SPEAKER'S INFO Name and or Handle *: Mike Art Rebultan aka "Strainer" Email Address *: mrebultan@equinix.com Mobile Number *: +65.84820917 Title and Company : DFIR/SecOps/Purple Team (APAC Lead) - Global IT & OT / @Equinix Inc. Location *: Singapore Brief Bio: *: More than 8 years of Unix Systems Administration experience plus 8 years of IT security practitioner in cybercrime investigation and incident response in ICS/SCADA environment. Currently based in Singapore as a purple team lead in APAC security operations. Holds both a master’s degree in IT and a graduate diploma in digital forensics and cybersecurity. PRESENTATION INFO Presentation Title *: LET'S LAUNCH CYBER-KINETIC ATTACK | As Easy As 1-2-3 Abstract *: The “how” is no longer a question in today’s advanced persistent threat (APT) as exploits’ availability becomes rampant from both shallow and the dark web but “when” where every control system’s security professionals and incident responders are not yet ready. And just imagine life without electricity and fuel that controls and gives every comfort we have today; air-condition, communications, medical supplies, transportations, foods and drinks, and even military defense that supposed to protect the Filipino people is down. With the very fast evolving landscape of cybersecurity threats to all critical and industrial firms, this precious life can be destroyed in just a blink of an eye anytime that no one is prepared for survival. By leveraging the open source intelligence (OSINT), this presentation will showcase how simply an attacker could launch a cyber-kinetic attack and educate military, government authorities, and private sectors on defending their turf to prevent “Firesale” and cause catastrophic incident proactively. This presentation is a vendor-neutral and no sales pitch but to highlight the timely wake-up call for all security researchers and practitioners in every nation against Cyber Warfare that everyone thought’s a myth. KEY TAKE AWAY 1. Be enlighten on the huge differences between IT and OT and how Incident Responders will fit to cover both environment. 2. Practical implementation of Defense-in-Depth for both IT and OT against APT’s. 3. Learn and apply the best practices in ICS/SCADA and IT security. 4. Understand Cyber-Kinetic attack and how to mitigate the risks. 5. Equip attendees with the most dangerous threat in the Cyber-world. TARGET AUDIENCE 1. Government Officials and Authorities 2. Private sectors from Aerospace, Maritime, Water & Waste, Industrial, Energy & Electrical Grid, Oil & Gas 3. Financial and Banking Organizations 4. Telecommunication and Data Center Companies 4. Security Researchers and Consultants 5. Defenders and Red Teamers