Logo

UM Cybersecurity Summit

// About

The UM Cybersecurity Summit 2025 is where industry experts, tech enthusiasts, and students come together to explore the latest trends in cybersecurity. This event features hands-on workshops, interactive booths, and invaluable networking opportunities with professionals in the field. Whether you’re a beginner or an expert, this summit offers insights, skills, and connections to elevate your cybersecurity journey.

// Event Details

-> Date

May 18, 2025

-> Location

PASUM, University Malaya

// Event Schedule

TimeActivity
7:00 AM - 7:45 AMRegistration
7:45 AM - 8:45 AMBooths
8:45 AM - 10:30 AMOpening Ceremony
10:45 AM - 12:45 PMMorning Session Workshops
12:45 PM - 2:00 PMSolat + Lunch Break
2:00 PM - 4:00 PMAfternoon Session Workshops
4:00 PM - 5:30 PMClosing Ceremony

* Morning Session: Decoding the Pulse of Network Traffic: Unveiling Threats and Anomalies Through Log Analysis and Malware Analysis for Beginner

* Noon Session: OSINTing the Malaysian way and .NET Reverse Engineering and Analysis

Workshops

Workshops are divided into two sessions. Choose one workshop from each session to participate in during the Cybersecurity Summit.

Morning Session

(10:45 AM - 12:45 PM)

Decoding the Pulse of Network Traffic: Unveiling Threats and Anomalies Through Log Analysis
Dewan Kuliah Utama
10:45 AM - 12:45 PM

Workshop Summary

This workshop equips participants with skills to analyze network logs using Zeek, extract insights, and visualize findings with Jupyter. It begins with network detection and response (NDR) methodologies, focusing on Zeek’s capabilities for parsing and analyzing traffic logs. Attendees will learn to identify anomalies, extract indicators of compromise (IoCs), and enrich them using cyber threat intelligence (CTI) platforms. The session also covers best practices for integrating IoCs into security workflows to enhance threat detection and defense strategies.

Speakers

Syakir Ameer Roslan
Syakir Ameer Roslan
Muhammad Amirul Izzuddin Bin Juhari
Muhammad Amirul Izzuddin Bin Juhari
Malware Analysis for Beginner
Dewan Kuliah A
10:45 AM - 12:45 PM

Workshop Summary

This workshop introduces student to the fundamentals of analyzing malware, focusing on basic static, dynamic analysis and introduction to reverse engineering. Students will learn to identify malware behavior, extract indicators of compromise, and understand the basics of reverse engineering in malware analysis. The session covers essential tools such as PEStudio, FakeNet, SystemInformer, IDA Free, APIMonitor and SysAnalyzer to analyze malwares. By the end of the workshop, student will gain basic understanding on malware and the analysis techniques.

Speaker

Fareed Fauzi
Fareed Fauzi
Noon Session

(2:00 PM - 4:00 PM)

OSINTing the Malaysian way
Dewan Kuliah Utama
2:00 PM - 4:00 PM

Workshop Summary

This workshop will showcase OSINT techniques tailored to resources relevant to Malaysia. The techniques covered will include People, Username, Image, Geolocation, Phone Number, and Social Media OSINT. Throughout the workshop, case studies based on real world scenarios will be utilized for challenges.

Speaker

Iman Mikhael
Iman Mikhael
.NET Reverse Engineering and Analysis
Dewan Kuliah A
2:00 PM - 4:00 PM

Workshop Summary

Introduction to .NET applications with a focus on malware analysis techniques. This workshop covers .NET architecture, file formats, and runtime behavior, along with both static and dynamic analysis methods. We will explore common obfuscation techniques used to evade detection and strategies for deobfuscating and analyzing malicious .NET binaries. Hands-on exercises will utilize essential tools such as dnSpy, ILSpy, and de4dot to aid in the analysis.

Speaker

Amjad Alsharafi
Amjad Alsharafi

// Booths

BoothBoothBoothBoothBoothBoothBoothBoothBoothBoothBoothBoothBoothBoothBoothBooth

Closing Ceremony

-> Time

May 18, 2025 4.00pm (Tentative)

-> Activity

Prize giving, Speeches, Panel Discussion (Tentative)