<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

 

CISO Logo (17)

9:30am - 1.30pm SGT

CLAIM YOUR FREE PLACE

REQUEST SPONSORSHIP PROSPECTUS

Day 1 - 15 June
09:30 SGT

KEYNOTE PANEL: ASEAN CISOs reveal the secrets to become catalysts for change

As cybersecurity continuous to be top priority for businesses around the world, CISOs must embrace the role of change advocate. The question is how can they deliver cybersecurity transformation? During this session, our inspiring panellists will reveal their secrets on:

  • How to report risk assessment metrics to the board and get senior-level support to safeguard the business
  • Strategies to engage the boardroom to obtain funds for your cybersecurity investments
  • How to work in partnership with cross-department leaders to ensure all business decisions are made in accordance with the company’s desired levels of risk

Panel moderator:
Allan Tan, Group Editor-in-Chief, Cxociety

Panellists:
Raghu Nandakumara, Field CTO, Illumio
Amirudin Abdul Wahab, CEO, CyberSecurity Malaysia 

Speaking:

KEYNOTE PANEL: ASEAN CISOs reveal the secrets to become catalysts for change

June 15 | 09:30 SGT - 10:05 SGT

As cybersecurity continuous to be top priority for businesses around the world, CISOs must embrace the role of change advocate. The question is how can they deliver cybersecurity transformation? During this session, our inspiring panellists will reveal their secrets on:

  • How to report risk assessment metrics to the board and get senior-level support to safeguard the business
  • Strategies to engage the boardroom to obtain funds for your cybersecurity investments
  • How to work in partnership with cross-department leaders to ensure all business decisions are made in accordance with the company’s desired levels of risk

Panel moderator:
Allan Tan, Group Editor-in-Chief, Cxociety

Panellists:
Raghu Nandakumara, Field CTO, Illumio
Amirudin Abdul Wahab, CEO, CyberSecurity Malaysia 

CLAIM YOUR FREE PLACE

Speaking:

10:05 SGT

Effective security incident handling - Best practices to help you become both organisationally and technically ready

Fixing a breach is far more costly than prevention. Organisations are under pressure to act fast. More often than not though, it can be weeks or months before you’ve even realised that you’ve suffered one.

This session will outline six fundamental actions you need to take as part of your security incident handling:

  • High-level incident management and coordination
  • Technical analysis of the incident
  • Incident scoping to determine who or what was affected
  • Crisis communications to make sure information is released in a coordinated and beneficial manner
  • Legal response to determine any implications and prepare any needed response or action
  • Remediation and mitigation recommendations and actions to ensure a smooth recovery

Speaker:
Neil Campbell,
Vice President, Asia Pacific and Japan, Rapid7

Speaking:

Effective security incident handling - Best practices to help you become both organisationally and technically ready

June 15 | 10:05 SGT - 10:30 SGT

Fixing a breach is far more costly than prevention. Organisations are under pressure to act fast. More often than not though, it can be weeks or months before you’ve even realised that you’ve suffered one.

This session will outline six fundamental actions you need to take as part of your security incident handling:

  • High-level incident management and coordination
  • Technical analysis of the incident
  • Incident scoping to determine who or what was affected
  • Crisis communications to make sure information is released in a coordinated and beneficial manner
  • Legal response to determine any implications and prepare any needed response or action
  • Remediation and mitigation recommendations and actions to ensure a smooth recovery

Speaker:
Neil Campbell,
Vice President, Asia Pacific and Japan, Rapid7

CLAIM YOUR FREE PLACE

Speaking:

10:30 SGT

Is supply chain the weakest risk of your digital assets and services?

Cybercrime has ramped up amid COVID-19 accelerated digital transformation, exposing damaging weaknesses along organisations’ supply chains.

During this session, Steven Sim will be sharing his vast expertise on how to enable business resilience by optimising the supply chain risk of your digital assets and services. He has worked for 23 years in the cybersecurity field, and some of his key areas of expertise include Risk Optimisation, Internet of Logistics TM, CP 4.0 TM, Supply Chain 4.0 and Cyber-Physical Systems.

Speaker:
Steven Sim, President, ISACA Singapore Chapter

Speaking:

Is supply chain the weakest risk of your digital assets and services?

June 15 | 10:30 SGT - 10:55 SGT

Cybercrime has ramped up amid COVID-19 accelerated digital transformation, exposing damaging weaknesses along organisations’ supply chains.

During this session, Steven Sim will be sharing his vast expertise on how to enable business resilience by optimising the supply chain risk of your digital assets and services. He has worked for 23 years in the cybersecurity field, and some of his key areas of expertise include Risk Optimisation, Internet of Logistics TM, CP 4.0 TM, Supply Chain 4.0 and Cyber-Physical Systems.

Speaker:
Steven Sim, President, ISACA Singapore Chapter

CLAIM YOUR FREE PLACE

Speaking:

10:55 SGT

Cloud on the rise, but without security you may be at higher risk

As organisations increase their reliance on the cloud, information and cybersecurity leaders must ensure the data they’re moving onto it is protected and secure. During this session, we will explore how you can manage the risks of firewall breaches, shadow IT, internal and external cyber threats among others when undertaking a cloud adoption journey.

Speaker:
Ajay Kumar, Director, Solutions Engineering – APJ, BeyondTrust

Speaking:

Cloud on the rise, but without security you may be at higher risk

June 15 | 10:55 SGT - 11:20 SGT

As organisations increase their reliance on the cloud, information and cybersecurity leaders must ensure the data they’re moving onto it is protected and secure. During this session, we will explore how you can manage the risks of firewall breaches, shadow IT, internal and external cyber threats among others when undertaking a cloud adoption journey.

Speaker:
Ajay Kumar, Director, Solutions Engineering – APJ, BeyondTrust

CLAIM YOUR FREE PLACE

Speaking:

11:20 SGT

Auditing your cyber plans: Are the frontiers of your virtualised environment strong enough?

  • Understanding the potential of hypervisor support and how it can aid in the audit process
  • Bridging the interoperability gap when running multi–Operating Systems
  • Documenting the hardware and supporting network infrastructure to obtain an overall virtualised management architecture
  • Verifying the appropriate management of provisioning and de-provisioning new virtual machines

Speaker:
Sharon Sharmini Leo, SheLeadsTech Chapter Lead, ISACA Malaysia

Speaking:

Auditing your cyber plans: Are the frontiers of your virtualised environment strong enough?

June 15 | 11:20 SGT - 11:45 SGT

  • Understanding the potential of hypervisor support and how it can aid in the audit process
  • Bridging the interoperability gap when running multi–Operating Systems
  • Documenting the hardware and supporting network infrastructure to obtain an overall virtualised management architecture
  • Verifying the appropriate management of provisioning and de-provisioning new virtual machines

Speaker:
Sharon Sharmini Leo, SheLeadsTech Chapter Lead, ISACA Malaysia

CLAIM YOUR FREE PLACE

Speaking:

11:45 SGT

Autonomous Cyber AI: Redefining Enterprise Security

In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing. Organizations need to urgently rethink their strategy – to ensure their people and critical data are protected, wherever they are. Powered by Autonomous Cyber AI, today’s self-learning defenses are capable of identifying and neutralizing security incidents in seconds – not hours.

In this session, learn how self-learning AI:

  • Detects, investigates and responds to threats – even while you are OOTO
  • Protects your entire workforce and digital environment - wherever they are, whatever the data
  • Defends against zero-days and other advanced attacks – without disrupting the organization
Eugene Low, Regional Director, SEA & South Asia, Darktrace

Autonomous Cyber AI: Redefining Enterprise Security

June 15 | 11:45 SGT - 12:10 SGT

In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing. Organizations need to urgently rethink their strategy – to ensure their people and critical data are protected, wherever they are. Powered by Autonomous Cyber AI, today’s self-learning defenses are capable of identifying and neutralizing security incidents in seconds – not hours.

In this session, learn how self-learning AI:

  • Detects, investigates and responds to threats – even while you are OOTO
  • Protects your entire workforce and digital environment - wherever they are, whatever the data
  • Defends against zero-days and other advanced attacks – without disrupting the organization
Eugene Low, Regional Director, SEA & South Asia, Darktrace
CLAIM YOUR FREE PLACE

Speaking:

12:10 SGT

How the Red Team Exercise is helping CISO to validate the security controls effectively

  • Differences between Red Teaming and Penetration Testing?
  • Which is the Red Teaming approach should be considered?
  • Should the organization run in-house or outsource Red Team?
  • What is the challenges to run in-house Red Team?
  • How the Red teaming validate Blue Team’s loop hole or blind-spot?
  • How the Red Team brings the value to the organization?

Speaker:
Tan Zhon Teck, VP, Security Operations & Cyber Offense, AmBank Group

Speaking:

How the Red Team Exercise is helping CISO to validate the security controls effectively

June 15 | 12:10 SGT - 12:35 SGT

  • Differences between Red Teaming and Penetration Testing?
  • Which is the Red Teaming approach should be considered?
  • Should the organization run in-house or outsource Red Team?
  • What is the challenges to run in-house Red Team?
  • How the Red teaming validate Blue Team’s loop hole or blind-spot?
  • How the Red Team brings the value to the organization?

Speaker:
Tan Zhon Teck, VP, Security Operations & Cyber Offense, AmBank Group

CLAIM YOUR FREE PLACE

Speaking:

12:35 SGT

Modernizing your SOC

Staying ahead of the ever-evolving threat landscape is a huge challenge for any organisation. Cybercrime threats like ransomware, diverse malware strains, and advanced techniques like big game hunting require a new way to manage the SOC. And on top of that, an expanding attack surface, a shortage of security talent, and too many alerts, means that now is the time to explore how to modernize the SOC. Join this session to hear from Google Cloud about the best practices around people, processes, and tools that can help bring your enterprise SOC to the next level with threat hunting and incident investigations that can take advantage of 360-degree contextual analytics on all your security telemetry.

Speaker:
Alvin Lung, Head of Customer Engineering, Google Cloud Security

Modernizing your SOC

June 15 | 12:35 SGT - 13:00 SGT

Staying ahead of the ever-evolving threat landscape is a huge challenge for any organisation. Cybercrime threats like ransomware, diverse malware strains, and advanced techniques like big game hunting require a new way to manage the SOC. And on top of that, an expanding attack surface, a shortage of security talent, and too many alerts, means that now is the time to explore how to modernize the SOC. Join this session to hear from Google Cloud about the best practices around people, processes, and tools that can help bring your enterprise SOC to the next level with threat hunting and incident investigations that can take advantage of 360-degree contextual analytics on all your security telemetry.

Speaker:
Alvin Lung, Head of Customer Engineering, Google Cloud Security

CLAIM YOUR FREE PLACE

Speaking:

1:00 SGT

How to reduce risk, simplify IT and increase user productivity through a zero trust security model

Organisations are embracing digital transformation and moving applications out of traditional network boundaries. With rising cyber threats, how can organisations use a zero trust security model to reduce risk and simplify their IT, whilst increasing user productivity?

Pravin Kumar, CISO, Wibmo Inc. 

How to reduce risk, simplify IT and increase user productivity through a zero trust security model

June 15 | 13:00 SGT - 13:25 SGT

Organisations are embracing digital transformation and moving applications out of traditional network boundaries. With rising cyber threats, how can organisations use a zero trust security model to reduce risk and simplify their IT, whilst increasing user productivity?

Pravin Kumar, CISO, Wibmo Inc. 

CLAIM YOUR FREE PLACE

Speaking:

1:25 SGT

FIRESIDE CHAT: Protecting your organisation through IAM

Join us to learn how IAM is successfully helping protect your organisation from increasing cyber threats.

Speakers: 
Yaron Slutzky, CISO, Agoda
Karunanand Menon, Senior Sales engineer, Asia, Okta
Shubha Panicker
, Senior Customer Success Manager, Okta APAC

FIRESIDE CHAT: Protecting your organisation through IAM

June 15 | 13:25 SGT - 13:50 SGT

Join us to learn how IAM is successfully helping protect your organisation from increasing cyber threats.

Speakers: 
Yaron Slutzky, CISO, Agoda
Karunanand Menon, Senior Sales engineer, Asia, Okta
Shubha Panicker
, Senior Customer Success Manager, Okta APAC

CLAIM YOUR FREE PLACE

Speaking:

1:50 SGT

Day One Close

Day One Close

June 15 | 13:50 SGT

CLAIM YOUR FREE PLACE

Speaking:

Day 2 - 16 June

Speaking:

June 16 |

CLAIM YOUR FREE PLACE

Speaking:

09:30 SGT

PANEL: How to improve cyber awareness and culture

CISOs committed to creating risk awareness and building a cybersecurity driven culture are facing a number of challenges, from getting senior management buy-in, to implementing organisational change and engaging employees. During this session, our panellists will share their experiences on:

  • What are the biggest challenges when getting buy-in from top management?
  • How to encourage everybody to take ownership of cyber?
  • Why leaders must be committed to continually improve their teams’ skills and knowledge in IT and cybersecurity – and how do to this?
  • Exploring business cases of companies that are successfully achieving this

Panel moderator:
Sabarinathan Sampath, Chief Strategy Officer, Drive19

Panellists:
Anuradha Lipare
, Global Head of Data Security and Privacy, Gojek

PANEL: How to improve cyber awareness and culture

June 16 | 09:30 SGT - 10:05 SGT

CISOs committed to creating risk awareness and building a cybersecurity driven culture are facing a number of challenges, from getting senior management buy-in, to implementing organisational change and engaging employees. During this session, our panellists will share their experiences on:

  • What are the biggest challenges when getting buy-in from top management?
  • How to encourage everybody to take ownership of cyber?
  • Why leaders must be committed to continually improve their teams’ skills and knowledge in IT and cybersecurity – and how do to this?
  • Exploring business cases of companies that are successfully achieving this

Panel moderator:
Sabarinathan Sampath, Chief Strategy Officer, Drive19

Panellists:
Anuradha Lipare
, Global Head of Data Security and Privacy, Gojek

CLAIM YOUR FREE PLACE

Speaking:

10:05 SGT

Security through speed, scale and relevancy

In an ever-increasing need for businesses to be agile, rapid solution deliveries have accelerated an amplification of threat exposures including vast accumulation of data with every deployment. Come learn how Elastic tackles the challenges through a secure solution and well connected ecosystem in bringing security capabilities to life. Also, having helped many organisations in preventing (not only detecting) cyber-attacks, we will be sharing the following key focus areas to consider when designing and securing your business:

  • Eliminating blind spots
  • Stopping threats at scale
  • Enabling every analyst (to hunt, react and respond)
Nicholas Lim, Principal Solutions Architect, Elastic

Security through speed, scale and relevancy

June 16 | 10:05 SGT - 10:30 SGT

In an ever-increasing need for businesses to be agile, rapid solution deliveries have accelerated an amplification of threat exposures including vast accumulation of data with every deployment. Come learn how Elastic tackles the challenges through a secure solution and well connected ecosystem in bringing security capabilities to life. Also, having helped many organisations in preventing (not only detecting) cyber-attacks, we will be sharing the following key focus areas to consider when designing and securing your business:

  • Eliminating blind spots
  • Stopping threats at scale
  • Enabling every analyst (to hunt, react and respond)
Nicholas Lim, Principal Solutions Architect, Elastic
CLAIM YOUR FREE PLACE

Speaking:

10:30 SGT

Increase in breaches sends a message on cybersecurity shared responsibility

As the number of incidents ramps up and organisations fail to respond effectively and comply with cybersecurity requirements, the “blame-game” has minimum impact in fixing the issue in the short, medium and long terms. Thava’s passion in providing a safe and secure environment led her to become a specialist in delivering public awareness programs related to Cybersecurity. Join her for a discussion on:

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • How leaders can continually improve their teams’ skills and knowledge in IT and cybersecurity
  • Exploring business cases of companies that are successfully achieving this

Speaker:
Thavaselvi Munusamy, Information Technology Audit Manager, Hong Leong Group

Speaking:

Increase in breaches sends a message on cybersecurity shared responsibility

June 16 | 10:30 SGT - 10:55 SGT

As the number of incidents ramps up and organisations fail to respond effectively and comply with cybersecurity requirements, the “blame-game” has minimum impact in fixing the issue in the short, medium and long terms. Thava’s passion in providing a safe and secure environment led her to become a specialist in delivering public awareness programs related to Cybersecurity. Join her for a discussion on:

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • How leaders can continually improve their teams’ skills and knowledge in IT and cybersecurity
  • Exploring business cases of companies that are successfully achieving this

Speaker:
Thavaselvi Munusamy, Information Technology Audit Manager, Hong Leong Group

CLAIM YOUR FREE PLACE

Speaking:

11:20SGT

How the winners of “The European Award for Best Practices 2020 – Gold Class” manage cyber threats

During this session, we will explore how True Corporation, one of Thailand’s largest communications group, is effectively managing threat and incident prevention & response. Winner of the ESQR Switzerland awards “The European Award for Best Practices 2020” in Gold Class, the group has a strong business performance with quality evaluation under international standard framework as well as advanced innovation technology creation, emphasising on its excellence in quality organisation management in every dimension. Join the group’s CISO and CDO to discuss:

  • How to define the processes to respond to incidents quickly, effectively and with minimal consequences?
  • Strategies to develop a scenario exercise to predict risks and anticipate how prepared you are for an attack
  • What are the best strategies to minimise financial and reputational losses as a result of cyber-attacks?

Speaker:
Tithirat Siripattanalert, Group CISO and CDO, True Corporation

Speaking:

How the winners of “The European Award for Best Practices 2020 – Gold Class” manage cyber threats

June 16 | 11:20SGT - 11:45 SGT

During this session, we will explore how True Corporation, one of Thailand’s largest communications group, is effectively managing threat and incident prevention & response. Winner of the ESQR Switzerland awards “The European Award for Best Practices 2020” in Gold Class, the group has a strong business performance with quality evaluation under international standard framework as well as advanced innovation technology creation, emphasising on its excellence in quality organisation management in every dimension. Join the group’s CISO and CDO to discuss:

  • How to define the processes to respond to incidents quickly, effectively and with minimal consequences?
  • Strategies to develop a scenario exercise to predict risks and anticipate how prepared you are for an attack
  • What are the best strategies to minimise financial and reputational losses as a result of cyber-attacks?

Speaker:
Tithirat Siripattanalert, Group CISO and CDO, True Corporation

CLAIM YOUR FREE PLACE

Speaking:

11:45 SGT

EXCLUSIVE INTERVIEW: Let’s talk about privacy – Incorporating data governance into cybersecurity

  • How to use data governance to enable agility and business growth
  • Integrating privacy management programs into the business to minimise risks and failures
  • What are the best practices in protecting sensitive and highly sensitive data?
  • Extending data security with identity access management

Interviewee:
Jason Lau, CISO, Crypto.com

Interviewer:
James Tan, Committee Member, AiSP

Speaking:

EXCLUSIVE INTERVIEW: Let’s talk about privacy – Incorporating data governance into cybersecurity

June 16 | 11:45 SGT - 12:10 SGT

  • How to use data governance to enable agility and business growth
  • Integrating privacy management programs into the business to minimise risks and failures
  • What are the best practices in protecting sensitive and highly sensitive data?
  • Extending data security with identity access management

Interviewee:
Jason Lau, CISO, Crypto.com

Interviewer:
James Tan, Committee Member, AiSP

CLAIM YOUR FREE PLACE

Speaking:

12:10 SGT

Simplifying cybersecurity compliance with renowned “Architect of Excellence”

Krishna Kasi, an IT Security enthusiast with over 20 years of experience in the ICT sector, was recognised as an “Architect of Excellence” by Microsoft. During his session, he will share his expertise in implementing successful cybersecurity compliance frameworks within the enterprise. Join him as he talks on:

  • Defining a desired cybersecurity maturity matrix for the organization
  • Breaking through traditional mindset for compliance framework
  • Identifying best practices for meeting standards and regulatory requirements

Speaker:
Krishna Kasi, Vice President - Security, BNP Paribas

Speaking:

Simplifying cybersecurity compliance with renowned “Architect of Excellence”

June 16 | 12:10 SGT - 12:35 SGT

Krishna Kasi, an IT Security enthusiast with over 20 years of experience in the ICT sector, was recognised as an “Architect of Excellence” by Microsoft. During his session, he will share his expertise in implementing successful cybersecurity compliance frameworks within the enterprise. Join him as he talks on:

  • Defining a desired cybersecurity maturity matrix for the organization
  • Breaking through traditional mindset for compliance framework
  • Identifying best practices for meeting standards and regulatory requirements

Speaker:
Krishna Kasi, Vice President - Security, BNP Paribas

CLAIM YOUR FREE PLACE

Speaking:

12:35 SGT

Day Two Close

Day Two Close

June 16 | 12:35 SGT

CLAIM YOUR FREE PLACE

Speaking: