Agenda
08:00 - 09:00 SGT |
Networking |
09:00 - 09:10 SGT |
Chairman's Welcome |
09:10 - 09:30 SGT |
►There Ain't No Party Like a Compromised Third Party Steve Brown, Director, Cybersecurity, MasterCard
|
09:30 - 09:50 SGT |
► How to Disrupt Adversaries With Security Intelligence Yeo Chien Jen, Director Systems Engineering, Asia Pacific, Recorded Future
|
09:50 - 10:10 SGT |
► From Firefighting to a New Normal: A journey into the Passwordless World Karunanand Menon, Senior Sales Engineer, Asia, OKTA Inc
|
16:10 - 16:30 |
► Cybersecurity isn't Just Doom and Gloom Jerome Walter, CISO, Digital Venture, Standard Chartered Bank
|
10:30 - 11:00 SGT |
►Education Seminars 1 Delegates will be able to choose from a range of topics:
|
11:00 - 11:30 SGT |
Break and Networking |
11:30 - 11:50 SGT |
►Operational Resilience in the Financial Services The Financial Services have a more sophisticated attitude towards cyber risk given the level of regulation that binds the sector and the relentless level of attacks they face from criminals. Security leaders from banks, insurers, fintechs and investment managers understand that resilience is the key to a strong security posture. Join this executive panel discussion to find out how leaders in APAC financial institutions are addressing resilience
|
11:50 - 12:10 SGT |
► Why Integrated Endpoint-to-Cloud Security is Essential Aaron Cockerill, Chief Strategy Officer, Lookout
|
12:10 - 12:30 SGT |
► An Overdue Shift to People-Centric Security Adrian Covich, Senior Director, Systems Engineering, Proofpoint APJ
|
12:30 - 13:00 SGT |
► Education Seminars 2 Delegates will be able to choose from a range of topics:
|
13:00 - 14:00 SGT |
Lunch and Networking |
14:00 - 14:20 SGT |
► Security in the Midst of IT/OT Convergence. Mel Migriño, Group CISO, Meralco
|
14:20 - 14:40 SGT |
► Lock Your Doors First: Prioritizing a Zero Trust Approach Andrew Kay, Regional Sales Engineer, Illumio
|
14:40 - 15:00 SGT |
► Selling Breaches: The Transfer of Network Access on Criminal Forums Paul Prudhomme, Head of Threat Intelligence Advisory, IntSights
|
15:00 - 15:30 SGT |
► Education Seminars 3 Delegates will be able to choose from a range of topics
|
15:30 - 16:00 SGT |
Break and Networking |
16:00 - 16:20 SGT |
►12 Months of 'New Normals': Tips for Post-Pandemic Security COVID 19 changed the way we worked, organised and spent our leisure time. Some of these changes will be permanent, some will not. What unites these changes is that the majority of them have led to greater levels of digital infrastructure in work and everyday life. And as security teams know, this means a wider attack surface and a greater level of risk. What can CISOs do to prevent the next big disruption?
|
16:20 - 16:40 SGT |
► Good Instinct, Plain English: The New Paradigm for the CISO Jane Corr, CISO, Great West Life Europe
|
16:40 - 17:00 SGT |
► Delegates will be able to choose from a range of topics: Cybersecurity and Data Protection in Asia - Legal Update 2021 Bryan Tan, Partner, Pinsent Masons LLP
Or Stories from the Front lines: Negotiating with a Ransomware Criminal Moty Cristal, CEO, NEST, and Gal Messinger, Global Head of Security, Signify
|
17:00 - 17:30 SGT |
Closing Remarks and Networking Break |
17:30 SGT |
Conference Close |
Education seminars
Warning: Cyber Attacks Ahead, What's Your Cybersecurity Strategy?
Harish Sekar, Senior Technical Evangelist, ManageEngine
The job of IT admins and IT security analysts are, some of the most important jobs in any company. They are expected to know everything; get little praise when things run well and are first in the firing line when things go wrong. Most of them are self-taught and have learned on-the-job. Experience has battle-hardened them but the pressure to ensure the security of a rapidly evolving IT and OT infrastructure remains high. In this session you will learn tips and tricks on how to bolster your cybersecurity and how to enable virtual cameras through effective log management techniques
- Understanding the attack surface – how ML and AI can detect internal and external attacks
- How to secure your infrastructure and the need for SOAR
- Importance of data security and the need for DLP
Preventing the Next SolarWinds Breach: What *You*Need to Know About SASE
Jonathan Andresen, Senior Director, Marketing & Products, Asia Pacific & Japan, Bitglass
Cyberattacks such as the recent SolarWinds breach demonstrate how cybercrime is shifting focus to cloud services. At the same time, Gartner predicts that almost half of companies will shift their cloud and network security to a SASE architecture (Secure Access Service Edge) in the next few years. But is this the right approach? How does it improve privacy, compliance and data protection?
While there is no single industry standard view on SASE or how to protect sensitive data, there are foundational elements that every security leader should consider when planning for 2H 2021 and beyond.
Join this exclusive talk to learn how you can get started with SASE, including:
- The three major pillars of SASE architecture and why they matter
- The economics of data breaches vs. SASE
- Common SASE industry use cases
- Practical advice for implementing SASE in your organization.
Threat intelligence without context is just noise
Vicente Diaz, Threat Intelligence Strategist, Google Cloud Security
Threat intelligence is widely adopted as part of any security strategy. Unfortunately, many times it does not provide the expected results. Join this session to learn from VirusTotal experts about common use cases, mistakes to avoid, and important factors to consider when building out your threat intelligence capabilities.
- Alert prioritization and addressing alert fatigue
- Incident response and forensic analysis
- APT investigation and research
Supercharge your security telemetry with Chronicle
Alvin Lung, Customer Engineer, Google Cloud Security
Organizations are rapidly shifting their business models and corresponding technology environments to quickly respond to this new digital transformation era. Some of these challenges include data collection, analysis, and decisioning, all while the attack surface continues to grow. With an expanding attack surface, a shortage of security talent, and an overwhelming amount of alerts, security teams need tools and strategies to modernize their SOC. Chronicle helps make enterprise security data - like EDR, firewall, VPN, DNS, and web proxy telemetry - useful right away for threat detection, response, and hunting. Join this session to learn about the unique components of the Chronicle security analytics platform that enable security teams to supercharge their security telemetry.
- Retain all your security telemetry at Google scale, and interrogate it at Google speed.
- Enhance your detection & response techniques with global visibility and automated best in class ML/AI.
- Quickly adapt to major emerging threats
File Upload Security
Raymond Lim, Regional Manager, ASEAN & South Asia, OPSWAT & Laxman Gite, VP Solutions, Altisec India
File uploads are essential for the effective functioning of an organization and are needed for collaboration between an organization’s workforce and for user productivity. They are a critical ingredient of most web applications and services. However, they represent a significant security risk since cybercriminals can compromise your servers or your entire system by uploading malicious files.
In this session, you will learn about the different technologies you can deploy to secure your organizations resources from such malicious file uploads.
- Deep CDR
- Multiscanning
- Proactive DLP
Unified Policy Management Playbook - Story of Visibility, Automation & Integration
Shikwang Jang, Regional Director, Firemon
Due to increased and consistent technological development, the 'Complexity Gap' that exists in network security continues to expand with no end in sight. Join Firemon for this technical education session, in which the key problems related to managing your security policies will be explored:
- The costliest threat to IT and business continuity is not 'breach' but 'Approved Changes'
- Visibility gap - you can't protect what you can't EASILY see
- How can 'unified policy management' help close enterprise's process automation circle