REVULN 21 Manila is an international cybersecurity conference taking place on 20-22 May 2021 in Quezon City (Philippines) at RED Hotel Cubao. The conference is focused on the following topic with presentations covering countries and areas of Asia: Cybersecurity communities (organizations, hackerspaces, makerspaces and hacklabs) The topic is discussed from different points of view and focused on the countries and personal experiences of the selected international speakers. Each presentation covers a slot of 45 minutes inclusive of questions (Q&A session). A 15 minutes break is available after each presentation for networking and privately talking with the speaker. The event also includes an "open topic day" covering varios areas like cybersecurity, journalism, freedom of information, intelligence, cryptography, data analysis, privacy, censorship, activism, technologies in law enforcement, and others. Main features of the event: - no sponsors, no marketing, and no promoted business - invitation-only and free - guests selected by us and by the attendees - sessions covering specific target topics - focused on the region where the event is hosted (Asia) - networking with people from various countries and fields
The event is invitation-only and free. No tickets available.
Please note that the following agenda is temporary and based on a selection done in March 2020. The final agenda will be released on 1st May and may differ than this one.
|May 20||Thursday - Cybersecurity communities|
|10:30||Frankie LI (Hong Kong)
Building a cybersecurity conference for enhancing domestic cybersecurity capacity
|11:30||Michael Artemio Go REBULTAN (Singapore)
The Cyber Paladins
|14:00||Masakazu TAKASU (China)
Chinese Shanzhai, what and how making and hacking the manufacturing model?
|15:00||Pichaya MORIMOTO (Thailand)
Cybersecurity Groups in Thailand
Digit OKTAVIANTO (Indonesia)
The Growth of Cyber Security Community in Indonesia and its impact for the Nation
Wahyu NURYANTO (Indonesia)
The Journey of Cyber Defense Indonesia Community in the midst of Attack-minded Cyber Society
Satria PRADANA (Indonesia)
Reviving Reversing (Communities) in Indonesia
|May 21||Friday - Cybersecurity communities|
|10:30||Sanoop THOMAS (Singapore)
Building Information Security Community
|11:30||Takayuki TERASHIMA (Japan)
AVTOKYO -no drink, no ___-
|14:00||Narayan KOIRALA (Nepal)
Cyber Security Scenario in Developing Countries: Nepal case study
|15:00||Ammar Hussain JAFFRI, Sufian ANSAR (Pakistan)
Cybersecurity trends in Pakistan
|16:00||Ahmad Ashraff AHMAD (New Zealand), Hanafie NURUDDIN (Malaysia)
Reviving the hacking communities in Malaysia through CTF
|May 22||Saturday - Open Topic|
|10:30||Jose Carlos P. REYES (Philippines)
Cybersecurity Developments in the Philippines
Please note that the following list of speakers is temporary and based on a selection done in March 2020. The final agenda will be released on 1st May and may differ than this one.
Security Analyst Frankie Li is a veteran malware analyst and has taught a graduate course in the topic at Hong Kong University the past 5 years. Founder of Dragon Threat Labs and Hong Kong’s very own DragonCon. Frankie regularly speaks at various security conferences, such as BlackHat, HITCON, HTCIA. Research and Casework include: Malware and APTs, ATMs/POS, IoT, SCADA/ICS Security.
It’s an enjoying experience to establish a technical cybersecurity conference in Hong Kong. The first DragonCon Hong Kong was created in 2016. We want to create a technically-intensive security conference borne out of Hong Kong. In keeping with Hong Kong’s fine reputation as the cyberpunk sprawl giving birth to such engineering marvels as Lik-Sang and where movies and games like Blackhat, Sleeping Dogs and Ghost in the Shell take place, DragonCon’s first conference had IoT as the theme in 2016. It was a successful event. We spent lots of efforts and resources to keep running DragonCon 2017, 2018 and 2019. In this presentation, we are going to share with you our experience, the gain and loss and the path way how we have tuning DragonCon to meet the silent needs in our community. We hope to keep creating DragonCon to build Hong Kong’s cybersecurity capacity even without assistance from government support.
Mike Art Rebultan has more than 17 years of experience combined as an IT and OT professional with a background in PCI-DSS audit management, Unix/Linux server lockdown, and systems administration, R&D, VAPT, DFIR/CSIRT APAC lead, and currently leading the Global Cyber Threat Intelligence (CTI) platform in an ICS/OT company. Holding a master's degree in IT with a concentration in E-Commerce security. He has also a professional graduate diploma in Digital Forensics and Cyber Security as continuing education. Specializing in Computer Forensics, Network Intrusion, Data Breach, Cybercrime Investigation, Malware Analysis, and Reverse Engineering. Security blogger and vlogger as past time hobby and uncovered 7 zero-day malware in the past.
A group of young and restless Cybersecurity professional Filipinos in Singapore who share information on the advance persistent threats (APTs) and tools, techniques, and procedures (TTP's) used by malicious actors among themselves to protect their own individual organizations for defense-in-depth. Every member possesses diverse expertise in the field of IT security - forensics, incident response, malware analysis, networking, threat intelligence, risk management, audit and compliance, programming, offensive security, and threat modeling. Each of the members voluntarily shares knowledge and latest trends on a monthly basis either in the office, restaurant, or coffee shops after office hours. There is no membership fee to become one of the Paladins. The minimum requirement is to have the passion and believes on the very heart of the group: 'In serving each other, we become free!'. The Paladins mantra adheres that human knowledge belongs to the world. Key take away: 1. Learn to organize a meetup for a group of busy and diverse people in a 24x7 environment. 2. Address the challenge of gender and belief differences due to experiences. 3. The secret of quality brain storming through a group chat.
Switch Science, Global Business Development TAKASU Masakazu, Support Maker Faire Shenzhen and Singapore Maker carnival Shanghai and some event, takes us on a journey to his homeland of Japan and their exciting ways of using technology, design and science. He is the most experienced person of Maker Faire in Asia, now based in Shenzhen. He is also connected all around Makers, even in Asia and Japan. His company Switch Science is the most famous maker tool platform in Japan, and also DIY Indie product marketplace. Japanese DIY product grown so rapidly 20 percent per year. His book ECOSYSTEM BY MAKERS is well known in Japan.
Well known Chinese style copycat called SHANZHAI (山寨), and Chinese original style open source hardware model called GONGKAI (公開) named by bunnie are still living. Now Shanzhai engineers and entrepreneurs are helping the Chinese tech giants such as Xiaomi, Oppo and hacking AI robot. I will try to explain: - Where Shanzhai come from. - Investigate their ecosystem and value in modern IoT development. - What has been hacked by Shanzhai. - How they hacked the manufacturing.
Lead Penetration Tester, Siam Thanat Hack Company Limited Pichaya Morimoto (LongCat) is a Lead Penetration Tester of Siam Thanat Hack Company Limited (STH), Thailand. He is highly specialized in application penetration testing. He is also known for organizing and contributing to local hacking groups in Thailand, such as 2600 Thailand and สอนแฮกเว็บแบบแมวๆ (Siam Thanat Hack).
General overview of the current state of cybersecurity groups in Thailand. I will share a timeline and my opinion on the current situations for local infosec groups, including CITEC, ThaiShadow, StepHack, TISA, 2600 Thailand, Sec-Girl & Sec-Guy, MiSSConf, JCSec, and so on (also hacktivists). Next, this presentation will focus on a brief stories about my top 5 local security incidents involving these groups, conflicts, and politics issues in the past and key takeaways. Main points: 1. a well-organized timeline of the local infosec groups in Thailand 2. history of the “free and open for all” of 2600 Thailand meetups, obstacles, and how we organize internally as a non-profit group since 2013 (over 50 meetups) 3. a summary of stories of major security incidents in Thailand References: - History of 2600 Thailand Meeting - Red Pill Conference History
Information Security Consulting Manager at PT. Mitra Integrasi Informatika (Indonesia) I am an information security professional with experiences in Linux server, network security, Security Information and Event Management (SIEM), vulnerability assessment, penetration testing, intrusion analysis, Digital Forensic and Incident Response, Cyber Threat Intelligence, Threat Hunting. Have good experiences also on Managed Security Services (MSS) projects, Security Operation Center, operate and maintain SIEM tools. Having basic knowledge in malware analysis and reverse engineering and doing this activity as a hobby in spare time. I am also Conducting several Linux and IT security training for public or private institutions. I wrote a book in 2013: Cuckoo Malware Analysis published by Packt Publishing. Currently served as Community Leader in Cyber Defense Indonesia Group (CDEF), R&D Team Member at Indonesia Honeynet Project (IHP), R&D Team at AFDI (Asosiasi Forensika Digital Indonesia) - Indonesian DIgital Forensic Association, also member at HTCIA Asia Pacific Chapter. Research and publication related to Threat Hunting and Threat Intelligence. Focusing in Blue Team area. Develop capabilities in adversary simulation, threat hunting, and develop skillset area in Security Operation Center at my current employer. In a spare time conducting various training project related cyber security for National Cyber and Crypto Agency, Indonesian Police Force, National Army, Attorney General's Office, Tax and Finance Bureau. The training topics area Malware Analysis, Threat Hunting, Security Monitoring, Incident Response and Forensic Investigation.
In the past 10 years, the cyber security community has begun widely recognized among Indonesians youngsters. Many individuals create a cyber security community with the aim of showing their existence as well as proving themselves if they are hackers, which in fact most of them are still doing script kiddies activities in the cyber security community. Besides just seeking for attention, there are also communities that are formed by individuals who are professionals in the field of cyber security. One of that community is ECHO, that has been around for a long time in Indonesia with various members who are now successful cyber security professionals. The other cyber security community is Indonesia Honeynet Project community which is a local chapter of Indonesia from the Global Honeynet Project. IHP is a community that operates in the academic area and works closely with government agencies (National Cyber and Crypto Agency). IHP focuses on developing research whose topics range from deception technology, malware analysis, threat hunting. There are also begun to grow a cyber security community that focuses on specific research area. Some of these communities include IT Audit & Security Community, where the community is focused in the areas of Governance, Risk, Compliance and Security which are more directed towards Security Assessment. There is also the Indonesian Bug Bounty community, in which members are individuals who focused on bounty hunting on various platforms such as Hackerone, BugCrowd, SynAck, Intigriti, Yes We Hack, or the Local Bug Hunting Platform in Indonesia. I am also active in the Cyber Defense Community (CDEF), community that is focused in the Blue Team area, where research or discussion is about defensive security such as Security Operations, Threat Hunting, Digital Forensic and Incident Response, Malware Analysis. Since the establishment of BSSN in 2017, BSSN has embraced many communities, and held road shows to various provinces in Indonesia to educate many young people, to develop their skills, mindset, abilities in cyber security to do positive things, such as joining the cyber security community and contribute positively to it. BSSN also proactively created a program called VVDP (Vulnerability Voluntary Disclosure Program), which is a program to bridge hackers and bug hunters who find vulnerabilities in applications or systems in public services and private services in Indonesia, and then report the findings of the vulnerability to BSSN via VVDP. This is a positive form of communication from the government as a forum to bridge young people who are enthusiastic about cyber security, and give an appreciation if they giving report to BSSN through this VVDP program. With the support of the government through various programs, the enthusiasm of young people can be expressed in a positive way rather than they doing acts of vandalism by damaging the system which is a public service. In addition, the government is also helped by the existence of voluntary communities in carrying out their work programs in the realm of cyber security, so as to create an ecosystem that is beneficial for many parties.
Security Operation Manager at PT. Korelasi Persada Indonesia I am experienced as Security Analyst inside Security Operation Center. Most of my experiences are coming from the defense activity like Incident Detection & Response, Threat Hunting, SIEM Engineering, and Digital Forensic Investigation. Currently i served as SOC Lead in a MSSP Company. Most of my responsibility are related to building People and Process to support SOC as Services. Aside from Cyber Defense Indonesia, i also joined Indonesia Honeynet Project since in the University. These are two community that i am actively involved and contributed in the last five years.
Indonesia is the world's largest island country, with more than seventeen thousand islands. In the early 2000 the hype of cybersecurity increased, most of it came from underground community active in IRC channels. Most of the respected community names at that time included ECHO, KECOAK, Jasakom, and many more. Almost all these community are focusing on penetration testing and how to hack computer systems and internet. This increases in community are contributed by internet literacy througout Indonesia. Even though only big cities had proper internet connection at that time, most of the community members are coming from various cities and locations. It is because some of the communities are founded and active in the University area. Several years later, a lot of these hacker community members and founders are involved in professional career leading their own company or a cybersecurity team. But the landscape of the cybersecurity community are still the same, dominated by hacking and pentesting activity. It is really difficult to find community or group that have dedicated discussion in Cyber Defense or Blue Team area. With this concern in mind then we started our own Whatsapp Group consisting of several Security Analyst working in Security Operation Center (SOC). It was only 4 people back then, we shared and discussed a lot of things from malware analysis, intrusion detected at our SOCs and any shareable IoCs. Not enough with only 4 people, we are adding more Security Analyst into the group. It is a referral-based invitation to join or invited to the group. We didn't open it to the public at that time. Later on in the late 2017 we started our first offline Meetup as an effort to introduce this community to more people. Since then the community grow bigger and stronger until now. We have a lot of activity and publications. One of our goals is to increase security awareness in the society. Some of our products including Bulletin, Podcast, Youtube Interview, and offline Meetup of course. Since the beginning of the community there is no formal community structure and no one claimed himself as a founder. That caused difficulties especially when any outside parties invited us to formal events or discussion. So in the late 2019 we started to create formal organization structure for this community with Digit Oktavianto as Community Leader. Most of our activity are funded voluntery from our member. We don't accept any sponsorships at all especially from technology vendors because we don't want just to be their advertisement agent. Even when we share some experiences related to specific technology, it is not because we are endorsed from them, it's just because we use that technology in our daily operation. There are some advantages and disadvantages in such choice, we will talk more about it later in the event. Main points: - CDEF Community activity and its contibutions - How we handle funds and other sponshorships - How we reach more new talents to join this cyber defense area - How we encourage members to share their story and experiences - How we structure the community so that member could be more active participate - What we plan to do and our big goals for this community
Community leader of Reversing.ID
Kaleidoscope of Reverse Engineering communities in Indonesia. This talk gives brief history of reversing communities in Indonesia on the early days of internet. After some years of no significant activities in reverse engineering community, Reversing.ID is found as a community to bridge the old and new generation. This talk also give information about what have Reversing.ID done in the past 3 years and strategy to promote reverse engineering as a fundamental aspect in cyber security. Main points: - History of reverse engineering communities in Indonesia, learning sources, projects, etc. - Introduction to Reversing.ID as community: organization, events, project. - Some interesting collaboration activities with other communities.
Founding Organizer, BSides Singapore Sanoop Thomas is a seasoned security professional with diverse background in consulting, teaching, research and product-based industries with a passion to solve complex security problems. His field of interest includes reverse engineering, malware analysis, application security and automating security pentest/analysis methodologies. He is moderating null open community chapter in Singapore and organised over 60 events and workshops to spread security awareness across country. Sanoop is the author and maintainer of Halcyon IDE project and also create infosec contents and podcasts at InfoSec Campus. He has spoken at multiple international security conferences that includes Nullcon, OWASP India, HITBGSEC, Rootcon, Defcon (Demo Labs) and Blackhat Arsenal (USA and Asia)
This presentation showcases a timeline of stories behind building information security communities in Singapore from my experience in building two successfully running communities – Null Singapore Open Security Group and BSides Singapore. The presentation will discuss the importance of building communities in the industry and takes the audience through a series of processes we followed in Singapore to build the same. Some major learning from these experiences will be shared during this presentation. In the end, we will also discuss some of the key points to help building security community in open structure and scalable way.
AVTOKYO is a community-driven group and event in Japan. Firstly we gathered for a drinking party after some events. The current conference-style was started in 2008. Our Con's motto is “no drink, no hack”. We provide free drinks at conference time, it will help us to communicate with each other. We believe drink and code will overcome a language barrier. In the past several times, our conference attendees will over 300. Our event has no business sponsor. And we made and supported some CTF group in Japan. This talk will show you our history and our community style. Main points: - Community history in Japan - Providing conference with no business sponsors
Founder/ Director Eminence Ways Pvt. Ltd. Mr. Narayan Koirala is a Software Engineer and Cyber Defense Enthusiast. He is the Founder/ Director of Eminence Ways Pvt. Ltd., the first dedicated Cybersecurity Company in Nepal. He is a pioneer in the field of Cyber Security and has been continuously working to uplift the field of IT security in Nepal. Mr. Koirala has extensive experience in resolving Cyber Security issues of Major Financial Institutions, Government Bodies and Private Companies, both at the national and international levels. During his career spanning more than decade in cyber security, Mr. Koirala has witnessed how an organization’s less prioritized data security could face severe problems in the long run. His company, employing more than 35 professionals, has been consistently working to identify IT vulnerabilities and has helped organizations get secured by assisting in minimizing IT Threats. Mr. Koirala also engages in various cybersecurity, tech, entrepreneur communities in Nepal. He encourages practice of Cyber hygiene at individual level with a belief that if employees practice cyber hygiene while using ICT equipment this will eventually lead to a secure organization. He also counsels students from their earlier school days to be ethical and practice white hat culture. Mr. Koirala has been featured in numerous National and International Media where he shared his thoughts about rising cyber incidents and suggested prevention practices. His articles about Cyber Hygiene and Data Security in the fast-paced technological advancement are being followed by many individuals and organizations. Objective of the IVLP program was to share knowledge among experts working in Cybersecurity Domain in developed and developing countries aiming to fight against rising cybercrime. Mr. Koirala holds a Bachelor’s degree in Software Engineering along with an MBA. He is also a certified ISO 27001:2013 Auditor and a certified CISCO CCNA CyberOps professional. Besides, he is associated with the Nepalese Young Entrepreneurs' Forum (NYEF), Lions Club International, and Computer Association of Nepal (CAN) Federation.
This presentation will cover: - Cyber Security Scenario in Developing Countries - Cyber Security Policies at various levels (National, Regulator, Business) - Organizations approach in Cyber Defence - Cyber Security Communities and Activities - Cyber Hygiene Practice followed by people
- President at Pakistan Information Security Association (PISA) - CEO at Security Experts Pvt. Limited - Founding Chairman at Cyber Security Alliance Pakistan - CEO at IoT Center Pakistan - Founder at E-Pakistan Mr. Ammar Jaffri has over 40 years of experience in Governance, Digital Forensics, Information Technology, Security, Education and Philanthropy. He has served and led different departments in the Federal Government of Pakistan, and has been recognized with some of the highest industry honors in national as well as internationally. He serves as the Pakistan point of contact for a number of international initiatives on Cyber Security like the Microsoft Law Enforcement Forum, G-8 24/7 High Tech Crime Network, the OIC-CERT, SAARC CERT, APCERT, Council of the European Union, and with INTERPOL. He retired as the Additional Director General of the Federal Investigation Agency of Pakistan in 2010, and is currently engaged in various public and private projects in a private capacity. He is a well-known speaker on a wide range of subjects including Information Security, Electronic Governance, Business Continuity Planning, Electronic Banking, and emerging trends in communication. Mr. Jaffri’s goal is to improve lives in the rural areas of Pakistan by leveraging information and communication technologies.
- Cyber Security Researcher at Pakistan Information Security Association (PISA) - Manager Information Security and Digital Forensics at Security Experts Pvt. Limited - CTO at CIT-CERT Coordination Center Working as a cybersecurity Professional from last three years in different domains including Offensive and Defensive sides. Has the honor to work on National and International Initiatives under Pakistan Information Security Association PISA including Cyber Drills, Capture the Flags Competitions, Trainings and Conferences. Sufian has been working on First National CERT Coordination Center as a Chief Technology Officer (CIT-CERT Coordination Center). He has conducted First National Cyber Drill on November 13th 2018 and Second National Cyber Drill on November 6th 2019. As an Information Security Manager at Security Experts private limited, he has worked on different investigation projects and as a Corporate Trainer he has trained many individuals especially from Law Enforcement Agencies including Federal Investigation Agency, Anti-Narcotics Force, National Accountability Bureau, Custom Intelligence, Pakistan Air Force and Punjab and KPK Police on "How to Track the Criminals in Cyberspace through Open Source Intelligence". As a cybersecurity Researcher he has worked on Cyber Threat Intelligence, Open Source Intelligence and have good understanding of rapidly evolving trends like AI, Blockchain, Internet of Things and their role in cybersecurity.
The presentation will highlight the current status of cybersecurity and Cyber-Crimes ratio in the country and how different law enforcement organizations are working to improve cybersecurity awareness and capacity building to reduce the cyber-crimes. Many knows that the first computer virus named “Brain” was built by a Pakistani, that wasn’t made for any bad purpose but that was purely built for the protection of copy right. As country like Pakistan have not been participating at international level, but the man power in Pakistan is very much capable of doing great things. This is to showcase that we have great professionals and understanding to work together and share our ideas and understanding to prepare for the upcoming challenges and threats.
Ahmad was a Chemical Engineering graduate but have interest in application security. He got involved with CTF in 2008 when was recruited by his senior in university. With the knowledge obtained through CTF, he secured his first job as a Security Consultant in 2008. Ahmad is currently working as a Security Consultant for a local security company in New Zealand and an active member of Wargames.MY CTF. He also well-known in the bugbounty phenomena and was on top 3 leaderboard all time in Bugcrowd.
Nafiez is an independent security researcher specialized in binary assessment, fuzzing, low-level vulnerability research and reverse engineering. Nafiez has discovered numbers of vulnerability in various software from open source to closed source program. Nafiez has spoken in international and local security conferences. Apart from security research, Nafiez actively organizing Capture the Flag (CTF) event for Wargames.MY and HITB. Nafiez is one of first legacy for Wargames.MY crew.
The lack of technical (read hacking) skills among cybersecurity graduates is one of the primary concern in Malaysia industry. There are many excellent exam results among them, but when in real working life, they know nothing. Capture the flag is one of the approaches where a person could learn and polish their skillset. While there are many universities now organising CTF, sadly, it seems more to gain benefit for ownself (monetary profit & KPI). To cure this toxic culture, Wargames.MY (WGMY) with own initiative organising annual CTF since 2011 for free and at the same time developing and guiding local talents into pursuing the right career based on their skillset. After many years of struggle and educating the community, WGMY finally able to stay active in the cybersecurity industry as one of the best CTF organisers. Many initiatives were planned and executed by us. This presentation aims to share what WGMY had done, achieved, and the next things in our plan to the audience.
Engr. Reyes is a Professional Electronics Engineer, and an ASEAN Engineer. He is currently the Director of the CyberSecurity Bureau under the Department of Information and Communications Technology (DICT). He is currently the president of the National Committee of the Philippines of the International Electrotechnical Commission. He was a former National President of the Institute of Electronics Engineers of the Philippines (IECEP), and was the founding Vice President of the Philippine Association of Government Electronics Engineers (PAGE). He has more than thirty years of professional experience of which fifteen years have been devoted to government service, specifically with the national standards body - Bureau of Philippine Standards (BPS) of the Department of Trade and Industry (DTI). He was a technical manager of SGS Regional Headquarters where he shared his expertise on information security management system, standardization, accreditation, certification, testing, and compliance to international standards such as ISO, IEC, ITU, among others. He has earned a Bachelor’s Degree in Electronics and Communications Engineering and Masters in Business Administration.
- Overview of current cyber security policies in the Philippines - Cyber laws in place - Developments being made to create a strong cyber security strategy - Next steps
Experienced Professor with a demonstrated history of working in the information technology and services industry. Skilled in Data Analysis, Data Mining, and Digital Imaging. Strong education professional with a Master in Management major in Information Technology and a Doctor in Information Technology. A faculty member (Assistant Professor III) of the College of Engineering, Architecture and Technology at the Palawan State University. She received her Master in Management major in Information Technology from the Philippine Christian University in 2011 and her Bachelor of Science in Computer Science from the Holy Trinity University. She is the President of Palaweňo ICT Association, Vice President of National ICT Confederation of the Philippines, Board of Director of Philippine Computing Society Information and Computing Accreditation Board.
Introducing the speakers and handling the Q&A sessions
Is it an in-person event? Yes, all the REVULN conferences are traditional physical events with attendees meeting in-person. What is this event? REVULN is a series of free meetings for invited guests where participants attend the presentations of international speakers and connect with all the selected guests. The idea behind the events, the way they are organized, and the non-commercial goals are unique. No conferences hosted by private companies have similar features. Information about the previous events are available here. Is it a marketing or promotional event? No. We do NOT promote, advertise or sell anything, and we do NOT accept sponsors. The event has been created, planned, and financed by us just for speakers and attendees, completely for free and without any business, promotional activity, or marketing purpose. How joining as speaker? Please check our Call for Papers for details. We provide free accommodation for the international speakers holding presentations for the main topic on the first two days. No "paper" is requested because this is a Call for Speakers where you will only be asked to provide the slides of your presentation before the event. Remember that this is an in-person event and, if selected, you should be able to travel without any problems, this point is very important right now. How do you select the speakers? We follow some rules for the selection like giving priority to speakers from different countries in the region of the event. Submissions for keynotes, from corporate/sales positions, or with undefined content are usually not considered. Priority goes to talks covering the own experience of the speakers, their current research and projects (both professional and personal), information about how their organization operate in the country, and so on. Academic presentations, if submitted, are evaluated case-by-case because we would prefer those with a real practical implementation of what has been already presented to academic conferences. Very important is how the presentation is performed and how comprehensible is the content for both participants with deep knowledge and without any skills in that topic, it's useful to catch their attention and curiosity on the content. Additionally our suggestion is to submit to the Call for Papers even if not matching the main topic on which the first part of the conference is focused, in fact the main topic may change later if there are more interesting submissions covering other subjects, or due to different interests caused by a postponement of the event to a later date. Is the event strictly technical and focused on cybersecurity? No, the event is not an "hacking" conference and our attendees cover various fields with knowledge in different areas. That's the reason why we prefer technical content presented in a way that may be understandable and enjoyable also by people who have no specific background in that field. Cybersecurity still is one of the main points of most of the presentations since it touches every fields nowadays. How can I attend the event? The event is invitation-only, the attendees are selected by us and by our guests. Anyway feel free to contact us if you wish to participate, we are ever looking for interesting guests who can contribute to the events with their presence, knowledge, and suggestions. We would like to sponsor the event. We do not accept sponsors. We work for the press/media. Please send us an email if you would like to participate. We are ever very happy to have journalists from various fields and media at our events. How are the invited guests selected? The expected attendees directly invited by us are mainly from the following categories: - media: journalists, reporters, writers, bloggers, press, agencies, NGOs - governments and law enforcement agencies: police forces, armed forces, military and defense, government owned/funded research organizations, police academies and universities, national CERTs, consulates and embassies, public sector - researchers working in the fields involved by the selected presentations Is there any political motivation? No, REVULN and its team are completely neutral and free from any political and ideological motivation and bias, no matter what are the countries and goals involved. This open minded attitude allows guests from very different and sometimes conflicting fields to attend a relaxed event focused on experiences and information. Will you release the slides of the presentations on the website? Yes, but some speakers may prefer to not share their slides. Are you going to record or stream the sessions? No, we do not take any video recordings of the sessions. I'm an invited guest, can I attend some sessions only? Sure, please check the agenda for the exact schedule of the presentations in which you are interested. Time is a valuable thing and we perfectly know how difficult may be to attend the full day. I'm a journalist, do I have to provide media coverage? We don't expect anything from our guests. The event is for you, not for what you are supposed to return back to us. Do I need a VISA for traveling to the Philippines? People from many countries do not need any VISA for traveling to the Philippines and can stay for 30 days. Please check the Travel Requirements (12. Who can enter the Philippines without entry visa?) for a complete list. How to reach the location of the event? RED Hotel Cubao is located in Quezon City (Metro Manila), just at the side of Cubao MRT3 station. Address: 627 EDSA Cubao, Quezon City, Philippines 1109. Phone: +632 896 7700 The event takes place in the Ruby meeting room (ex Erato) at 4/F. Cubao MRT3Google Maps For reaching the hotel from the airport please use the UBE Express P2P bus or the Grab app. The hotel is located just at the exit of Araneta Center-Cubao of MRT Line 3, Cubao is also the stop of many P2P buses and location of many shopping malls, therefore it's very easy to reach. How to move in Manila? The safest and more practical way is calling a car using the Grab app but please note that traffic is quite heavy during peak hours. What's the situation of COVID-19 in the country? What are the guidelines for the meeting room? Useful websites: - DOH with official data: DOH.GOV.PH - Tourism Authority: TOURISM.GOV.PH - Manila Airport: FACEBOOK.COM - WHO about the country: WHO.INT - World Nomads: WORLDNOMADS.COM Any requirements, restrictions, and limits on the capacity of the meeting room depend by hotel and health department. Once the capacity of the meeting room is reached, the other guests can wait and do networking in the adiacent spaces. Do I have to bring something with me? -