Building business and operational resilience to cyber threats, compliance and third-party risk

19 - 21 July, 2022 (SGT) | Free Cyber Security Online Event

Day 1: 19th July 2022

9:00 - 9:45 SGT Understanding internal and external threat and establishing an incident management plan for your company

Trisha Ventura - Chief Information Security Officer, Coca-Cola Beverages Philippines

With massive digital acceleration these past couple of years due to remote working, we see more companies being exposed to cyber-attacks especially with risk surpassing cyber security efforts in APAC region in comparison to other regions across the globe. In this session, you will learn how to protect your organisation against the intensifying threat landscape as we move toward an increasingly digital, hybrid workplace and will focus on:  

  • Type and impact of new and emerging internal and external threats you should be aware of  
  • How you can transform your cybersecurity efforts for an evolving threat landscape  
  • Key steps to responding to cyber security threats  
  • Best practices to apply an incident management plan when dealing with threats 
img

Trisha Ventura

Chief Information Security Officer
Coca-Cola Beverages Philippines

10:00 - 10:45 SGT SOC of the future

CK Chim - Field CSO (APJ), Cybereason

Cybersecurity is a top priority for every organization. At least, it should be. The challenge is that the attack surface is expanding, and the threat landscape is adapting so quickly that it is increasingly difficult to keep up with the sheer volume of threats. Cybereason and Google Cloud partnered to deliver the “SOC of the Future” to help companies address these security challenges.  

Join this session to learn to see how the combination of Google Cloud to normalize, index, correlate, and analyze data at scale, with the artificial intelligence and MalOp engine of Cybereason yields a powerful tool for defending against attacks. 



img

CK Chim

Field CSO (APJ)
Cybereason

11:00 - 11:45 SGT Zero Trust: Two Sides of the PAM Coin

Nigel Tan - APAC Director, Systems Engineering, Delinea

There are two sides of the PAM Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches. When considering a mature Privileged Access Management (PAM) solution, and for best practices like Zero Trust and Zero Standing Privileges, you need a vault, and you need privilege elevation. You need both sides of the PAM coin. On the other side of the coin, effective control of administrator activity and access with privilege elevation combined with enforcement of strong authentication and identity assurance with Multi-Factor Authentication (MFA) for all privileged access is equally as critical to achieve Zero Trust goals.

  • Password vaulting is one, privilege elevation is the other. You need both.
  • Hear key considerations for a mature Privileged Access Management (PAM) solution
  • Learn best practices on Zero Trust and Zero Standing Privileges to achieve Zero Trust goals


img

Nigel Tan

APAC Director, Systems Engineering
Delinea

12:00 - 12:45 SGT What an Airport can Teach us about Zero Trust

Scott Hesford - Director of Solutions Engineering, APJ, BeyondTrust

As passengers, every time we travel through an airport we move through checkpoints to confirm our identity and that we are in the correct place. 

There are similarities between an airport and least privilege: the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities. In fact, NIST, the authors of a number of documents on Zero Trust, leverage the airport analogy to describe best practices around Zero Trust and identity. 

So what can we learn from the checks and balances of an airport to apply to our own organisations’ Zero Trust efforts? 

Join Scott Hesford, Solutions Director APJ at BeyondTrust, as he looks at the airport analogy, described by NIST in its Zero Trust documentation, and how modern PAM solutions can support the implementation of Zero Trust. 



img

Scott Hesford

Director of Solutions Engineering, APJ
BeyondTrust

13:00 - 13:45 SGT How can Organisations be prepared for the next Frontline in Cybersecurity – The Cloud Control Plane

Chris Fisher - Director, Security Engineering, Asia Pacific & Japan, Vectra AI

The rapid shift to remote work and ensuing mass-adoption of cloud security technologies have left organizations and security professionals with a lot of questions around how to secure their cloud data and apps according to their needs. With cloud adoption still continuing to accelerate, the evolution of the next generation of modern attacks will now start to traverse through and towards an enterprise’s cloud control plane. Organisations are struggling to protect these environments as the traditional controls simply don’t fit in the cloud world, and most organisation are quickly figuring out as we did on-premise that we can’t prevent all attacks. Join Vectra Ai for this informative session as they will discuss a new approach to cloud security as well steps you can take to secure your control plane.

  • Organisations are faced with new challenges in securing their cloud data and applications with the rapid shift to remote work and adoption of new technologies 
  • Plus with the accelerating adoption of cloud technologies there is a growing evolution of Next Gen modern attacks traversing through & towards an organisation’s control plane 
  • What does an organisation need to do to secure their enterprise’s cloud control plane 

Benefits of attending this session: 

  1. Understand of the key risks / threats organisations face with cloud adoption 
  2. Overview of the changing landscape of modern attacks 
  3. Steps to help an organisation secure their cloud control plane 
  4. What technologies organisations need to adopt to assist with greater security in the cloud / control plane 


img

Chris Fisher

Director, Security Engineering, Asia Pacific & Japan
Vectra AI

14:00 - 14:45 SGT Mitigating and controlling third-party security concerns

Fawad Bayunus - Cluster Head, Information Security Risk Officer, Standard Chartered Bank

Different industries have different domains on how they manage third-party risk, and each industry will normally start with a framework to access the typical risk appetite in an organization. Fawad will give a few examples of different industries and what are the typical risk appetite with vendors exposed to, the level of engagement acquired and how to check security hygiene by leveraging on technologies to monitor and mitigate risk with focus on:  

  • Understanding of how to access reputation, external facing of different organization from a security hygiene point of view  
  • How to perceive and leverage technologies in advance to manage and mitigate risk  
  • How to handle and move forward with a non-compliant single vendor who provides specific solutions that is needed by an organization  
  • Ways to respond when there is a cyber-attack on a third-party vendor/business partner 
img

Fawad Bayunus

Cluster Head, Information Security Risk Officer
Standard Chartered Bank