<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

 

CISO Logo (17)

9:30am - 1.30pm SGT

CLAIM YOUR FREE PLACE

REQUEST SPONSORSHIP PROSPECTUS

Day 1 - 15 June
09:30 SGT

KEYNOTE PANEL: ASEAN CISOs reveal the secrets to become catalysts for change

As cybersecurity continuous to be top priority for businesses around the world, CISOs must embrace the role of change advocate. The question is how can they deliver cybersecurity transformation? During this session, our inspiring panellists will reveal their secrets on:

  • How to report risk assessment metrics to the board and get senior-level support to safeguard the business
  • Strategies to engage the boardroom to obtain funds for your cybersecurity investments
  • How to work in partnership with cross-department leaders to ensure all business decisions are made in accordance with the company’s desired levels of risk

Panel moderator:
Raghu Nandakumara, Field CTO, Illumio

Speaking:

KEYNOTE PANEL: ASEAN CISOs reveal the secrets to become catalysts for change

June 15 | 09:30 SGT - 10:05 SGT

As cybersecurity continuous to be top priority for businesses around the world, CISOs must embrace the role of change advocate. The question is how can they deliver cybersecurity transformation? During this session, our inspiring panellists will reveal their secrets on:

  • How to report risk assessment metrics to the board and get senior-level support to safeguard the business
  • Strategies to engage the boardroom to obtain funds for your cybersecurity investments
  • How to work in partnership with cross-department leaders to ensure all business decisions are made in accordance with the company’s desired levels of risk

Panel moderator:
Raghu Nandakumara, Field CTO, Illumio

CLAIM YOUR FREE PLACE

Speaking:

10:05 SGT

Focus on critical infrastructure security boosted as cyber threats roar

CISOs working within critical infrastructure sectors are on high alert. Now more than ever, they are looking for ways to build their organisations’ cyber resilience, improve awareness, ensure operational technology integrity, and bridge the gap between physical and cybersecurity. Join this session for a deep-dive on issues around emerging cyber threats in essential sectors, the impacts of remote workforce, pandemic fatigue and current insecurities in our economic environments. 

Speaker:
Neil Campbell,
Vice President, Asia Pacific and Japan, Rapid7

Speaking:

Focus on critical infrastructure security boosted as cyber threats roar

June 15 | 10:05 SGT - 10:30 SGT

CISOs working within critical infrastructure sectors are on high alert. Now more than ever, they are looking for ways to build their organisations’ cyber resilience, improve awareness, ensure operational technology integrity, and bridge the gap between physical and cybersecurity. Join this session for a deep-dive on issues around emerging cyber threats in essential sectors, the impacts of remote workforce, pandemic fatigue and current insecurities in our economic environments. 

Speaker:
Neil Campbell,
Vice President, Asia Pacific and Japan, Rapid7

CLAIM YOUR FREE PLACE

Speaking:

10:30 SGT

Is supply chain the weakest risk of your digital assets and services?

Cybercrime has ramped up amid COVID-19 accelerated digital transformation, exposing damaging weaknesses along organisations’ supply chains.

During this session, Steven Sim will be sharing his vast expertise on how to enable business resilience by optimising the supply chain risk of your digital assets and services. He has worked for 23 years in the cybersecurity field, and some of his key areas of expertise include Risk Optimisation, Internet of Logistics TM, CP 4.0 TM, Supply Chain 4.0 and Cyber-Physical Systems.

Speaker:
Steven Sim, President, ISACA Singapore Chapter

Speaking:

Is supply chain the weakest risk of your digital assets and services?

June 15 | 10:30 SGT - 10:55 SGT

Cybercrime has ramped up amid COVID-19 accelerated digital transformation, exposing damaging weaknesses along organisations’ supply chains.

During this session, Steven Sim will be sharing his vast expertise on how to enable business resilience by optimising the supply chain risk of your digital assets and services. He has worked for 23 years in the cybersecurity field, and some of his key areas of expertise include Risk Optimisation, Internet of Logistics TM, CP 4.0 TM, Supply Chain 4.0 and Cyber-Physical Systems.

Speaker:
Steven Sim, President, ISACA Singapore Chapter

CLAIM YOUR FREE PLACE

Speaking:

10:55 SGT

Cloud on the rise, but without security you may be at higher risk

As organisations increase their reliance on the cloud, information and cybersecurity leaders must ensure the data they’re moving onto it is protected and secure. During this session, we will explore how you can manage the risks of firewall breaches, shadow IT, internal and external cyber threats among others when undertaking a cloud adoption journey.

Speaker:
Morey Haber, Global CISO/CTO, BeyondTrust

Speaking:

Cloud on the rise, but without security you may be at higher risk

June 15 | 10:55 SGT - 11:20 SGT

As organisations increase their reliance on the cloud, information and cybersecurity leaders must ensure the data they’re moving onto it is protected and secure. During this session, we will explore how you can manage the risks of firewall breaches, shadow IT, internal and external cyber threats among others when undertaking a cloud adoption journey.

Speaker:
Morey Haber, Global CISO/CTO, BeyondTrust

CLAIM YOUR FREE PLACE

Speaking:

11:20 SGT

Auditing your cyber plans: Are the frontiers of your virtualised environment strong enough?

  • Understanding the potential of hypervisor support and how it can aid in the audit process
  • Bridging the interoperability gap when running multi–Operating Systems
  • Documenting the hardware and supporting network infrastructure to obtain an overall virtualised management architecture
  • Verifying the appropriate management of provisioning and de-provisioning new virtual machines

Speaker:
Sharon Sharmini Leo, Corporate Internal IT Auditor, Huntsman

Speaking:

Auditing your cyber plans: Are the frontiers of your virtualised environment strong enough?

June 15 | 11:20 SGT - 11:45 SGT

  • Understanding the potential of hypervisor support and how it can aid in the audit process
  • Bridging the interoperability gap when running multi–Operating Systems
  • Documenting the hardware and supporting network infrastructure to obtain an overall virtualised management architecture
  • Verifying the appropriate management of provisioning and de-provisioning new virtual machines

Speaker:
Sharon Sharmini Leo, Corporate Internal IT Auditor, Huntsman

CLAIM YOUR FREE PLACE

Speaking:

11:45 SGT

Securing the future of work with cyber AI

The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.
In this session, learn about:

  • Emerging threats from the transition to remote work
  • How AI has adapted to new patterns of work
  • Darktrace’s use of Cyber AI to protect the dynamic workforce
  • Defensive Autonomous Response capabilities

Speaker:
Yuko Miyahara, Commercial Team Lead, Darktrace

Speaking:

Securing the future of work with cyber AI

June 15 | 11:45 SGT - 12:10 SGT

The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.
In this session, learn about:

  • Emerging threats from the transition to remote work
  • How AI has adapted to new patterns of work
  • Darktrace’s use of Cyber AI to protect the dynamic workforce
  • Defensive Autonomous Response capabilities

Speaker:
Yuko Miyahara, Commercial Team Lead, Darktrace

CLAIM YOUR FREE PLACE

Speaking:

12:10 SGT

How the Red Team Exercise is helping CISO to validate the security controls effectively

  • Differences between Red Teaming and Penetration Testing?
  • Which is the Red Teaming approach should be considered?
  • Should the organization run in-house or outsource Red Team?
  • What is the challenges to run in-house Red Team?
  • How the Red teaming validate Blue Team’s loop hole or blind-spot?
  • How the Red Team brings the value to the organization?

Speaker:
Tan Zhon Teck, VP, Security Operations & Cyber Offense, AmBank Group

Speaking:

How the Red Team Exercise is helping CISO to validate the security controls effectively

June 15 | 12:10 SGT - 12:35 SGT

  • Differences between Red Teaming and Penetration Testing?
  • Which is the Red Teaming approach should be considered?
  • Should the organization run in-house or outsource Red Team?
  • What is the challenges to run in-house Red Team?
  • How the Red teaming validate Blue Team’s loop hole or blind-spot?
  • How the Red Team brings the value to the organization?

Speaker:
Tan Zhon Teck, VP, Security Operations & Cyber Offense, AmBank Group

CLAIM YOUR FREE PLACE

Speaking:

12:35 SGT

Lessons from SolarWinds attack: Why IAM is now under the spotlight

SolarWinds Supply-Chain attack is one of the most potentially damaging attacks in recent times, prompting worldwide businesses to rethink how they approach security issues, especially around identity and access management. According to Jay Gazlay, technical strategist with CISA, the takeaway from this attack is that identity is everything now. Join this session to explore the risks and benefits of this approach, when to adopt it, when to combine it with PAM, and the key success factors to be considered when implementing IAM.

Lessons from SolarWinds attack: Why IAM is now under the spotlight

June 15 | 12:35 SGT - 13:00 SGT

SolarWinds Supply-Chain attack is one of the most potentially damaging attacks in recent times, prompting worldwide businesses to rethink how they approach security issues, especially around identity and access management. According to Jay Gazlay, technical strategist with CISA, the takeaway from this attack is that identity is everything now. Join this session to explore the risks and benefits of this approach, when to adopt it, when to combine it with PAM, and the key success factors to be considered when implementing IAM.

CLAIM YOUR FREE PLACE

Speaking:

1:00 SGT

FIRESIDE CHAT: Leading in crisis – all you need to know when creating incident response plans

Sophisticated hackers are often attacking silently, making it harder for organisations to realise that they’ve suffered a breach. In the ASEAN region, the average time to identify and contain a breach was 287 days in 2020. Ensuring your company has an effective threat management plan is more critical now than ever before.

Speaker: 
Yaron Slutzky, CISO, Agoda

Speaking:

FIRESIDE CHAT: Leading in crisis – all you need to know when creating incident response plans

June 15 | 13:00 SGT - 13:25 SGT

Sophisticated hackers are often attacking silently, making it harder for organisations to realise that they’ve suffered a breach. In the ASEAN region, the average time to identify and contain a breach was 287 days in 2020. Ensuring your company has an effective threat management plan is more critical now than ever before.

Speaker: 
Yaron Slutzky, CISO, Agoda

CLAIM YOUR FREE PLACE

Speaking:

1:25 SGT

Day One Close

Day One Close

June 15 | 13:25 SGT

CLAIM YOUR FREE PLACE

Speaking:

Day 2 - 16 June
09:30 SGT

PANEL: Tell-all talk teaches you how to improve cyber awareness and culture

CISOs committed to creating risk awareness and building a cybersecurity driven culture are facing a number of challenges, from getting senior management buy-in, to implementing organisational change and engaging employees. During this session, our panellists will share their experiences on:

  • What are the biggest challenges when getting buy-in from top management?
  • How to encourage everybody to take ownership of cyber?
  • Why leaders must be committed to continually improve their teams’ skills and knowledge in IT and cybersecurity – and how do to this?
  • Exploring business cases of companies that are successfully achieving this

PANEL: Tell-all talk teaches you how to improve cyber awareness and culture

June 16 | 09:30 SGT - 10:05 SGT

CISOs committed to creating risk awareness and building a cybersecurity driven culture are facing a number of challenges, from getting senior management buy-in, to implementing organisational change and engaging employees. During this session, our panellists will share their experiences on:

  • What are the biggest challenges when getting buy-in from top management?
  • How to encourage everybody to take ownership of cyber?
  • Why leaders must be committed to continually improve their teams’ skills and knowledge in IT and cybersecurity – and how do to this?
  • Exploring business cases of companies that are successfully achieving this
CLAIM YOUR FREE PLACE

Speaking:

10:05 SGT

Cyber experts recommend these CX milestones to gain customers’ digital trust

As costumers are increasingly protective over their security and privacy, organisations must focus on gaining their cyber trust. Join this session to explore successful strategies on the applications of customer experience strategies to create awareness and protect employees and customers.

Cyber experts recommend these CX milestones to gain customers’ digital trust

June 16 | 10:05 SGT - 10:30 SGT

As costumers are increasingly protective over their security and privacy, organisations must focus on gaining their cyber trust. Join this session to explore successful strategies on the applications of customer experience strategies to create awareness and protect employees and customers.

CLAIM YOUR FREE PLACE

Speaking:

10:30 SGT

Storm of breaches sends a message on cybersecurity shared responsibility

As the number of incidents ramps up and organisations fail to respond effectively and comply with cybersecurity requirements, the “blame-game” has minimum impact in fixing the issue in the short, medium and long terms. Thava’s passion in providing a safe and secure environment led her to become a specialist in delivering public awareness programs related to Cybersecurity. Join her for a discussion on:

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • How leaders can continually improve their teams’ skills and knowledge in IT and cybersecurity
  • Exploring business cases of companies that are successfully achieving this

Speaker:
Thavaselvi Munusamy, Information Technology Audit Manager, Hong Leong Group

Speaking:

Storm of breaches sends a message on cybersecurity shared responsibility

June 16 | 10:30 SGT - 10:55 SGT

As the number of incidents ramps up and organisations fail to respond effectively and comply with cybersecurity requirements, the “blame-game” has minimum impact in fixing the issue in the short, medium and long terms. Thava’s passion in providing a safe and secure environment led her to become a specialist in delivering public awareness programs related to Cybersecurity. Join her for a discussion on:

  • What are the biggest challenges when creating risk awareness and building a cybersecurity driven culture?
  • How to encourage everybody to take ownership of cyber?
  • How leaders can continually improve their teams’ skills and knowledge in IT and cybersecurity
  • Exploring business cases of companies that are successfully achieving this

Speaker:
Thavaselvi Munusamy, Information Technology Audit Manager, Hong Leong Group

CLAIM YOUR FREE PLACE

Speaking:

10:55 SGT

What IT/OT convergence means for your cybersecurity strategies

  • Understanding the convergence of IT and OT and how to protect them in the network
  • How to overcome the increase of cyber risk to industrial control?
  • Adopting cybersecurity strategies across your ICT (industry control systems)
  • Key cybersecurity considerations of networks, IoT devices security, mobile and the cloud

What IT/OT convergence means for your cybersecurity strategies

June 16 | 10:55 SGT - 11:20 SGT

  • Understanding the convergence of IT and OT and how to protect them in the network
  • How to overcome the increase of cyber risk to industrial control?
  • Adopting cybersecurity strategies across your ICT (industry control systems)
  • Key cybersecurity considerations of networks, IoT devices security, mobile and the cloud
CLAIM YOUR FREE PLACE

Speaking:

11:20 SGT

What is IoT security and why will it be your next focus?

In recent years, the use of micro controllers acting as sensors within a network (IoT) has increased massively. However, these micro controllers could be remotely modified to produce false data or take unauthorized actions. During this session, we will explore what it means to your business and how this could impact your digital network.

What is IoT security and why will it be your next focus?

June 16 | 11:20 SGT - 11:45 SGT

In recent years, the use of micro controllers acting as sensors within a network (IoT) has increased massively. However, these micro controllers could be remotely modified to produce false data or take unauthorized actions. During this session, we will explore what it means to your business and how this could impact your digital network.

CLAIM YOUR FREE PLACE

Speaking:

11:45 SGT

How the winners of “The European Award for Best Practices 2020 – Gold Class” manage cyber threats

During this session, we will explore how True Corporation, one of Thailand’s largest communications group, is effectively managing threat and incident prevention & response. Winner of the ESQR Switzerland awards “The European Award for Best Practices 2020” in Gold Class, the group has a strong business performance with quality evaluation under international standard framework as well as advanced innovation technology creation, emphasising on its excellence in quality organisation management in every dimension. Join the group’s CISO and CDO to discuss:

  • How to define the processes to respond to incidents quickly, effectively and with minimal consequences?
  • Strategies to develop a scenario exercise to predict risks and anticipate how prepared you are for an attack
  • What are the best strategies to minimise financial and reputational losses as a result of cyber-attacks?

Speaker:
Tithirat Siripattanalert, Group CISO and CDO, True Corporation

Speaking:

How the winners of “The European Award for Best Practices 2020 – Gold Class” manage cyber threats

June 16 | 11:45 SGT - 12:10 SGT

During this session, we will explore how True Corporation, one of Thailand’s largest communications group, is effectively managing threat and incident prevention & response. Winner of the ESQR Switzerland awards “The European Award for Best Practices 2020” in Gold Class, the group has a strong business performance with quality evaluation under international standard framework as well as advanced innovation technology creation, emphasising on its excellence in quality organisation management in every dimension. Join the group’s CISO and CDO to discuss:

  • How to define the processes to respond to incidents quickly, effectively and with minimal consequences?
  • Strategies to develop a scenario exercise to predict risks and anticipate how prepared you are for an attack
  • What are the best strategies to minimise financial and reputational losses as a result of cyber-attacks?

Speaker:
Tithirat Siripattanalert, Group CISO and CDO, True Corporation

CLAIM YOUR FREE PLACE

Speaking:

12:10 SGT

EXCLUSIVE INTERVIEW: Let’s talk about privacy – Incorporating data governance into cybersecurity

  • How to use data governance to enable agility and business growth
  • Integrating privacy management programs into the business to minimise risks and failures
  • What are the best practices in protecting sensitive and highly sensitive data?
  • Extending data security with identity access management

Speaker:
Jason Lau, CISO, Crypto.com

Speaking:

EXCLUSIVE INTERVIEW: Let’s talk about privacy – Incorporating data governance into cybersecurity

June 16 | 12:10 SGT - 12:35 SGT

  • How to use data governance to enable agility and business growth
  • Integrating privacy management programs into the business to minimise risks and failures
  • What are the best practices in protecting sensitive and highly sensitive data?
  • Extending data security with identity access management

Speaker:
Jason Lau, CISO, Crypto.com

CLAIM YOUR FREE PLACE

Speaking:

12:35 SGT

Simplifying cybersecurity compliance with renowned “Architect of Excellence”

Krishna Kasi, an IT Security enthusiast with over 20 years of experience in the ICT sector, was recognised as an “Architect of Excellence” by Microsoft. During his session, he will share his expertise in implementing successful cybersecurity compliance frameworks within the enterprise. Join him as he talks on:

  • Defining a desired cybersecurity maturity matrix for the organization
  • Breaking through traditional mindset for compliance framework
  • Identifying best practices for meeting standards and regulatory requirements

Speaker:
Krishna Kasi, Vice President - Security, BNP Paribas

Speaking:

Simplifying cybersecurity compliance with renowned “Architect of Excellence”

June 16 | 12:35 SGT - 13:00 SGT

Krishna Kasi, an IT Security enthusiast with over 20 years of experience in the ICT sector, was recognised as an “Architect of Excellence” by Microsoft. During his session, he will share his expertise in implementing successful cybersecurity compliance frameworks within the enterprise. Join him as he talks on:

  • Defining a desired cybersecurity maturity matrix for the organization
  • Breaking through traditional mindset for compliance framework
  • Identifying best practices for meeting standards and regulatory requirements

Speaker:
Krishna Kasi, Vice President - Security, BNP Paribas

CLAIM YOUR FREE PLACE

Speaking:

1:00 SGT

Day Two Close

Day Two Close

June 16 | 13:00 SGT

CLAIM YOUR FREE PLACE

Speaking: