Skip to main content

Cyber Battle Talks 2023


Calendar Saturday, 30 September 2023

Clock 8:30 AM - 3:15 PM

pinlocation JIS Arts Centre, Jerudong International School


Look Who's Talking

8:30am - 9:15am

Defense Against Black Hats

Delve into the critical realm of secure coding as a proactive strategy to thwart malicious activities conducted by black hat hackers. In an increasingly interconnected digital landscape where cyber threats loom large, understanding the techniques employed by malicious actors is paramount. This presentation will shed light on the methodologies employed by black hat hackers, shedding light on their motives and the vulnerabilities they exploit. 

The core focus of this presentation is to equip developers with a comprehensive toolkit to write secure code through a multifaceted approach encompassing input validation, secure authentication, data sanitization, and robust error handling. By comprehending the top vulnerabilities commonly exploited, such as SQL injection, Cross Site Request Forgery, and DDOS, attendees will gain practical insights into fortifying their code against these potential breaches. 

You will also learn the significance of staying updated with the latest security practices and leveraging frameworks that facilitate secure coding. By emphasizing secure coding best practices, the speakers aim to empower developers to proactively anticipate and thwart potential cyber threats, reinforcing the software development lifecycle with a strong defensive posture. Attendees will emerge with a renewed understanding of the pivotal role secure coding plays in safeguarding digital assets and user data.


Muhammad Hanif Bin Jumat
Operations Officer, ITPSS Sdn Bhd

Hanif is a UTB graduate with a Master's in Information Security. He specializes in software development, building secure IT infrastructure and ensuring secure operations throughout software development process.


Iman Izzat Farhan Mohd Norazman
Operations Officer, ITPSS Sdn Bhd

Iman is a full-stack web developer as well as a block chain developer. Certified in SANS GWEB, his expertise lies in .NET Web Development and Hyperledeger Fabric.

9:20am - 10:00am

Islamic Views on Digital/Cyber Security: Exemplifying Maqasid Sharia in Cybersecurity

Islamic perspectives on digital/cyber security exemplify the principles of Maqasid Sharia, which guide ethical and moral considerations in Islamic jurisprudence. These views emphasize safeguarding fundamental values in the digital realm, aligning with the five pillars of Maqasid Sharia.

1. Protection of Life (Hifz al-Nafs):  Islamic teachings prioritize the sanctity of life. Applying this to digital security means preventing harm from cyber threats, ensuring individuals' safety and well-being in online interactions.

2. Protection of Religion (Hifz al-Din):  Preserving the digital space from harmful activities safeguards the integrity of religious information and platforms. Cybersecurity efforts maintain the sanctity of religious content and prevent its misuse.

3. Protection of Intellect (Hifz al-Aql): Cybersecurity safeguards intellectual property and knowledge, aligning with Islam's emphasis on learning, innovation, and the protection of ideas.

4. Protection of Progeny (Hifz al-Nasl):  Digital privacy is vital to protect individuals and families from harm. Islamic values of modesty and respect for relationships extend to the digital world, advocating for privacy and ethical conduct.

5. Protection of Property (Hifz al-Mal): Digital security prevents theft and fraud, aligning with Islam's principles of economic justice and responsible wealth management.


Mohamad Bazli Azhar bin Haji Mohd Yussof
Post Graduate, Faculty of Islamic Development Management of UNISSA

Bazli Azhar is a passionate speaker and UNISSA scholar. His master's journey focused on "Realizing Digital Economy Master Plan in Brunei Darussalam," showcasing his development management prowess. Renowned for sharing insights on Digital Economy Master Plans and Strategy in Academic and International Conferences across the region, he is eager to shed light on Islamic views of Digital/Cyber Security that spark engaging dialogues.

Morning Break

10:15am - 10:55am

Making My Own JARVIS

The presentation aims to discuss how artificial intelligence (AI) can be used in a secure manner to enable useful features like accessing information from digital documents. The key focus is on sharing sensitive information with AI tools without leaking data to the internet and interacting with documents using natural language.

AI assistants like chatbots and voice assistants are becoming increasingly common. However, many people are concerned about privacy and data security when using these tools. The presentation seeks to address these issues by demonstrating how AI can be implemented in a safe and responsible manner.


Abdul Qoyyuum Bin Haji Abdul Kadir 
Content Leader, Anak IT Brunei

Abdul Qoyyuum is a Full Time SysAdmin from Card Access Services. Enthusiastic in Full Stack App Development. Always eager to try new technologies when he gets a chance.

11:00am - 11:30am

From Noob to Junior Pentester:
 How to Get Started in Pentesting

Thinking of transitioning to pursue a career in cybersecurity and pentesting but not sure if your background is right? This presentation aims to provide valuable insights and guidance to individuals who are looking to transition into the field of IT and cybersecurity from an individual who managed to achieve it!

From Noob to Junior Pentester: How to Get Started in Pentesting chronicles the transition of Rahman Harith, once a geographer, as he shares an unexpected career path into the dynamic realm of cybersecurity. His journey from studying Geography to becoming a certified penetration tester demonstrates that with determination, self-study, and a willingness to learn, it's possible to carve a successful path in a technical field like cybersecurity. His perspective can offer a relatable roadmap, tips and encouragement to individuals who are considering making a similar transition. 


Rahman Harith
Server Administrator

A professional system and server administrator with experience ranging in IT infrastructure and networking, Rahman is also a Certified Junior Pentester. Having spent 4 years with a degree in Geography he switched to MSc IT the following year. After 5 years of moving around within the different roles in IT, he started self-studying cybersecurity during COVID. His background and experience will aim to provide valuable insight on how to transition into cybersecurity for beginners.


2:00pm - 3:15pm

Ransomware for Incident Responders

Note: Due to unforseen circumstances, this presentation will substitute the previously scheduled presentation on “Investigating Container Breaches Using Memory Forensics”. We apologise for any inconvenience caused.


The rise of ransomware has had severe economic and reputaFonal consequences for public and private sector alike. In this talk, Delaney introduces the various types of ransomware, how to deal with the specifics of ransomware to prepare for, detect, hunt and response to, and deal with the aftermath of ransomware. In addition, he will also review what artifacts to collect, how to collect them and how to parse the data. Armed with real life examples, both seasoned incident responders and those who are just starting out will be able to take away new insights from this talk.


Delaney Ng
Technical Director Asia Pacific, SANS Institute

Delaney is the Technical Director for SANS Asia Pacific. He provides technical guidance to SANS clients and supports the development of SANS Curricula as well as lab exercises. Prior to joining SANS, Delaney served in the public sector as a cyber defender,spending most of his career in the SOC before leading the red team. Apart from Offensive Security certifications, Delaney is also a GSE and holds several SANS certifications and has been the TA/virtual TA for FOR6 10. He is also a Smart Nation Fellow with Singapore GovTech. 


Book your spot now.
Registration is free.

Register now


Here’s how you can reach us for more info.