JP Haywood

Thumbnail for post.

As a Lead Security Consultant at Acumenis, JP actively supports organisations in identifying security risks and implementing controls and frameworks to enhance their security posture. This includes assisting organisations implement and test incident management procedures, as well as working with them when responding to real events.

JP’s experience includes working as an Information Security Manager at an Australian bank. During this time, JP achieved notable milestones, such as establishing an Information Security team and Security Operation Centre. JP’s professional qualifications include certifications in cyber operations, ethical hacking, incident response, and vulnerability management.

JP also actively engages with the Information Security community, contributing through organising local SecTalks chapter meetups, participates as a speaker at conferences, events, and podcasts, and is a mentor in the Australian Women in Security Network mentoring program.

Nyamkhand Buluukhuu

Thumbnail for post.

Nyamkhand graduated as a networking engineer but has been working as a system engineer for over 10 years. She is currently working as a senior system engineer at Mobinet ISP of Mongolia. Also has been a member of the MNNOG community since 2019. 

Nyamkhand shares her knowledge as a volunteer community trainer. 

Shaila Sharmin

Thumbnail for post.

Shaila Sharmin has more than 10 years of working experience in ISP, Bank and WiMAX Network Architecture. She is a seasoned Operations Engineer and Management professional in the field of IP Core and System Security, and possesses extensive hands-on experience in Core and Enterprise Routing and Switching Technologies with major vendors. Shaila has in depth knowledge of cybersecurity and privacy principles, cyber threats types and vulnerabilities, security risks assessment and emerging technologies.

Shaila was educated in Bangladesh completing a Master’s Degree in Computer Science with a Bachelor’s Degree in Computer science and engineering. Furthermore, she has some vendor certifications (e.g. CISM, CCNP, NSE4 etc.) at her credit. Shaila actively speaks and volunteers at bdNOG, APNIC events.

Areas of Interests: SDN, IPv6, Routing and Switching, MPLS, BGP, Network and Information Security and Internetworking, Internet Governance and technical Policy.

Shaila shares his knowledge as a volunteer community trainer for APNIC.

Swapneel Patnekar

Thumbnail for post.

Swapneel is a network security engineer & CEO at Shreshta IT and has been working in the Information Security field for 15+ years. He regularly conducts workshops on Information Security, Network Security Monitoring and DNS/DNSSEC Security.

He is also a board member of India Internet Engineering Society and has been Program Committee member of INNOG group, and actively participates at the various Network Operator Groups (NOGs) and security community in the Asia Pacific region. 

Swapneel shares his knowledge as a volunteer community trainer for APNIC.

Richard Sims

Thumbnail for post.

Having worked in Information Technology for over a decade, Richard has provided security consulting services throughout Australia to state and local government agencies and to large enterprise organisations. He has been responsible for assessing and guiding remediation on critical infrastructure. He has extensive experience across many areas of Cyber Security, including delivering web, API and infrastructure penetration testing, cloud and on-premise security architecture reviews, security operation centre maturity gap analysis and process mapping, information security management system gap analysis, threat risk assessments for business process software and system architecture implementations, and business mapping and modelling of managed service providers. 

Identifying Suspicious Traffic with DASH

Thumbnail for post.

Overview

This course will introduce APNIC’s DASH (Dashboard for Autonomous System Health), which is a portal that allows APNIC members to identify suspicious traffic going out of their networks. The course will also cover a specific use case and a demo.

Community Insights Program:
https://www.apnic.net/your-say

Outline

This course will cover the following topics:

  • What DASH is (and what it’s not)
  • Where the data about suspicious traffic comes from
  • A specific use case – Preventing DDoS attacks
  • DASH’s key features
  • DASH Demo

Course Materials