Agenda Day 1: 26th October 2021

9:00 am - 9:40 am Revamping Your Defence Model From Reactive to Proactive

Jagathesh Rajavasagam - Regional Risk & Cyber Security Officer, Abbott
  • Learn your ABCs to pinpoint and control risk, and bolster compliance management
  • How to lay the framework for business continuity and technical resilience plans
  • The importance of implementing zero trust network access (ZTNA) architecture to eliminate lateral movement
  • How to move from reactive threat management to proactive threat visibility
img

Jagathesh Rajavasagam

Regional Risk & Cyber Security Officer
Abbott

10:00 am - 10:45 am Go Dox Yourself

Zoe Lindsey - Security Strategist, Duo

News reports on doxxing (the practice of researching private or identifying information about someone online, typically with the intent to publicize it) have increased exponentially over the last several years. While most of these reports focus on exposed individuals involved in high-profile or controversial current events, these same investigative methods are used by bad actors every day when researching targets for tailoring spearphish and other human-based attacks. Since many of the public records and social media resources used for this research fall outside the scope of the workplace, keeping corporate users safe requires arming them with education they can keep using when they leave the office.

This session will:

  • Provide an introduction to doxing
  • Share what tools attackers reach for first
  • Show how researching as an attacker teaches valuable skills to make a harder target.


img

Zoe Lindsey

Security Strategist
Duo

11:00 am - 11:45 am Extended Detection and Response: Its Past, Present, and Future

Eric Sun - XDR Product Director, Cybereason

If you’ve been feeling critical about your company’s ability to identify and defeat modern attackers, you’re not alone. Our world is one where IT infrastructure, attacker trends, and workspace norms continue to shift, so it’s an increasingly difficult challenge to build a resilient infosec program backed by tested best practices.


Security vendors are evolving as well. 2021 comes with huge hype, as well as expectations, around a new technology: Extended Detection and Response (XDR). Well, what is XDR, how is it different, and can it actually stop today’s malicious operations? In this special session, join us to learn about Cybereason’s evolution to XDR: how we got here, where Cybereason is today, and a look towards the future.


  • Refresh on how attack campaigns have changed, and why adversaries have the advantage
  • Learn how attacks can pivot between email, endpoint, and cloud infrastructure
  • Demystify XDR and understand how teams are using XDR in security operations
  • Get a peek into the future of Prevention, Response, and Prediction technology


img

Eric Sun

XDR Product Director
Cybereason

Data is growing exponentially. IDC predicts that by 2025, 85% of the data will be stored in enterprise and/or public cloud storage, and 30% will be ‘real-time, sensorized’ telemetry from endpoint and IoT devices. This presents an enormous challenge for enterprises looking to improve their security posture by leveraging this abundant wealth of data. But we all know that data without context becomes superfluous, and that more data does not equate to “better security”. For data to become “knowledge” it needs to be contextualized and assembled into actionable results. Most cyber security teams in APJ are suffering from “data overload” and “alert fatigue”.


Join this session to watch SentinelOne’s experts discuss key points to consider when big data becomes a big problem:


  • The challenges posed by the rise of Big Data
  • How cyber hackers are exploiting weaknesses posed by legacy SIEM and EDR solutions
  • How data retention is key to effective threat hunting, but it comes at a cost (in most cases)
  • Live Hack – Technical demonstration of how an AI-driven XDR platform can enable effective threat hunting with automated detection and alerting rules triggered on data from real-time and historical EDR.


img

Kelvin Wee

Director for Security Engineering – APJ
SentinelOne

img

Michael Leland

Global Head of Technical Communications
SentinelOne

1:00 pm - 1:45 pm Power What’s Next in Cyber Resilience with Accelerated Cyber GRC

Aravind Varadharajan - SVP and Managing Director – Asia Pacific, MetricStream

Cyber risks and the challenges of ensuring robust cyber health are pressing concerns today due to amplified digital interconnectivity of people, processes, and organizations in the post-pandemic world. Organizations need to switch from the current reactive approach to cybersecurity to a proactive approach to achieving cyber resilience. In addition, with seemingly a multitude of IT and cyber regulatory and industry frameworks out there, organizations must leverage automation to accelerate their Cyber GRC program and streamline compliance, risk identification and mitigation, and security incident response processes.


  • The current state of cybersecurity management programs at organizations and associated challenges
  • How Cyber Risk Quantification can help cybersecurity teams to better communicate cyber risks to the senior management and board
  • The first steps to starting your cyber resilience journey


img

Aravind Varadharajan

SVP and Managing Director – Asia Pacific
MetricStream

  • Identity security: how to re-evaluate your access capabilities for greater business agility
  • Building beyond your familiar network to identify security gaps
  • Harnessing the power of analytics: the known vs the unknown
img

Rajat Maheshwari

Vice President, Digital Identity and Biometrics, Cyber & Intelligence Solution
Mastercard