Enable Visibility across Disparate Air-Gapped Networks

Event Details

Date: 15 Nov 2023

Time: 2.00pm-5.00pm


Event Description

Join us for an exclusive event where we will explore the critical role of threat hunting in mitigating both insider and external threats. In the ever-evolving cybersecurity landscape, the need to protect your Critical Information Infrastructure (CII) assets from malicious attacks and data loss has never been more crucial.

During the event, you will discover:

  • How integrating Data Diode together with a robust Security Information and Event Management (SIEM) system can fortify your CII against potential vulnerabilities
  • How you can consolidate security events from multiple disconnected air-gapped networks into a centralized platform
  • A better approach for proactive and comprehensive security strategy, enabling efficient threat detection and response



2.00pm – 2.30pm – Registration
2.30pm – 2.40pm – Knit Technologies Welcome Speech
2.40pm – 3.00pm – Defending Cyber Security for CII by ST Engineering
3.00pm – 3.40pm – NextGen SIEM Platform for Threat Hunting by LogRhythm
3.40pm – 4.00pm – Q&A
4.00pm – 5.00pm – Tea Break & Networking Session

Fill in the form to register

Please state accordingly e.g. NIL, Halal, Vegetarian
We're committed to your privacy. Knit Technologies uses the information you provide to us to contact you about our relevant content, products, and services.

Brief Topic Outline

Defending Cyber Security for CII

Speaker: Qi Feng Ho, Snr Engineer, Cybersecurity Products, ST Engineering


As the dependency on digital infrastructure grows, so does the vulnerability of Critical Information Infrastructure (CII) to malicious attacks and data breaches, emphasizing the urgency of robust protective measures. This presentation delves into the significance of safeguarding CII from cyber threats and data loss, highlighting the implementation of effective strategies such as air-gapping and network segregation. The discussion further introduces Data Diode, which, when integrated with Security Information and Event Management (SIEM), fortifies CII cybersecurity by ensuring secure data transmission and comprehensive threat detection.

NextGen SIEM Platform for Threat Hunting

Speaker: Yuchang Chang, Enterprise Solutions Engineer, LogRhythm


Security analysts are playing an never-ending cat-and-mouse game when it comes to insider threats and external threats. Except, unlike playing a game, failing to mitigate the threat in time will cause serious loss to the company. And there’s no reset button. To mitigate the risk, it is important to use Threat Hunting capabilities. Threat hunting refers to the process of proactively searching for advanced threats that may have eluded security systems. In other words, going after the ones that slipped through the net.