logo

REVULN 20 Manila
Metro Manila (Philippines)
(postponed)


Information

REVULN 20 Manila is an international cybersecurity conference taking place on (postponed) in Metro Manila (Philippines) at RED Hotel Cubao.

The conference is focused on the following topic with presentations covering countries and areas of Asia:

    Cybersecurity and hacking communities
    (organizations, hackerspaces, makerspaces and hacklabs)

The topic is discussed from different points of view and focused on the countries and personal experiences of the selected international speakers.
Each presentation covers a slot of 45 minutes inclusive of questions (Q&A session).
A 15 minutes break is available after each presentation for networking and privately talking with the speaker.

The conference also includes an "open topic day" covering cybersecurity, journalism, freedom of information, intelligence, cryptography, data analysis, cyber resiliency, data privacy, censorship, activism, technologies in law enforcement, and other topics.

Main features of the event:
    - no sponsors, no partners, no sponsored talks, no marketing or promoted business
    - invitation-only and free
    - guests selected by us and by the attendees
    - sessions covering specific target topics
    - focused on the region where the event is hosted (Asia)
    - improved networking with people from different countries and fields


Registration and tickets

The event is invitation-only and free. No tickets available.


Agenda / Programme

Dec 2Wednesday - Cybersecurity and hacking communities
10:00Entrance
10:30Frankie LI (Hong Kong)
Building a cybersecurity conference for enhancing domestic cybersecurity capacity
15 minutes break for networking
11:30Michael Artemio Go REBULTAN (Singapore)
The Cyber Paladins
15 minutes break for networking
12:30Break
14:00Masakazu TAKASU (China)
Chinese Shanzhai, what and how making and hacking the manufacturing model?
15 minutes break for networking
15:00Pichaya MORIMOTO (Thailand)
Cybersecurity Groups in Thailand
15 minutes break for networking
16:00 Digit OKTAVIANTO (Indonesia)
The Growth of Cyber Security Community in Indonesia and its impact for the Nation

Wahyu NURYANTO (Indonesia)
The Journey of Cyber Defense Indonesia Community in the midst of Attack-minded Cyber Society

Satria PRADANA (Indonesia)
Reviving Reversing (Communities) in Indonesia
15 minutes break for networking
17:00Networking

Dec 3Thursday - Cybersecurity and hacking communities
10:00Entrance
10:30Sanoop THOMAS (Singapore)
Building Information Security Community
15 minutes break for networking
11:30Takayuki TERASHIMA (Japan)
AVTOKYO -no drink, no ___-
15 minutes break for networking
12:30Break
14:00Narayan KOIRALA (Nepal)
Cyber Security Scenario in Developing Countries: Nepal case study
15 minutes break for networking
15:00Ammar Hussain JAFFRI, Sufian ANSAR (Pakistan)
Cybersecurity trends in Pakistan
15 minutes break for networking
16:00Ahmad Ashraff AHMAD (New Zealand), Hanafie NURUDDIN (Malaysia)
Reviving the hacking communities in Malaysia through CTF
15 minutes break for networking
17:00Networking

Dec 4Friday - Open Topic
10:00Entrance
10:30Jose Carlos P. REYES (Philippines)
Cybersecurity Developments in the Philippines
15 minutes break for networking
11:30TBA ()
TBA
15 minutes break for networking
12:30Break
14:00TBA ()
TBA
15 minutes break for networking
15:00TBA ()
TBA
15 minutes break for networking
16:00TBA ()
TBA
15 minutes break for networking
17:00Networking

Please note that this agenda is just the selection of speakers that was planned for the original date of the event (2020 April 28-30) before the worldwide restrictions. It will be changed and/or confirmed before the new dates of the event.


Speakers details



speaker
Mr. Frankie LI
link link link
Security Analyst

Frankie Li is a veteran malware analyst and has taught a graduate course in the topic at Hong Kong University the past 5 years.
Founder of Dragon Threat Labs and Hong Kong’s very own DragonCon.
Frankie regularly speaks at various security conferences, such as BlackHat, HITCON, HTCIA.
Research and Casework include: Malware and APTs, ATMs/POS, IoT, SCADA/ICS Security.
Building a cybersecurity conference for enhancing domestic cybersecurity capacity
It’s an enjoying experience to establish a technical cybersecurity conference in Hong Kong.
The first DragonCon Hong Kong was created in 2016.
We want to create a technically-intensive security conference borne out of Hong Kong.

In keeping with Hong Kong’s fine reputation as the cyberpunk sprawl giving birth to such engineering marvels as Lik-Sang and where movies and games like Blackhat, Sleeping Dogs and Ghost in the Shell take place, DragonCon’s first conference had IoT as the theme in 2016. It was a successful event.
We spent lots of efforts and resources to keep running DragonCon 2017, 2018 and 2019.

In this presentation, we are going to share with you our experience, the gain and loss and the path way how we have tuning DragonCon to meet the silent needs in our community.
We hope to keep creating DragonCon to build Hong Kong’s cybersecurity capacity even without assistance from government support.


speaker
Mr. Michael Artemio Go REBULTAN
link
Mike Art Rebultan has more than 17 years of experience combined as an IT and OT professional with a background in PCI-DSS audit management, Unix/Linux server lockdown, and systems administration, R&D, VAPT, DFIR/CSIRT APAC lead, and currently leading the Global Cyber Threat Intelligence (CTI) platform in an ICS/OT company.

Holding a master's degree in IT with a concentration in E-Commerce security.
He has also a professional graduate diploma in Digital Forensics and Cyber Security as continuing education.

Specializing in Computer Forensics, Network Intrusion, Data Breach, Cybercrime Investigation, Malware Analysis, and Reverse Engineering.
Security blogger and vlogger as past time hobby and uncovered 7 zero-day malware in the past.
The Cyber Paladins
A group of young and restless Cybersecurity professional Filipinos in Singapore who share information on the advance persistent threats (APTs) and tools, techniques, and procedures (TTP's) used by malicious actors among themselves to protect their own individual organizations for defense-in-depth.

Every member possesses diverse expertise in the field of IT security - forensics, incident response, malware analysis, networking, threat intelligence, risk management, audit and compliance, programming, offensive security, and threat modeling.

Each of the members voluntarily shares knowledge and latest trends on a monthly basis either in the office, restaurant, or coffee shops after office hours.

There is no membership fee to become one of the Paladins.
The minimum requirement is to have the passion and believes on the very heart of the group: 'In serving each other, we become free!'.
The Paladins mantra adheres that human knowledge belongs to the world.

Key take away:
1. Learn to organize a meetup for a group of busy and diverse people in a 24x7 environment.
2. Address the challenge of gender and belief differences due to experiences.
3. The secret of quality brain storming through a group chat.


speaker
Mr. Masakazu TAKASU
link link link link link
Switch Science, Global Business Development

TAKASU Masakazu, Support Maker Faire Shenzhen and Singapore Maker carnival Shanghai and some event, takes us on a journey to his homeland of Japan and their exciting ways of using technology, design and science.
He is the most experienced person of Maker Faire in Asia, now based in Shenzhen.
He is also connected all around Makers, even in Asia and Japan.
His company Switch Science is the most famous maker tool platform in Japan, and also DIY Indie product marketplace.
Japanese DIY product grown so rapidly 20 percent per year.
His book ECOSYSTEM BY MAKERS is well known in Japan.
Chinese Shanzhai, what and how making and hacking the manufacturing model?
Well known Chinese style copycat called SHANZHAI (山寨), and Chinese original style open source hardware model called GONGKAI (公開) named by bunnie are still living.

Now Shanzhai engineers and entrepreneurs are helping the Chinese tech giants such as Xiaomi, Oppo and hacking AI robot.
I will try to explain:
- Where Shanzhai come from.
- Investigate their ecosystem and value in modern IoT development.
- What has been hacked by Shanzhai.
- How they hacked the manufacturing.


speaker
Mr. Pichaya MORIMOTO
link link link link link link link
Lead Penetration Tester, Siam Thanat Hack Company Limited

Pichaya Morimoto (LongCat) is a Lead Penetration Tester of Siam Thanat Hack Company Limited (STH), Thailand.
He is highly specialized in application penetration testing.
He is also known for organizing and contributing to local hacking groups in Thailand, such as 2600 Thailand and สอนแฮกเว็บแบบแมวๆ (Siam Thanat Hack).
Cybersecurity Groups in Thailand
General overview of the current state of cybersecurity groups in Thailand.
I will share a timeline and my opinion on the current situations for local infosec groups, including CITEC, ThaiShadow, StepHack, TISA, 2600 Thailand, Sec-Girl & Sec-Guy, MiSSConf, JCSec, and so on (also hacktivists).
Next, this presentation will focus on a brief stories about my top 5 local security incidents involving these groups, conflicts, and politics issues in the past and key takeaways.

Main points:
1. a well-organized timeline of the local infosec groups in Thailand
2. history of the “free and open for all” of 2600 Thailand meetups, obstacles, and how we organize internally as a non-profit group since 2013 (over 50 meetups)
3. a summary of stories of major security incidents in Thailand

References:
- History of 2600 Thailand Meeting
- Red Pill Conference History


speaker
Mr. Digit OKTAVIANTO
link link link link link
Information Security Consulting Manager at PT. Mitra Integrasi Informatika (Indonesia)

I am an information security professional with experiences in Linux server, network security, Security Information and Event Management (SIEM), vulnerability assessment, penetration testing, intrusion analysis, Digital Forensic and Incident Response, Cyber Threat Intelligence, Threat Hunting.

Have good experiences also on Managed Security Services (MSS) projects, Security Operation Center, operate and maintain SIEM tools.
Having basic knowledge in malware analysis and reverse engineering and doing this activity as a hobby in spare time.
I am also Conducting several Linux and IT security training for public or private institutions. 

I wrote a book in 2013: Cuckoo Malware Analysis published by Packt Publishing.
Currently served as Community Leader in Cyber Defense Indonesia Group (CDEF), R&D Team Member at Indonesia Honeynet Project (IHP), R&D Team at AFDI (Asosiasi Forensika Digital Indonesia) - Indonesian DIgital Forensic Association, also member at HTCIA Asia Pacific Chapter.

Research and publication related to Threat Hunting and Threat Intelligence. Focusing in Blue Team area.
Develop capabilities in adversary simulation, threat hunting, and develop skillset area in Security Operation Center at my current employer.
In a spare time conducting various training project related cyber security for National Cyber and Crypto Agency, Indonesian Police Force, National Army, Attorney General's Office, Tax and Finance Bureau.
The training topics area Malware Analysis, Threat Hunting, Security Monitoring, Incident Response and Forensic Investigation.
The Growth of Cyber Security Community in Indonesia and its impact for the Nation
In the past 10 years, the cyber security community has begun widely recognized among Indonesians youngsters.
Many individuals create a cyber security community with the aim of showing their existence as well as proving themselves if they are hackers, which in fact most of them are still doing script kiddies activities in the cyber security community.
Besides just seeking for attention, there are also communities that are formed by individuals who are professionals in the field of cyber security.

One of that community is ECHO, that has been around for a long time in Indonesia with various members who are now successful cyber security professionals.

The other cyber security community is Indonesia Honeynet Project community which is a local chapter of Indonesia from the Global Honeynet Project.

IHP is a community that operates in the academic area and works closely with government agencies (National Cyber and Crypto Agency).
IHP focuses on developing research whose topics range from deception technology, malware analysis, threat hunting.

There are also begun to grow a cyber security community that focuses on specific research area.
Some of these communities include IT Audit & Security Community, where the community is focused in the areas of Governance, Risk, Compliance and Security which are more directed towards Security Assessment.
There is also the Indonesian Bug Bounty community, in which members are individuals who focused on bounty hunting on various platforms such as Hackerone, BugCrowd, SynAck, Intigriti, Yes We Hack, or the Local Bug Hunting Platform in Indonesia.

I am also active in the Cyber Defense Community (CDEF), community that is focused in the Blue Team area, where research or discussion is about defensive security such as Security Operations, Threat Hunting, Digital Forensic and Incident Response, Malware Analysis.

Since the establishment of BSSN in 2017, BSSN has embraced many communities, and held road shows to various provinces in Indonesia to educate many young people, to develop their skills, mindset, abilities in cyber security to do positive things, such as joining the cyber security community and contribute positively to it.
BSSN also proactively created a program called VVDP (Vulnerability Voluntary Disclosure Program), which is a program to bridge hackers and bug hunters who find vulnerabilities in applications or systems in public services and private services in Indonesia, and then report the findings of the vulnerability to BSSN via VVDP.
This is a positive form of communication from the government as a forum to bridge young people who are enthusiastic about cyber security, and give an appreciation if they giving report to BSSN through this VVDP program.
With the support of the government through various programs, the enthusiasm of young people can be expressed in a positive way rather than they doing acts of vandalism by damaging the system which is a public service.
In addition, the government is also helped by the existence of voluntary communities in carrying out their work programs in the realm of cyber security, so as to create an ecosystem that is beneficial for many parties.


speaker
Mr. Wahyu NURYANTO
link link link link
Security Operation Manager at PT. Korelasi Persada Indonesia

I am experienced as Security Analyst inside Security Operation Center.
Most of my experiences are coming from the defense activity like Incident Detection & Response, Threat Hunting, SIEM Engineering, and Digital Forensic Investigation.
Currently i served as SOC Lead in a MSSP Company.
Most of my responsibility are related to building People and Process to support SOC as Services.
Aside from Cyber Defense Indonesia, i also joined Indonesia Honeynet Project since in the University.
These are two community that i am actively involved and contributed in the last five years. 
The Journey of Cyber Defense Indonesia Community in the midst of Attack-minded Cyber Society
Indonesia is the world's largest island country, with more than seventeen thousand islands.
In the early 2000 the hype of cybersecurity increased, most of it came from underground community active in IRC channels.
Most of the respected community names at that time included ECHO, KECOAK, Jasakom, and many more.
Almost all these community are focusing on penetration testing and how to hack computer systems and internet.
This increases in community are contributed by internet literacy througout Indonesia.
Even though only big cities had proper internet connection at that time, most of the community members are coming from various cities and locations. It is because some of the communities are founded and active in the University area. 

Several years later, a lot of these hacker community members and founders are involved in professional career leading their own company or a cybersecurity team.
But the landscape of the cybersecurity community are still the same, dominated by hacking and pentesting activity.
It is really difficult to find community or group that have dedicated discussion in Cyber Defense or Blue Team area.
With this concern in mind then we started our own Whatsapp Group consisting of several Security Analyst working in Security Operation Center (SOC).
It was only 4 people back then, we shared and discussed a lot of things from malware analysis, intrusion detected at our SOCs and any shareable IoCs.
Not enough with only 4 people, we are adding more Security Analyst into the group.
It is a referral-based invitation to join or invited to the group.
We didn't open it to the public at that time. 

Later on in the late 2017 we started our first offline Meetup as an effort to introduce this community to more people.
Since then the community grow bigger and stronger until now.
We have a lot of activity and publications.
One of our goals is to increase security awareness in the society.
Some of our products including Bulletin, Podcast, Youtube Interview, and offline Meetup of course.
Since the beginning of the community there is no formal community structure and no one claimed himself as a founder.
That caused difficulties especially when any outside parties invited us to formal events or discussion.
So in the late 2019 we started to create formal organization structure for this community with Digit Oktavianto as Community Leader. 

Most of our activity are funded voluntery from our member.
We don't accept any sponsorships at all especially from technology vendors because we don't want just to be their advertisement agent.
Even when we share some experiences related to specific technology, it is not because we are endorsed from them, it's just because we use that technology in our daily operation.
There are some advantages and disadvantages in such choice, we will talk more about it later in the event.

Main points:
- CDEF Community activity and its contibutions
- How we handle funds and other sponshorships
- How we reach more new talents to join this cyber defense area 
- How we encourage members to share their story and experiences 
- How we structure the community so that member could be more active participate
- What we plan to do and our big goals for this community 


speaker
Mr. Satria PRADANA
link link link link link
Community leader of Reversing.ID
Reviving Reversing (Communities) in Indonesia
Kaleidoscope of Reverse Engineering communities in Indonesia.
This talk gives brief history of reversing communities in Indonesia on the early days of internet.
After some years of no significant activities in reverse engineering community, Reversing.ID is found as a community to bridge the old and new generation.
This talk also give information about what have Reversing.ID done in the past 3 years and strategy to promote reverse engineering as a fundamental aspect in cyber security. 

Main points:
- History of reverse engineering communities in Indonesia, learning sources, projects, etc.
- Introduction to Reversing.ID as community: organization, events, project.
- Some interesting collaboration activities with other communities.


speaker
Mr. Sanoop THOMAS
link link link
Founding Organizer, BSides Singapore

Sanoop Thomas is a seasoned security professional with diverse background in consulting, teaching, research and product-based industries with a passion to solve complex security problems.
His field of interest includes reverse engineering, malware analysis, application security and automating security pentest/analysis methodologies.
He is moderating null open community chapter in Singapore and organised over 60 events and workshops to spread security awareness across country.
Sanoop is the author and maintainer of Halcyon IDE project and also create infosec contents and podcasts at InfoSec Campus.
He has spoken at multiple international security conferences that includes Nullcon, OWASP India, HITBGSEC, Rootcon, Defcon (Demo Labs) and Blackhat Arsenal (USA and Asia)
Building Information Security Community
This presentation showcases a timeline of stories behind building information security communities in Singapore from my experience in building two successfully running communities – Null Singapore Open Security Group and BSides Singapore. The presentation will discuss the importance of building communities in the industry and takes the audience through a series of processes we followed in Singapore to build the same. Some major learning from these experiences will be shared during this presentation. 
In the end, we will also discuss some of the key points to help building security community in open structure and scalable way.


speaker
Mr. Takayuki TERASHIMA
link link
tessy is an AVTOKYO founder/organizer and staff of CODE BLUE.
ex-CTF Player / Organizer.
His daily work is  Research and Forensics/Incident Response, etc.
AVTOKYO -no drink, no ___-
AVTOKYO is a community-driven group and event in Japan.
Firstly we gathered for a drinking party after some events.
The current conference-style was started in 2008.
Our Con's motto is “no drink, no hack”.
We provide free drinks at conference time, it will help us to communicate with each other.
We believe drink and code will overcome a language barrier.
In the past several times, our conference attendees will over 300.
Our event has no business sponsor.
And we made and supported some CTF group in Japan.
This talk will show you our history and our community style.

Main points:
- Community history in Japan
- Providing conference with no business sponsors


speaker
Mr. Narayan KOIRALA
link link
Founder/ Director Eminence Ways Pvt. Ltd.

Mr. Narayan Koirala is a Software Engineer and Cyber Defense Enthusiast.
He is the Founder/ Director of Eminence Ways Pvt. Ltd., the first dedicated Cybersecurity Company in Nepal.
He is a pioneer in the field of Cyber Security and has been continuously working to uplift the field of IT security in Nepal.
 
Mr. Koirala has extensive experience in resolving Cyber Security issues of Major Financial Institutions, Government Bodies and Private Companies, both at the national and international levels.
During his career spanning more than decade in cyber security, Mr. Koirala has witnessed how an organization’s less prioritized data security could face severe problems in the long run.
His company, employing more than 35 professionals, has been consistently working to identify IT vulnerabilities and has helped organizations get secured by assisting in minimizing IT Threats.
 
Mr. Koirala also engages in various cybersecurity, tech, entrepreneur communities in Nepal.
He encourages practice of Cyber hygiene at individual level with a belief that if employees practice cyber hygiene while using ICT equipment this will eventually lead to a secure organization.
He also counsels students from their earlier school days to be ethical and practice white hat culture.
 
Mr. Koirala has been featured in numerous National and International Media where he shared his thoughts about rising cyber incidents and suggested prevention practices.
His articles about Cyber Hygiene and Data Security in the fast-paced technological advancement are being followed by many individuals and organizations.
 
Objective of the IVLP program was to share knowledge among experts working in Cybersecurity Domain in developed and developing countries aiming to fight against rising cybercrime.
 
Mr. Koirala holds a Bachelor’s degree in Software Engineering along with an MBA.
He is also a certified ISO 27001:2013 Auditor and a certified CISCO CCNA CyberOps professional.
Besides, he is associated with the Nepalese Young Entrepreneurs' Forum (NYEF), Lions Club International, and Computer Association of Nepal (CAN) Federation.
Cyber Security Scenario in Developing Countries: Nepal case study
This presentation will cover:
- Cyber Security Scenario in Developing Countries
- Cyber Security Policies at various levels (National, Regulator, Business)
- Organizations approach in Cyber Defence
- Cyber Security Communities and Activities
- Cyber Hygiene Practice followed by people


speaker
Mr. Ammar Hussain JAFFRI
link link link
- President at Pakistan Information Security Association (PISA)
- CEO at Security Experts Pvt. Limited
- Founding Chairman at Cyber Security Alliance Pakistan
- CEO at IoT Center Pakistan
- Founder at E-Pakistan

Mr. Ammar Jaffri has over 40 years of experience in Governance, Digital Forensics, Information Technology, Security, Education and Philanthropy.
He has served and led different departments in the Federal Government of Pakistan, and has been recognized with some of the highest industry honors in national as well as internationally.
He serves as the Pakistan point of contact for a number of international initiatives on Cyber Security like the Microsoft Law Enforcement Forum, G-8 24/7 High Tech Crime Network, the OIC-CERT, SAARC CERT, APCERT, Council of the European Union, and with INTERPOL.
He retired as the Additional Director General of the Federal Investigation Agency of Pakistan in 2010, and is currently engaged in various public and private projects in a private capacity.
He is a well-known speaker on a wide range of subjects including Information Security, Electronic Governance, Business Continuity Planning, Electronic Banking, and emerging trends in communication.
Mr. Jaffri’s goal is to improve lives in the rural areas of Pakistan by leveraging information and communication technologies.
speaker
Mr. Sufian ANSAR
link link link
- Cyber Security Researcher at Pakistan Information Security Association (PISA)
- Manager Information Security and Digital Forensics at Security Experts Pvt. Limited
- CTO at CIT-CERT Coordination Center

Working as a cybersecurity Professional from last three years in different domains including Offensive and Defensive sides.
Has the honor to work on National and International Initiatives under Pakistan Information Security Association PISA including Cyber Drills, Capture the Flags Competitions, Trainings and Conferences.
Sufian has been working on First National CERT Coordination Center as a Chief Technology Officer (CIT-CERT Coordination Center).
He has conducted First National Cyber Drill on November 13th 2018 and Second National Cyber Drill on November 6th 2019.
As an Information Security Manager at Security Experts private limited, he has worked on different investigation projects and as a Corporate Trainer he has trained many individuals especially from Law Enforcement Agencies including Federal Investigation Agency, Anti-Narcotics Force, National Accountability Bureau, Custom Intelligence, Pakistan Air Force and Punjab and KPK Police on "How to Track the Criminals in Cyberspace through Open Source Intelligence".
As a cybersecurity Researcher he has worked on Cyber Threat Intelligence, Open Source Intelligence and have good understanding of rapidly evolving trends like AI, Blockchain, Internet of Things and their role in cybersecurity.
Cybersecurity trends in Pakistan
The presentation will highlight the current status of cybersecurity and Cyber-Crimes ratio in the country and how different law enforcement organizations are working to improve cybersecurity awareness and capacity building to reduce the cyber-crimes. Many knows that the first computer virus named “Brain” was built by a Pakistani, that wasn’t made for any bad purpose but that was purely built for the protection of copy right.
As country like Pakistan have not been participating at international level, but the man power in Pakistan is very much capable of doing great things. This is to showcase that we have great professionals and understanding to work together and share our ideas and understanding to prepare for the upcoming challenges and threats.


speaker
Mr. Ahmad Ashraff AHMAD
link link link
Ahmad was a Chemical Engineering graduate but have interest in application security.
He got involved with CTF in 2008 when was recruited by his senior in university.
With the knowledge obtained through CTF, he secured his first job as a Security Consultant in 2008.
Ahmad is currently working as a Security Consultant for a local security company in New Zealand and an active member of Wargames.MY CTF.
He also well-known in the bugbounty phenomena and was on top 3 leaderboard all time in Bugcrowd.
speaker
Mr. Hanafie NURUDDIN
link link link
Nafiez is an independent security researcher specialized in binary assessment, fuzzing, low-level vulnerability research and reverse engineering.
Nafiez has discovered numbers of vulnerability in various software from open source to closed source program.
Nafiez has spoken in international and local security conferences.
Apart from security research, Nafiez actively organizing Capture the Flag (CTF) event for Wargames.MY and HITB.
Nafiez is one of first legacy for Wargames.MY crew.
Reviving the hacking communities in Malaysia through CTF
The lack of technical (read hacking) skills among cybersecurity graduates is one of the primary concern in Malaysia industry.
There are many excellent exam results among them, but when in real working life, they know nothing.
Capture the flag is one of the approaches where a person could learn and polish their skillset.
While there are many universities now organising CTF, sadly, it seems more to gain benefit for ownself (monetary profit & KPI).

To cure this toxic culture, Wargames.MY (WGMY) with own initiative organising annual CTF since 2011 for free and at the same time developing and guiding local talents into pursuing the right career based on their skillset.
After many years of struggle and educating the community, WGMY finally able to stay active in the cybersecurity industry as one of the best CTF organisers.
Many initiatives were planned and executed by us.

This presentation aims to share what WGMY had done, achieved, and the next things in our plan to the audience.


speaker
Engr. Jose Carlos P. REYES
link
Engr. Reyes is a Professional Electronics Engineer, and an ASEAN Engineer.
He is currently the Director of the CyberSecurity Bureau under the Department of Information and Communications Technology (DICT).
He is currently the president of the National Committee of the Philippines of the International Electrotechnical Commission.
He was a former National President of the Institute of Electronics Engineers of the Philippines (IECEP), and was the founding Vice President of the Philippine Association of Government Electronics Engineers (PAGE).
He has more than thirty years of professional experience of which fifteen years have been devoted to government service, specifically with the national standards body - Bureau of Philippine Standards (BPS) of the Department of Trade and Industry (DTI).
He was a technical manager of SGS Regional Headquarters where he shared his expertise on information security management system, standardization, accreditation, certification, testing, and compliance to international standards such as ISO, IEC, ITU, among others.
He has earned a Bachelor’s Degree in Electronics and Communications Engineering and Masters in Business Administration.
Cybersecurity Developments in the Philippines
- Overview of current cyber security policies in the Philippines
- Cyber laws in place
- Developments being made to create a strong cyber security strategy
- Next steps

Call for Speakers / Presentations / Papers

Text file / Download


FAQ

What is this event?
REVULN is a series of free private meetings for invited guests where participants attend the presentations of international speakers and connect with all the selected guests.
The idea behind the events and their organization are unique, no conferences hosted by private companies have similar features.
Information about the previous events are available here and here.


Is this a marketing or promotional event?
No. We do NOT promote, advertise or sell anything, and we do NOT accept sponsors.
The event has been created, planned and financed by us just for speakers and attendees, completely for free and without any business or promotional activity or purpose.
REVULN's goal is sharing knowledge and connecting people.


How joining as speaker?
Please check our Call for Papers for details.
Usually we provide free accommodation for the international speakers with presentations covering the main topic.
No "paper" is requested, this is a Call for Speakers where you will be asked to provide your presentation only (slides).


How can I attend the event?
The event is invitation-only, attendees are selected by us and by our guests.
Anyway feel free to contact us if you wish to participate, we are ever looking for interesting guests who can contribute to the events with their presence and knowledge.


We would like to sponsor the event.
We do not accept sponsors or partners.


We work for the press/media.
Please send us an email if you would like to participate.


How are the invited guests selected?
The expected attendees directly invited by us are mainly from two categories:

    - media: journalists, reporters, writers, bloggers, press, agencies, NGOs

    - governments and law enforcement agencies: police forces, armed forces, military and defense, government owned/funded research organizations, police academies and universities, national CERTs, consulates and embassies, public sector


Is there any political motivation?
No, REVULN and its team are completely neutral and free from any political and ideological motivation and bias, no matter what are the countries and goals involved.
This open minded attitude allows guests from very different and sometimes conflicting fields to attend a relaxed event focused on experiences and information.


Are you going to release the slides of the presentations on the website?
Yes, but please note that some presentations may not be available since some speakers may prefer to not share their material with the public.


Are you going to record or stream the sessions?
No, we take no video recordings of the event.
Due to the current emergency we "may" record the sessions, but sharing them would depend by the speaker.


I'm an invited guest and I would like to attend only some presentations.
Sure, please check the agenda for the exact schedule of the presentation in which you are interested.
Time is a valuable thing and we perfectly know how difficult may be to attend the full day.


I'm a journalist, am I expected to provide media coverage of the event?
We don't expect anything from our guests.
The event is for you, not for what you are supposed to return back to us.


Do I need a VISA for traveling to the Philippines?
People from many countries do not need any VISA for traveling to the Philippines and can stay for 30 days.
Please check the Travel Requirements (12. Who can enter the Philippines without entry visa?) for a complete list.


How to reach the location of the event?
RED Hotel Cubao is located in Quezon City (Metro Manila), just at the side of Cubao MRT3 station.
Address: 627 EDSA Cubao, Quezon City, Philippines 1109.
Phone: +632 896 7700
The event takes place in the Ruby meeting room (ex Erato) at 4/F.

RED Hotel Cubao
Cubao MRT3Google Maps

For reaching the hotel from the airport please use the UBE Express P2P bus or the Grab app.
The hotel is located just at the exit of Araneta Center-Cubao of MRT Line 3, Cubao is also the stop of many P2P buses and location of many shopping malls, therefore it's very easy to reach.


How to move in Manila?
The safest and more practical way is calling a car using the Grab app but please note that traffic is quite heavy during peak hours.


What's the situation of COVID-19 in the country? What are the guidelines for the meeting room?
Useful websites:

    - DOH with official data: DOH.GOV.PH

    - Tourism Authority: TOURISM.GOV.PH

    - Manila Airport: FACEBOOK.COM

    - WHO about the country: WHO.INT

Any requirements, restrictions and limits on the capacity of the meeting room depends by the hotel and by the health department.
Once the capacity of the meeting room is reached, the other guests can wait and do networking in the adiacent spaces.


Do I have to bring something with me?
Your name cards (business cards).
The mobile phone or laptop will be useful for consulting some material we plan to provide during the event.
A local Wi-Fi will be available for sharing documents with the attendees, and Internet Wi-Fi is available too.
The hotel already provides notepads, pens and water.
Mask to wear the whole time covering from nose to chin.
Hand sanitizer.


Dress code?
Casual or business is up to you, the event is meant to be informal and relaxed.
T-shirt, (long) shorts and shoes are the bare minimum.


Code of Conduct?
Respect the others, no offenses, no aggressive and inappropriate behavior.
This is a place where we plan to share our own experiences and connecting with people interested in the selected topics.


I like the project, how can I contribute?
Just with word of mouth.
Feel free to share the Call for Papers and details of the event with colleagues and people interested in these topics.


How can I contact the organizer with other questions?
Please contact Luigi Auriemma by email, Twitter, LinkedIn, or Signal/Telegram: revuln


Privacy Policy
REVULN Privacy Policy for speakers and participants.


Disclaimer
This is a private meeting for invited guests only without any business, promotional activity and purpose.
The event is completely not-for-profit and no incomes are generated from and during its execution.
The presentations and slides are intellectual property of their authors, who are also the only responsible for such content.
Free accommodation, when acknowledged by the organizer, is revoked if the speaker is not able to held the presentation in-person at the event.
The organizer is not responsible for any loss, damage or other issues during the event.

Top