the techniques and
tactics for detecting ransomware and botnet infections in cloud databases by
practically demonstrating the detection of real-world infections using developed
tools. The audience can use the tools to conduct an efficient security
assessment of cloud databases against severe infections. The talk equips threat
researchers and penetration testers to build threat intelligence that can be
consumed at a large scale. The audience will visualise real-time ransomware
detection in cloud databases, including interesting insights into how these
databases are compromised.

 

Speakers

Dr Aditya Sood, Senior Director of Threat Research and Security Strategy, Office
of the CTO - F5


Add to Calendar
 * 
 * 

ABOUT

 

GovWare is the premier cybersecurity intel and connectivity platform for the
latest trends in technology, organisational implementation and user perspectives
in all things cybersecurity.

Organised by



CONTACT

General Enquiries
+65 9060 0562
enquiries@govware.sg

Registration
registration@govware.sg

Sponsorship & Exhibition
+65 9683 0047 (Ian Monteiro)
imonteiro@image-engine.biz

+65 8113 1370 (Joanne Tan)
joanne@govware.sg

LOCATION

IMAGE ENGINE PTE LTD

60 Paya Lebar Road #11-15/16
Paya Lebar Square, Singapore 409051

 

USEFUL LINKS

→ Register Interest

→ GovWare 2022

→ GovWare 2021

→ GovWare 2019

→ GovWare Focus 2022 Series

→ GovWare Focus 2020

→ Sponsorship Opportunities

→ Contact Us

→ News & Media

→ Privacy Policy

→ Code of Conduct

 * © GovWare 2022. All rights reserved
 * © Image Engine Pte Ltd
 * Business Registration No: 200400859K
 * Registered in Singapore at 60 Paya Lebar Road, #11-15/16, Singapore 409051

Exhibition Website by ASP
Search

Search
Username *

Password *

Login

By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.

Manage Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Cookies Details‎

LEGITIMATE INTEREST

Legitimate Interest

These cookies we have deemed to be a legitimate interest for our website users
as they allow functionality of the website to be visible to users which would
allow greater functionality of our website and a greater user experience.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Confirm My Choices