Building business and operational resilience to cyber threats, compliance and third-party risk

19 - 21 July, 2022 (SGT) | Free Cyber Security Online Event

"Building business and operational resilience to cyber threats, compliance and third-party risk"

Remote working has acted as a catalyst to the huge digital acceleration and the increased cyber-attacks. With the risk of attack exceeding the security efforts in the APAC region compared to other countries, studies suggest that 70% of organizations in APAC lack a solid understanding of their cyber posture. The stark realization is that one fifth of organizations across the APAC were hit by at least seven cyber-attacks in the past 12 months. 

The Cyber Security Digital Summit APAC aims to address ways to build cyber resilience as well as best practices to overcome cyber threats on cloud, on prem, third-party, as well as being compliant with regional and international regulations and will focus on: 

  • Compliance frameworks: Choosing the right cybersecurity compliance framework that works for your organization 
  • Third-party risk: Mitigating and controlling third-party security concerns   
  • Cloud native: Effectively building security functions from the ground up for a cloud native business 
  • Cloud security: Best practices to have better control on the cloud 
  • Network security: Balancing a seamless user experience with IAM, SASE and access governance 
  • Zero-trust: Locking access down and increasing work productivity with a Zero Trust mind-set 
  • AI & machine learning: Boosting cybersecurity with automation to reduce risk 
  • Communication and change management: Communication barriers and overcoming information silos between departments 

Confirmed Speakers

Register and Access LIVE Presentations on 19th - 21st July 2022 [SGT]

DAY 1 – 19TH JULY 2022 (SGT)

09:00 – 09:45 AM
Understanding internal and external threat and establishing an incident management plan for your company by Trisha Liu-Ventura Ventura, Chief Information Security Officer at Coca-Cola Beverages Philippines
Register and access live presentation here
 
10:00 – 10:45 AM
SOC of the future by CK CHIM, Field CSO (APJ) at Cybereason
Register and access live presentation here
 
11:00 – 11:45 AM
Zero Trust: Two Sides of the PAM Coin by Nigel Tan, APAC Director, Systems Engineering at Delinea
Register and access live presentation here
 
12:00 – 12:45 PM 
What an Airport can Teach us about Zero Trust by Scott Hesford, Director of Solutions Engineering, APJ at BeyondTrust
Register and access live presentation here 
 
13:00 – 13:45 PM 
How can Organisations be prepared for the next Frontline in Cybersecurity – The Cloud Control Plane by Chris Fisher, Director, Security Engineering, Asia Pacific & Japan at Vectra AI
Register and access live presentation here
 
14:00 – 14:45 PM 
Mitigating and controlling third-party security concerns by Fawad Bayunus, Cluster Head, Information Security Risk Officer at Standard Chartered Bank
Register and access live presentation here

DAY 2 – 20TH JULY 2022 (SGT)

09:00 – 09:45 AM 
Leveraging on AI, data analytics and upcoming technologies to manage third-party risk for operational resilience by Mel Migriño, Vice President and Group CISO at Meralco
Register and access live presentation here 

10:00 – 10:45 AM
Is Automation the Answer for Security Operations? by Mickey Perre - Cybersecurity Strategist APAC at Devo
Register and access live presentation here 
 
11:00 – 11:45 AM 
Formulating an endpoint security strategy in the modern threat landscape by Romanus Prabhu Raymond, Global Head Technical Support of Endpoint Management and Security at ManageEngine
Register and access live presentation here

12:00 – 12:45 PM 
Know The Threats by Ken Law Lead, Solution Engineering at SonicWall ASEAN
Register and access live presentation here 

13:00 – 13:45 PM  
Where is the risk in operating our business today? How do we insure the critical applications and the networks that deliver them are properly protected and available? by Mike Geller, Distinguished Cyber Security Architect at Radware
Register and access live presentation here

14:00 – 14:45 PM  
Devising an effective Third-Party Risk Management framework for better controls and compliance by Welcome Chan, Head of Technology Risk Management at ICBC (Asia)
Register and access live presentation here 

DAY 3 – 21ST JULY 2022 (SGT)

09:00 – 09:45 AM 
SecDevOps vs DevSecOps: Does it matter? by Suresh Sankaran Srinivasan, Group Head of Cyber Defence at Axiata  
Register and access live presentation here 
 
10:00 – 10:45 AM
Data Disposal Checklist: How to Mitigate Risk & Protect Data by Fredrik Forslund, Vice President, Enterprise & Cloud Erasure Solutions at Blancco Technology Group, Masayuki Morita, Vice President, APAC at Blancco and Wai Khin HOI, Director, Business Consulting at RSM
Register and access live presentation here
 
11:00 – 11:45 AM 
Data Protection for the Information Economy: The Data Awareness Challenge by Stephen Cavey, Co-Founder, Co-CEO & Chief Evangelist at Ground Labs
Register and access live presentation here
 
12:00 – 12:45 PM 
Defense In Layers - The Human Firewall by Jacqueline Jayne, Security Awareness Advocate, APAC at KnowBe4
Register and access live presentation here
 
13:00 – 13:45 PM  
CISO journey to adopting cloud services with local regulatory framework and compliance in mind by Marlon Sorongon, Chief Information Security Officer at Maybank Philippines and Maybank New York​​​​
Register and access live presentation here

Who should Attend

Government Chiefs/Directors/VP/General Manager/Head/Executives/Leads of:

image

Chief Information Security Officer (CISO) –
Head honcho of cybersecurity

image

Chief Security Officer (CSO) – Head up all physical/info/cyber security.

image

Data Privacy Officer – Ensure legal compliance related to data protection.

image

SVP Governance Compliance & Risk (GRC) Manager – Oversee risk management.

image

SVP Cybersecurity – Cyber Security Executive, Security Executive

image

Information Security Director –  Cyber Security Lead, Director of Information Security, Cybersecurity Director

image

SVP Identity and Cybersecurity Operations

image

SVP Cybersecurity Strategy

What you can expect

image

Step 1: Register
Click on any of the register buttons on this page. Enter your information and secure your place 

image

Step 2: Confirmation email
This will be dispatched upon registration and will contain login information 

image

Step 3: Schedule time
Mark some time in your calendar when you can be free of distractions or watch with colleagues 

image

Step 4: Watch the event
Click the link in the confirmation email and prepare questions for our industry-leading speakers 

Interested In Becoming A Valued Sponsor?

With several sponsorship options available, we’ll work with you to determine the best possible strategy to position you as a thought leader in the cyber security space and assist you in achieving your goals.

image

Thought Leadership

Cyber Security Hub delivers breaking industry news, deep dives, market reports and case studies in addition to webinars, data-based videos, infographics, and Q&A profiles with exclusive insight and knowledge of the industry. Cyber Security Hub's value-rich content serves as a proven catalyst for conversation and change – enabling professionals to connect online and face-to-face through our events.

image

Sponsorship Prospectus

Whether you are embarking on a brand re-launch or planning to increase current visbility, Cyber Security Hub will ensure your brand is put in front of credible, highly relevant, active and qualified industry players in a cost-efficient manner.

For more information on sponsorship opportunities please email Imran.Shafi@iqpc.com