Workshop-1: Establishment of Common Criteria Evaluation Lab

By: Securelytics Pvt Ltd, Malaysia

Speaker: Mr. Muzamir Bin Muhamad

Date: ---

Intended Audience: Professionals Only

Registration Payment: 30,000 Rs.

Registration: Click Here for Registration (This is paid workshop, any interested participant has to seperatly register for this workshop on the given registration link)

Workshop-2: Security Auditing and Testing in Line with International Standards & Best Practices

By: NCCS NCSAEL Lab, MCS NUST

Speaker: Ms. Maheen Fatima Bhutta, Ms. Nabeela Bibi

Date: ---

Intended Audience: Conference attendees, researchers/students/faculty, industry professionals

Topic Outline:
• Cybersecurity Audit Vs Pen Testing
• Internal Vs External Audit
• Cybersecurity Risk Assessment and Management
• Cybersecurity Maturity Model
• Gap Analysis
• ISO 27001 & ISO 27002-22

Registration Payment: Free for registered attendees

Registration: Click Here for Registration

Workshop-3: Network Intrusion Detection System: Theory & Application

By: NCCS CIPMA Lab, PIEAS

Speaker: Prof. Dr. Hanif Durad, Mr. Irtiza and Team

Date: ---

Intended Audience: Conference attendees, researchers/students/faculty, industry professionals

Topic Outline:
will be updated soon

Registration Payment: Free for registered attendees

Registration: Click Here for Registration

Workshop-4: High-speed Packet Analysis and Visualization

By: NCCS DPI Lab, UET Taxila

Speaker: Mrs. Sobia Arshad

Date: ---

Intended Audience: Conference attendees, researchers/students/faculty, industry professionals

Topic Outline:
will be updated soon

Registration Payment: Free for registered attendees

Registration: Click Here for Registration

Workshop-5: Software Security Assessment Workshop

By: Horizon Tech Services (Pvt) Ltd

Date: ---

Intended Audience: Conference attendees, developers/researchers/students/faculty, and industry professionalss

Topic Outline:
1. Introduction to Software Security Assessment
a. Security Assessment Overview and Purpose
b. Security Assessment Lifecycle
c. Software Security Standards, Guidelines and Best Practices
d. Common Software Security Attacks
2. Web-Based Application Evaluation/Testing
a. Static Testing
b. Dynamic Testing
c. Penetration Testing
d. Demo/Hands-on Session
3. Desktop Application Evaluation/Testing
a. Static Testing
b. Dynamic Testing
c. Penetration Testing
d. Demo/Hands-on Session
4. Mobile application Evaluation/Testing
a. Static Testing
b. Dynamic Testing
c. Penetration Testing
d. Demo/Hands-on Session
5. Reporting
a. Report Outline
b. Executive summary
(a) Test Results
(b) Conclusions
(c) Recommendations
c. Evaluation/Testing Details
d. Annexures

Registration Payment:
Students 5000 PKR,
Professionals 10,000 PKR

Registration: Click Here for Registration

Workshop-6: Cyber Threat Intelligence leveraging MITRE ATTACK Framework

By: NCCS CRC Lab, Bahria University

Speaker: Mr. Hafiz Muhammad Arsalan

Date: ---

Intended Audience: Conference attendees, researchers/students/faculty, industry professionals

Topic Outline:
Module 1: Introduction and Understanding ATT&CK
Module 2: Mapping to ATT&CK from finished reporting
Module 3: Mapping to ATT&CK from raw data
Module 4:Storing and analyzing ATT&CK-mapped intelligence
Module 5: Making ATT&CK-mapped data actionable with defensive recommendations

Registration Payment: Free for registered attendees

Registration: Click Here for Registration

Workshop-7: Web Exploitation

By: NCCS ISQT Lab, NED UET Karachi

Speaker: Ms. Syeda Fatima Navaid, Ms. Shumaila Ahmed

Date: ---

Intended Audience: Conference attendees, researchers/students/faculty, industry professionals

Topic Outline:
will be updated soon

Registration Payment: Free for registered attendees

Registration: Click Here for Registration

Workshop-8: Security in IoT

By: NCCS IRIL Lab, UET Lahore

Speaker: Mr. Shaharyar Yaqub, Mr. Farooq Ali

Date: ---

Intended Audience: Conference attendees, researchers/students/faculty, industry professionals

Topic Outline:
• Vulnerability and Compliance Assessment of IoT/Industrial IoT
• Manual Tools and Techniques used to perform the above operations for IoT
• Automate the above process (ThingzAnalyzer product with Demo)
• Offensive side: Exploitation of exposed vulnerabilities in the IoT System
• Tools and Techniques to exploit the system
• Defensive side: Prevention from the exploitation of the IoT devices
• Introduction of IoT Security Lab and its products line for premium defense
• Thingzfirewall product with Demo
• SIEM for Industrial IoT

Registration Payment: Free for registered attendees

Registration: Click Here for Registration