Building business and operational resilience to cyber threats, compliance and third-party risk

19 - 21 July, 2022 (SGT) | Free Cyber Security Online Event

Hoi Wai Khin

Director, Business Consulting RSM

Wai Khin specialises in information security and business continuity. He has extensive exposure to the management of risk/audit/security programmes to meet legal, human resources, audit, IT, risk management and information security requirements. This involves constant innovation of ideas to implement value-added security programmes to support the client's organisational objectives and building a robust security framework that goes beyond regulatory compliance.

His global experiences include assisting organisations in audits for IT due diligence, Sarbanes Oxley 404 IT General Computer Control, and IT diagnostics for mergers & acquisitions. Wai Khin has also supported clients in ISO 27001 certification projects, cloud technology, bring your own device (BYOD), as well as compliance with Singapore's Personal Data Protection Act (PDPA) and internal and external IT audit requirements.

Day 3: 21st July 2022

10:00 Data Disposal Checklist: How to Mitigate Risk & Protect Data

Fortify end-of-life data protection across your entire infrastructure, from your remote worker devices to on-prem and cloud data storage. Find out how automation can foster consistent,  reliable management of sensitive data and enforce data security policies. 

Learn how to ensure data protection at the end of its lifecycle—without resorting to physical destruction or manual data sanitisation. 

You’ll learn:   

  • When to dispose of data—for security and compliance—as well as how to do so while supporting environmental sustainability initiatives 
  • How sensitive data can be protected with remote work scenarios and BYOD practices 
  • Best practices for protecting sensitive data in the cloud and managing legacy systems after data has been migrated  
  • The advantages of secure, software-based data erasure over traditional device and data destruction methods such as degaussing, shredding, and freeware 
  • How automation helps minimize errors to achieve data security compliance