For the first time, cyber incidents, including data breaches, are classified as the most serious risk to businesses in ASEAN. In fact, according to the Alliance Risk Barometer 2020 the average cost of a single data breach to an ASEAN organisation averages at SGD3.6 million. Singapore alone saw 96% of its businesses report a breach between 2018 and 2019.
CISOs now stand at the vanguard of a business’ defence with the task to protect their most valuable assets – data and the cyber defence perimeters. In order to stay one step and more ahead of their attackers, CISOs need to know the best strategies, technologies and partners to prevent and rectify data breaches.
This is why we are bringing CISO Online ASEAN to you, a virtual forum taking place on 2 & 3 November 2021. Through a series of keynotes, panels, interviews and our unique interactive discussion format, this is your opportunity to benchmark your current practices against leading executives.
Join your peers and learn how to successfully adopt identity and privileged access management to overcome the challenges of compromised credentials, explore strategies to embrace the cloud with confidence and avoid misconfiguration risks, and discover how to bridge the gap in third-party software vulnerabilities.
Governance and Risk: Weighing the risk against the rewards – how cyber security leaders make difficult decisions involving risk and IT security
Driving Change in ASEAN’s Cyber Security Space: What InfoSec leaders are doing to orchestrate change in order to strengthen data and IT protection across organisations
The risk profile of the ASEAN cyber security landscape is always evolving, so CISOs need to maintain the stance of being one step ahead of every new threat. Join CISOs and top InfoSec leaders to uncover innovative solutions for third party risk and supply chain attacks, early breach detection, security risks around increased cloud uptake, security culture and talent management, and data governance from a cyber security perspective.
Despite already being a fast-paced environment, the ASEAN cyber threat landscape is evolving more rapidly than ever, with new threats and bad actors emerging every few weeks. Explore a number of key strategies on how to outmanoeuvre these threats through insightful discussions on threat intelligence, risk tolerance levels, improving recovery capability from ransomware, the Zero Trust model, identity and access controls, and SOC enhancements and more at CISO Online ASEAN
Are you looking to demonstrate thought leadership to the information security community, raise awareness of your solution, educate the marketplace, identify & engage qualified leads, achieve measurable results with real ROI, and tell your story to stand out in a crowded market?
If so, sponsoring CISO Online ASEAN could offer you the perfect way to achieve your goals!
For more information regarding sponsorship opportunities, please contact Rhys Ghorashi: firstname.lastname@example.org
Rubrik, the Zero Trust Data Management Company, enables cyber and operational resilience for enterprises; including ransomware protection, risk compliance, automated data recovery, and a fast track to the cloud. For more information please visit www.rubrik.com and follow @rubrikInc on Twitter and Rubrik, Inc. on LinkedIn. About Zero Trust Data Management Zero Trust Data Management follows the NIST principles of Zero Trust for everyone interacting with data. This means operating with the assumption that no one is trustworthy. No user. No application. No device. To meet this standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. This means data is ready at all times so you can recover the data you need, and avoid paying a ransom.
Elastic Security is accessible to any user, anywhere. It unifies SIEM and Endpoint Security, enabling SecOps teams to prevent, detect, and respond to attacks by collecting diverse data, performing both automated and analyst-driven analysis, and responding via embedded workflows and automation. Built-in security expertise from Elastic and the community enables the SecOps team to defend against well-resourced adversaries targeting the org’s data or infrastructure
Cyberattackers have the advantage. ExtraHop is on a mission to help you take it back with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense platform, Reveal(x) 360, helps organizations detect and respond to advanced threats––before they compromise your business. We apply cloud-scale AI to petabytes of traffic per day, performing line-rate decryption and behavioral analysis across all infrastructure, workloads, and data-in-flight. With complete visibility from ExtraHop, enterprises can detect malicious behavior, hunt advanced threats, and forensically investigate any incident with confidence. ExtraHop has been recognized as a market leader in network detection and response by IDC, Gartner, Forbes, SC Media, and numerous others.
When you don’t have to choose between protecting your business and moving it forward, that’s security uncompromised. Learn more at www.extrahop.com.
Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, the Netskope Security Cloud provides the most granular context, via patented technology, to enable conditional access and user awareness while enforcing zero trust principles across data protection and threat prevention everywhere. Unlike others who force tradeoffs between security and networking, Netskope’s global security private cloud provides full compute capabilities at the edge.
Netskope is fast everywhere, data-centric, and cloud-smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 8,400 organizations, including Engie, JetBlue, Nordstrom, Takeda Pharmaceutical, Teach for America, T-Mobile and Twilio, trust Okta to help protect the identities of their workforces and customers.
Organisations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Learn more at www.rapid7.com.
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over two million companies continuously rated. SecurityScorecard’s patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the only provider of instant risk ratings that automatically map to vendor cybersecurity questionnaire responses - providing a true 360-degree view of risk.
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day. We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.
Vectra® protects business by detecting and stopping cyberattacks.
As a leader in network detection and response (NDR), Vectra® AI protects your data, systems and infrastructure. Vectra AI enables your SOC team to quickly discover and respond to would-be attackers —before they act. Vectra AI rapidly identifies suspicious behaviour and activity on your extended network, whether on-premises or in the cloud. Vectra will find it, flag it, and alert security personnel so they can respond immediately. Vectra AI is Security that thinks®. It uses artificial intelligence to improve detection and response over time, eliminating false positives so you can focus on real threats.
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.
Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.
By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.
AiSP is an independent cybersecurity association that believes in developing, supporting and enhancing industry technical competence and management expertise to promote the integrity, status and interests of Information Security Professionals in Singapore. Through promoting the development, increase and spread of cybersecurity knowledge, AiSP aims to create a safe cybersecurity ecosystem.
The ACCA is the apex industry trade association that represents the stakeholders of the cloud computing ecosystem in Asia Pacific. The ACCA’s primary mission is to accelerate the adoption of cloud computing in Asia by helping create a trusted and compelling market environment, and a safe and consistent regulatory environment for cloud computing products and services.
The association works to ensure that the interests of the cloud computing community are effectively represented in the public policy debate. We aim to promote the growth and development of cloud computing in Asia Pacific through dialogue, training, and public education. We also provide a vendor-neutral platform for members to discuss implementation and growth strategies, share ideas, and establish policies and best practices relating to the cloud computing ecosystem.
In this digital-first reality, the Chief Information Officer is both strategist and operations leader, helping guide the enterprise to its new destination, responding to changes and adjusting to the realities of an unknown future.
FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.
The race to harness the power of the Internet of Things (IoT) is here. At stake is a US$724.2 Billion opportunity by 2023 dwarfing previous generations of innovations and finally allow the world to truly benefit from the promise of connectivity. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business.
FutureIoT is Asia’s only dedicated media publication that provides a single source of truth about IoT, the technology, its application and regulation.
ISACA (previously the Information Systems Audit and Control Association) is a worldwide association of IS governance professionals. The association currently focuses on assurance, security, governance and risk and provides globally recognised certification in assurance (Certified Information Systems Auditor), security (Certified Information Security Manager), governance (Certified in the Governance of Enterprise IT) and risk (Certified in Risk and Information Systems Control).
ACN Newswire supports Asian companies and organizations with press release distribution to stakeholders in Asia and worldwide -- institutional investors and analysts, individual stakeholders, financial & trade media and the Internet. Today, ACN Newswire is the globally recognized press release distributor from the region, in simplified & traditional Chinese, Korean and Japanese as well as English.
Computer Weekly stands out from the many technology news websites on offer through its unique history, extensive reader community and in-depth coverage of the issues, challenges and trends facing today’s IT leaders. Computer Weekly provides the latest news and analysis through its website and 200,000-subscriber weekly digital magazine, as well as award-winning and exclusive premium content; a dedicated monthly magazine for European IT leaders; independent research studies; and the CW500 Club’sexclusive networking events for senior IT managers. From being the world’s first weekly IT newspaper in 1966, to today’s multi-platform digital publication, Computer Weekly continues to reach millions of IT decision-makers in the UK, Europe and the rest of the world.
MySecurity Media is an integrated media provider for the Security, Technology, Risk and Governance sectors with market reach via newsletters, digital magazines, podcasts, article mixes, web-channels and highly targeted event exposure, including roundtables and Meetups.
For more information visit: https://mysecuritymedia.com/
Wire19 is a leading news portal dedicated to the digital transformation, brought about by cloud and advanced technologies like Artificial Intelligence, IoT and more, driving innovation in different industry verticals, including ICT, healthcare, retail, managed services etc.
Wire19 are the IT magazine for key decision makers, services providers and managed service providers in the cloud business.
The content of Wire19 is regularly updated with the latest industry news and innovations built around AI, IoT, Robotics and other modern age technologies.
The rapid and constant pace of change makes keeping up to date challenging for even the most committed of information security leaders.
This is why Corinium is bringing you, CISO Online Asia.
Chief Information Security Officer Online will welcome Senior Information Security Executives responsible for championing the cybersecurity agenda. The event agenda will showcase eight live presentations (in webinar format) from some of the most innovative companies in Asia.
Directly into your office, home, tablet or phone! All in manageable bite-size chunks over four days to fit neatly around your schedule.
Across 2 days, we broadcast a 5 hour webinar session directly to your desk. Throughout the week you will benefit from our insightful sessions, delivered by outstanding data and analytic specialists, covering your most pertinent challenges.
CISO Online ASEAN uses the latest browser-based technology meaning you won't need to download any software to join the event. Simply ensure you have a wifi connection and a web browser such as Chrome, Safari, Edge or Internet Explorer.
All sessions will be accessible LIVE, during the event hours, and on-demand for 2 weeks after the event.
Terms & Conditions
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
Disclosure of your information
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:
- Business partners
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Bigmarker
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing email@example.com
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at firstname.lastname@example.org