Regardless of the number of defences raised around your data, one of the highest security risks involves high-level access of data with third-party vendors. Breaches can occur at any point in a business relationship or supply chain, so a comprehensive vendor information management system is critical to have in any industry and organisation. This discussion will focus on what CISOs can do to ensure business-as-usual, yet vigilantly guard information systems from breaches.
Speaking:
CISO, Hospital Authority (Hong Kong)
Advisory Board, Singapore CIO Network (SCION)
President, ISACA Singapore Chapter
Principal Solutions Architect, Elastic
November 2 | 10:32 SGT - 11:14 SGT
Regardless of the number of defences raised around your data, one of the highest security risks involves high-level access of data with third-party vendors. Breaches can occur at any point in a business relationship or supply chain, so a comprehensive vendor information management system is critical to have in any industry and organisation. This discussion will focus on what CISOs can do to ensure business-as-usual, yet vigilantly guard information systems from breaches.
The events of 2020 have exposed just how critical trust is for consumers and businesses alike. Forward now to 2H 2021, Organisations had to trust their employees to work from home, and consumers had to trust businesses with their information.
At Okta, we wanted to know what trust looks like in this increasingly digital world, so we worked with YouGov to survey more than 1,700 office workers across Asia, in Singapore, Hong Kong, Philippines, Malaysia and Indonesia.
Speaking:
Senior Sales Engineer, Asia, Okta
November 2 | 11:14 SGT - 11:36 SGT
The events of 2020 have exposed just how critical trust is for consumers and businesses alike. Forward now to 2H 2021, Organisations had to trust their employees to work from home, and consumers had to trust businesses with their information.
At Okta, we wanted to know what trust looks like in this increasingly digital world, so we worked with YouGov to survey more than 1,700 office workers across Asia, in Singapore, Hong Kong, Philippines, Malaysia and Indonesia.
Speaking:
Group Editor-in-Chief, CXOCIETY
Head Of Information Security, Tokio Marine Insurance Group (Singapore)
Head Cybersecurity, PRefChem (PETRONAS)
CISO, Dai-ichi Life Insurance (Cambodia) PLC
Regional Director – Asia, ThycoticCentrify
November 2 | 11:36 SGT - 12:01 SGT
In the current turbulent and dynamic digital cyber world, incidents are exponentially increasing and adversaries are highly motivated for the next stages of attack.
Two different schools of thought on defense strategy are either to ‘continuously increase defense controls and resources with changing threat landscape’ or to ‘continuously reduce attack surface to be resilient’.
Overtime the latter approach was found to be effective and sustainable at lower cost.
This approach also helps in building strong foundation for a zero trust approach, which is relevant and critical in the current boundaryless digital environment.
Speaking:
Regional CTO APJ & EMEA, Forescout
November 2 | 12:01 SGT - 12:23 SGT
In the current turbulent and dynamic digital cyber world, incidents are exponentially increasing and adversaries are highly motivated for the next stages of attack.
Two different schools of thought on defense strategy are either to ‘continuously increase defense controls and resources with changing threat landscape’ or to ‘continuously reduce attack surface to be resilient’.
Overtime the latter approach was found to be effective and sustainable at lower cost.
This approach also helps in building strong foundation for a zero trust approach, which is relevant and critical in the current boundaryless digital environment.
Speaking:
Director - Information Security, Asia Pacific, VF Corporation
November 2 | 12:23 SGT - 12:52 SGT
Speaking:
November 2 | 12:52 SGT - 13:10 SGT
• Data security accountability: instilling enterprise-wide governance and shared responsibilities
• Creating a cyber security-centric data governance framework
• Clearly defined outlines around data access and coordinating rules around this
Speaking:
CTO, APAC, Netskope
November 2 | 13:10 SGT - 13:30 SGT
• Data security accountability: instilling enterprise-wide governance and shared responsibilities
• Creating a cyber security-centric data governance framework
• Clearly defined outlines around data access and coordinating rules around this
Cyber security imperatives are in a constant state of flux. One moment a certain skill set will be critical, only for the threat direction to change shortly thereafter, necessitating a new scope of expertise and strategy. This session will focus on one of the long-standing issues faced by CISOs and IT security heads, which is attracting and retaining the right security professionals through more diverse and culture-driven initiatives. Key talk points are:
Speaking:
Group Chief Risk & Compliance Officer, Axiata
Head of Cyber Security, PLUS Malaysia
Chief Technology Officer, Singapore Sports Hub
Chief Strategy Officer, Wire19 (a venture of ZNet Technologies)
November 2 | 13:30 SGT - 14:07 SGT
Cyber security imperatives are in a constant state of flux. One moment a certain skill set will be critical, only for the threat direction to change shortly thereafter, necessitating a new scope of expertise and strategy. This session will focus on one of the long-standing issues faced by CISOs and IT security heads, which is attracting and retaining the right security professionals through more diverse and culture-driven initiatives. Key talk points are:
If the increase in Ransomware attacks, SolarWinds, and the Colonial Pipeline disruption have taught us anything, the bad guys are not backing down any time soon, and we need to operate even while under attack. The key is proper planning, practice, and post-mortems. Cyber-attacks remain focused on stealing our data and our intellectual property (IP). But, more and more, we are experiencing disruption to the underlying infrastructure - oil, gas, electricity, water - that cannot be offline while we deal with a hacker.
Real-world practitioners will cover; the threat using real-world case studies to provide five practical things you can do today that could save your organisation tomorrow. You will leave with street knowledge along with a list of real-world resources and solutions that can enable you to be better prepared to take on the adversity of a cyber attack or disaster event.
Speaking:
Global Field CTO – Security, Rubrik
November 2 | 14:07 SGT - 14:28 SGT
If the increase in Ransomware attacks, SolarWinds, and the Colonial Pipeline disruption have taught us anything, the bad guys are not backing down any time soon, and we need to operate even while under attack. The key is proper planning, practice, and post-mortems. Cyber-attacks remain focused on stealing our data and our intellectual property (IP). But, more and more, we are experiencing disruption to the underlying infrastructure - oil, gas, electricity, water - that cannot be offline while we deal with a hacker.
Real-world practitioners will cover; the threat using real-world case studies to provide five practical things you can do today that could save your organisation tomorrow. You will leave with street knowledge along with a list of real-world resources and solutions that can enable you to be better prepared to take on the adversity of a cyber attack or disaster event.
By analysing the ASEAN threat landscape and threat intelligence, this panel aims to prepare organisations for new risks to the region and what the best counter strategies are to overcome them.
Speaking:
Chief Research Officer - Center for Advanced Computing & Telecommunications
Vice President, Information Security, Bursa Malaysia
Senior Vice President, APAC Region Information Security Lead, Wells Fargo
Vice President and Group Chief Information Security Officer, Meralco Chairperson and President of Women in Security Alliance Philippines
November 3 | 09:31 SGT - 10:08 SGT
By analysing the ASEAN threat landscape and threat intelligence, this panel aims to prepare organisations for new risks to the region and what the best counter strategies are to overcome them.
Nearly every organisation today relies on software to operate. This software is a product of a complicated, interconnected supply chain in which organisations may not have visibility of the vulnerabilities. Yet, the consequences of successful cyber attacks through the supply chain can be severe.
In this session Ken Mizota, Director, Platform at Rapid7, will cover why you should be focusing on your software sources and how to prevent, detect and respond to incidents in your supply chain.
Speaking:
Regional CTO, APAC, Rapid7
November 3 | 10:08 SGT - 10:24 SGT
Nearly every organisation today relies on software to operate. This software is a product of a complicated, interconnected supply chain in which organisations may not have visibility of the vulnerabilities. Yet, the consequences of successful cyber attacks through the supply chain can be severe.
In this session Ken Mizota, Director, Platform at Rapid7, will cover why you should be focusing on your software sources and how to prevent, detect and respond to incidents in your supply chain.
How can you accurately measure cyber risk to determine if it is adequately managed?
Engaging the board: having the right conversation with the right language
Risk conversion at a CISO level
Taking your threat detection strategy to new heights: Detection best practices and solutions
Cyber risk management through modern security architecture
Speaking:
Chief Technology Officer, Aditya Birla Capital
Director (CII Division), Cyber Security Agency of Singapore
Commanding Officer at Cyber Battalion, ASR, Philippine Army
VP - Active Defense, Zscaler
Chief Research Officer - Center for Advanced Computing & Telecommunications
November 3 | 10:24 SGT - 10:59 SGT
How can you accurately measure cyber risk to determine if it is adequately managed?
Engaging the board: having the right conversation with the right language
Risk conversion at a CISO level
Taking your threat detection strategy to new heights: Detection best practices and solutions
Cyber risk management through modern security architecture
XDR (extended detection and response) is the hot new buzzword in the security industry but so far there isn't a lot of agreement on what defines XDR. The goal makes sense. Extend your detection capabilities across your hybrid network to catch advanced threats like zero days, supply chain attacks, and insider threats, and respond quickly before damage can be done.
Join us as we explore the pros and cons of XDR such as, is it realistic that one vendor can offer you all the tools you need for detection and response or will you need to create a strategy to achieve your own extended detection and response ecosystem.
Attendees will walk away with a better understanding of:
• How to define what XDR means for your organisation
• How to create your own XDR strategy
• Why network data is an essential building block for any XDR ecosystem
Speaking:
APJ Systems Engineering Vice President, ExtraHop Networks
November 3 | 10:59 SGT - 11:24 SGT
XDR (extended detection and response) is the hot new buzzword in the security industry but so far there isn't a lot of agreement on what defines XDR. The goal makes sense. Extend your detection capabilities across your hybrid network to catch advanced threats like zero days, supply chain attacks, and insider threats, and respond quickly before damage can be done.
Join us as we explore the pros and cons of XDR such as, is it realistic that one vendor can offer you all the tools you need for detection and response or will you need to create a strategy to achieve your own extended detection and response ecosystem.
Attendees will walk away with a better understanding of:
• How to define what XDR means for your organisation
• How to create your own XDR strategy
• Why network data is an essential building block for any XDR ecosystem
This panel will deliberate how newer and innovative technologies are changing the cybersecurity landscape. Some technologies are new, while others have been around for a while, but all of them could play a significant role in altering an organisation’s infosec protection and defences – for better or for worse.
Tech-of-the-town: Some of the key technologies to discuss are blockchain, IoT, AI governance, machine learning, OT, quantum computing and 5G.
Speaking:
Attack Surface Management, Credit Suisse Singapore
Director of Security Engineering, APJ, Vectra AI
Executive Director, Asia Cloud Computing Association (ACCA)
November 3 | 11:24 SGT - 12:01 SGT
This panel will deliberate how newer and innovative technologies are changing the cybersecurity landscape. Some technologies are new, while others have been around for a while, but all of them could play a significant role in altering an organisation’s infosec protection and defences – for better or for worse.
Tech-of-the-town: Some of the key technologies to discuss are blockchain, IoT, AI governance, machine learning, OT, quantum computing and 5G.
Speaking:
Vice President, IT Audit, BNP Paribas
November 3 | 12:01 SGT - 12:26 SGT
Speaking:
Co-founder, Scantist
November 3 | 12:26 SGT - 12:38 SGT
During this session, delegates will get to hear the backstory directly from a former black hat. They will talk about their strategy and how they successfully hacked into a major corporation or extensive database. In this exclusive, get the low down on how to outsmart cyber attackers with the inside knowledge of a former hacker.
Speaking:
Former hacker and cybercriminal - now Cybersecurity Specialist, National Cyber Security Center of Vietnam Co-founder, ChongLuaDao.Vn
Former Managing Director, Global Resilience Federation, APAC
November 3 | 12:38 SGT - 13:11 SGT
During this session, delegates will get to hear the backstory directly from a former black hat. They will talk about their strategy and how they successfully hacked into a major corporation or extensive database. In this exclusive, get the low down on how to outsmart cyber attackers with the inside knowledge of a former hacker.