Building business and operational resilience to cyber threats, compliance and third-party risk

19 - 21 July, 2022 (SGT) | Free Cyber Security Online Event

Day 3: 21st July 2022

9:00 - 9:45 SGT SecDevOps vs DevSecOps: Does it matter?

Suresh Sankaran Srinivasan - Group Head of Cyber Defense, Axiata

Migrating to the cloud is easy and that is why organizations chose to move to the cloud regardless of providers. But from a risk practitioner, where will cybersecurity fall amidst your digital technology? This is where the adoption of SecDevOps comes to play – making every decision from a security-first mindset and DevSecOps incorporates security into every step of the development process. This session will address why SecDevOps is a better approach to your security requirements with focus on: 

  • Reducing security vulnerabilities and risk with SecDevOps approach 
  • Bridging security by design and privacy by design – putting in the discipline in application development 
  • Why including everyone in security practices is important in a business environment using education 
  • Importance of Cloud Security Management Posture to monitor cloud infrastructure 
  • Focusing on functions rather than containers for digital transformation – a better approach  
img

Suresh Sankaran Srinivasan

Group Head of Cyber Defense
Axiata

Fortify end-of-life data protection across your entire infrastructure, from your remote worker devices to on-prem and cloud data storage. Find out how automation can foster consistent,  reliable management of sensitive data and enforce data security policies. 

Learn how to ensure data protection at the end of its lifecycle—without resorting to physical destruction or manual data sanitisation. 

You’ll learn:   

  • When to dispose of data—for security and compliance—as well as how to do so while supporting environmental sustainability initiatives 
  • How sensitive data can be protected with remote work scenarios and BYOD practices 
  • Best practices for protecting sensitive data in the cloud and managing legacy systems after data has been migrated  
  • The advantages of secure, software-based data erasure over traditional device and data destruction methods such as degaussing, shredding, and freeware 
  • How automation helps minimize errors to achieve data security compliance 


img

Fredrik Forslund

Vice President, Enterprise & Cloud Erasure Solutions
Blancco

img

Hoi Wai Khin

Director, Business Consulting
RSM

img

Masayuki Morita

Vice President of APAC Sales
Blancco

11:00 - 11:45 SGT Data Protection for the Information Economy: The Data Awareness Challenge

Stephen Cavey - Co-Founder, Co-CEO & Chief Evangelist, Ground Labs

Data protection is increasingly recognised as fundamental to trade, security, and privacy in our modern information economy. Data protection legislation has been passed in almost 80% of countries, all mandating the same universal principles of data protection – of justifiable or legitimate need, of integrity and of security.

Fundamental to meeting any data protection legislation is to know your data: What you have, why you have it, how you got it, what you do with it, and where you keep it. Building data awareness through validated data discovery provides the foundation for an effective data security strategy capable of navigating this global, data-driven landscape.

img

Stephen Cavey

Co-Founder, Co-CEO & Chief Evangelist
Ground Labs

12:00 - 12:45 SGT Defense In Layers - The Human Firewall

Jacqueline Jayne - Security Awareness Advocate, APAC, KnowBe4

90% of ransomware attacks start with an email. Payment redirection fraud starts with email. No matter how much security technology we purchase, we still face a fundamental security problem: people. 

Join us as we explore with Jacqueline Jayne, Security Awareness Advocate for APAC at KnowBe4, the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

We would look at examples of mental manipulation in everyday life: from the tactics used by tricky advertisers to sophisticated social engineering and online scams. And then we'll look at how to ethically use the very same levers to educate your users against those attacks, because people are your last line of defense and first line of attack.



img

Jacqueline Jayne

Security Awareness Advocate, APAC
KnowBe4

13:00 - 13:45 SGT CISO journey to adopting cloud services with local regulatory framework and compliance in mind

Marlon Sorongon - Chief Information Security Officer, Maybank Philippines and Maybank New York

Join this exclusive fireside chat with Marlon to address:

  • What are the key challenges of CISO nowadays?
  • What are the benefits of Security Risk Assessment?
  • Steps to strengthen security posture
  • Is Zero Trust a framework or a compliance matter?
img

Marlon Sorongon

Chief Information Security Officer
Maybank Philippines and Maybank New York