Principles and Engineering of Secure Solution | SGInnovate

DATE: TBC

Location

BASH, LEVEL 3,
79 AYER RAJAH CRESCENT,
SINGAPORE 139955

Principles and Engineering of Secure Solution

Presented by SGInnovate & Tegasus International

Together with Tegasus International, SGInnovate is proud to present a series of Cybersecurity workshops designed to prepare you for impending security threats and vulnerabilities.  

In this 3-day workshop, you will have a better understanding of the digital ecosystem in Cybersecurity. You will learn to identify critical security risks and problems posed by new technologies and business practices and learn to design secure systems and controls based on IT architectural guidelines and requirements. 

You will also learn to incorporate controls into security system components to minimise security breaches or lapses in system designs.

There will be an emphasis on real-world use cases and examples, and hands-on applications and techniques to raise awareness on the most fundamental Cybersecurity concepts, attack vectors and good practices. 

This workshop is eligible for funding support. For more details, please refer to the "Pricing" tab above.

In this workshop, participants will learn about: 

  • An overview of the Cybersecurity ecosystem
  • Identity and access management
  • Security engineering and design
  • Solution security and principles 

Prerequisites:

  • An interest in Cybersecurity
  • Working in the Cybersecurity space for at least two years 

Pre-Workshop Instructions:

  • You MUST bring your laptop to this workshop

Day 1 

An overview of the Cybersecurity ecosystem

  • Our digital ecosystem
  • Motivational factors for attacking
  • Attacker goals, skillset and profiles
  • Statistic of cyber attacks in 2018
  • Risk analysis (quantitative and qualitative)
  • Practice session (risk analysis exercise)
  • Pros and cons of cybersecurity solutions
  • Concepts of confidentiality, integrity and availability

Identity and access management

  • Fundamentals of Cybersecurity
  • Introduction to identity and access management
  • Explain authentication (type 1, 2, 3 and 4)
  • Practice session (type 1 vulnerability exposures exercise)
  • Cyber threats facing authentication
  • Explain authorisation
  • Issues about authorisation
  • Methods for managing authorisation
  • Access control models (DAC, MAC, RAC and RuAC)
  • Access control administration

Security engineering and design (Part 1)

  • Principles of secure design
  • Security models (state machine, Bell-LaPadula, Biba and commercial models)
  • Security evaluation criteria
  • Introduction to Cryptography
  • Cryptography in history

Day 2 

Security engineering and design (Part 2)

  • Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Hybrid Cryptography
  • Practice session (encryption and decryption exercise)
  • Cryptography with integrity
  • Cryptography – data at rest & data in motion

Solution security and principles

  • Revision of Day 1
  • Understanding the solution design ecosystem
  • Secure the weakest link
  • Practice defence in depth
  • Fail securely
  • Follow the principle of least privilege
  • Compartmentalise
  • Keep it simple
  • Promote privacy
  • Remember that hiding secrets are hard
  • Be reluctant to trust
  • Use your community resources

Day 3 

  • Revision of Day 2
  • Discussion of real-world use cases 
  • Presentation by participants (Assessment)

Funding Support
This workshop is currently in the process of securing funding. Register your interest now, and we will contact you when registrations are open.
 

Ivan Lee, Co-founder, Tegasus International

Ivan works with various global strategic partners such as the NATO Cooperative Cyber Defence Centre of Excellence, US Department of Homeland Security ICS-CERT Idaho National Laboratory and local government agencies on critical initiatives and training programmes. 

He started his career with Accenture, a global top IT consulting MNC company and has assumed various tech management roles in the telecommunication, cGMP and Operational Technology sectors regionally. He is the Deputy Director, Cyber Security Technologies of iTrust, Centre for Research in Cybersecurity that was established by the Ministry of Defence and Singapore University of Technology and Design (SUTD). 

He is also an SUTD Academy Fellow and a member of the Coordinating Committee for Cybersecurity (CCCY) Subcommittee for Critical Information Infrastructure (CII). 

He has attended various professional training courses and acquired certifications as listed below:

  • Certified Information Systems Security Professional (CISSP)
  • US Department of Homeland Security ICS-CERT Industrial Control Systems (ICS) Cybersecurity (301)
  • Advanced Penetration Testing, Exploit Writing, Ethical Hacking (SANS)
  • Advanced Course on Darknet and Cryptocurrencies
  • Hands-on Hardware Hacking and Reverse Engineering (Blackhat 2015)
  • Cybersecurity: Technology, Application and Policy (MIT Digital Program)
  • FORENSICS: Reverse-Engineering Malware (SANS)
  • Managing Successful Programmes (MSP) Practitioner, 2014
  • Introduction to Business Process Re-engineering Workshop
  • Live Hacking & Information Security Masterclass
  • Self-Discovery Leadership
  • EC-Council Certified Security Analyst (ECSA), 2013
  • Certified Ethical Hacker (CEH), 2013
  • Project Management Professional (PMP)
     

Topics: Cybersecurity

You may also like the following: