Cyber Security Digital Summit - APAC 2020

July 14-15 2020

This agenda is a work in progress and will be subject to change:

Cyber Security Digital APAC 2020

Staying Ahead of the Pace of Change in Cyber Security

By design, the CISO role evolves rapidly in accordance to the exponential increase of technology—and its threats. The global pandemic has further necessitating strong cyber security operations during this unprecedented time where habits are changing and new doors to digital vulnerabilities are opening. Even the federal government released an alert regarding cyber security concerns of telecommuting corporations. In parallel, forward-thinking cyber criminals are creating sophisticated ways to breach security, such as leveraging AI and digital assistants. CISOs are tasked with protecting company assets, but it takes the cooperation and adherence of the entire enterprise to keep the frontlines safe. Globally, enterprise cyber security investments are forecasted to hit $133.7 billion by 2022, as reported by Gartner, but that was before the onset of the global pandemic. In order to get the most out of such a large investment, the CISO is tasked with creating, managing, and disseminating a solid cyber security strategy across the enterprise.

Thus, the importance of the CISO role has never been more apparent. Cyber Security Digital APAC examines strategic approaches, new ways of operating, and the hard and soft sills necessary to ensure enterprise adherence.

Key Themes:

  • Developing strong cyber security standards and frameworks
  • How ever-changing regulations affect compliance
  • Security Awareness: Why ransomware, malware, phishing and whaling schemes work and how to prevent them
  • Preparing for the future of cyber security, including new AI threats and regulation & compliance changes
  • How to keep the enterprise secure with an onslaught of remote workers
  • Examining the role the global pandemic plays in enterprise cyber security
  • Exploring the scope of the CISO role as both a technical leader and business leader
What to expect from CS Digital APAC:
  • Access to cutting edge content and world class speakers from the comfort of your desk
  • Podcasts: Downloadable mp3 recordings of all presentations
  • Downloadable slides you can review again and again
  • Opportunity to meet cutting edge technology providers
Who is it for?
  • Cyber Security executives who want to hear from and engage with their peers on similar pain points/challenges faced within the APAC region
  • CS professionals based outside the APAC region who want to learn from APAC market case studies

Who should attend?
  • CISOs
  • CIOs
  • Head and directors of Cyber Security
  • Head and directors of Information Security
  • Head and directors of IT
  • Providers of cyber security solutions, services and software

Day One: July 14
Chairman´s Opening Remarks

09:00 – 09:45am SGT
Novel Coronavirus; Novel Cyber Threats
In December, the video conferencing application Zoom averaged 10 million daily users. In March,
that number increased to 200 million. From email to teleconferencing, technology is the key
component to the success of this work-from-home life that has been thrust upon us by
Coronavirus. While, telecommuting boasts a host of advantages, from increased productivity to
lower overhead, brand new enterprise-wide technologies, of course, pose massive threats to
cyber security.
This session discusses mitigation of the unique opportunities cyber criminals are taking during this
time including:
 The email phishing uptick in accordance to the email usage uptick
 The “Zoom bombing” phenomenon and the role of smart speakers, virtual assistants, and
digital security systems
 Why now is the time to create and/or enforce your CYOD policy

10:15 – 11:00am SGT
Rediscovering the true definition of the CISO role
Comprehensive cyber risk management requires the cooperation and expertise of individuals
beyond the CISO. However, it starts with the CISO, and, for better or worse, the onus falls upon
them. In order to break down silos and the castle-and-moat strategy that no longer works for
cyber security, CISOs must be able to think like a businessperson. Translating security data into
business metrics and creating a cyber security team beyond IT are two topics this discussion will
explore. Also discussed in this session:
 Balancing CISO strengths and weaknesses with “deputy” positions
 The necessity of soft leadership skills in order to communicate the importance of cyber
security adherence across workflow
 Collaborating with HR to create a cohesive cyber security ecosystem

11:30 – 12:15pm SGT
Why Compliance is a Cyber Security Issue
Compliance isn’t a new idea to certain fields: BFSI and life sciences, to name two, for example.
However, under-regulated industry sectors are experiencing a new wave of legal and regulatory
changes. When an enterprise is unprepared for changes in compliance, they open themselves up
to not only legal ramifications, but security ones as well. CISOs have an important role to play in
the execution of regulatory compliance frameworks. This session discusses:
 Current established regulatory compliance frameworks and CISO’s role in them
 Partnering with third parties for compliance assessments
 Why compliance standards are an asset to the cyber security team; not a burden

12:45-1:30 SGT
Looking into the Future: What 5G, AI, and Multi-Cloud, have in store for Cyber Security
According to Gartner, the install base of non-consumer IoT may reach 5.8 billion devices by 2020,
up from 4.8 billion at the end of 2019. While the Fourth Industrial Revolution is here, its wide
adaptation and utilization is still in its infancy. Understanding the assets and liabilities of new
technology readies the security operations center for the new threats this technology holds. In
fact, these same technologies holds the potential to strengthen cyber security. Discussed in this
 Understanding how IoT devices are being exploited and what to do about it

 How to best allocate future cyber security funds and why
 The pros and cons of new 5G standards and how they affect cyber security
 How AI promises to streamline cyber security data and predict attacks
 Ways/means cyber criminals are using AI to commit harm
 Deploying a multi-cloud security solution

Day Two: July 15
Chairman´s Opening Remarks

09:00 – 09:45am SGT
A Collaborative Refresher on How to Prepare for Disaster
Creating best practices and procedures before disaster strikes—from a rogue virus to a hurricane
to a data incident—ensures that the framework for damage mitigation is in place and ready to be
rolled out at a moment’s notice. Emotions run high during high stress times, and this vulnerability
leaves corporations open to schemes and scams that otherwise raise red flags. This discussion
 Creating and “war gaming” a critical communications plan
 Performing a risk assessment before moving to remote workers
 Enacting a plan to smoothly transition back to the status quo

10:15 – 11:00am SGT
The Evolution of Access Management and Why it Matters
There was a day not so long ago where identity and access management (IAM) and privileged
access management (PAM) involved simply locking down and controlling enterprise devices. Now,
with the explosion of CYOD, the cloud, and digital transformations, IAM frameworks look entirely
different. Discussed in this session:
 On-prem, cloud, and hybrid IAM solutions
 Controlling user identity and data access as opposed to applications and devices
 Investing in an IAM strategy that runs efficiently and cost-effectively
 Understanding how to work within GDPR guidelines while creating an IAM framework

11:30 – 12:15pm SGT
Understanding the Risk/Benefit of the Cloud from a Security Perspective
As data and AI’s ability to extract critical insights grows, more and more enterprises are moving
their terabytes off-prem. Solution options seem endless. Decisions must be made on which
vendor to partner with, whether a public or private cloud solution is utilized, and what should to
move to the cloud versus what to keep on-prem. Then, of course, there is the massive
undertaking of keeping that data secure. This presentation answers questions like:
 Is the cloud now more or less secure than on-prem?
 What cloud security strategies should CISOs and enterprises develop?
 What are the key cloud contract realities to consider?
 How can you best map out the rest of your enterprise cloud migration journey?

12:45-1:30 SGT
IoT: A Ticking Timebomb?
Enterprise IoT has been simmering on the back burner since 2016. At that time, the infrastructure
to mainstream IoT devices simply didn’t exist. However, with the expansion of the cloud and
rollout of 5G, change is upon us. Organizations need to address cyber security issues throughout
IoT lifecycles. If the numbers say anything, they’re off to a good start. According to
a  Forbes  roundup of IoT forecasts and market estimates, Gartner has predicted that spending on
IoT Endpoint Security solutions will increase from $240M in 2016 to $631M in 2021. Further
considerations discussed in this panel are:
 Adjusting organizational policies for IoT
 Implementing mitigation practices
 How to protect device, data, and personal security

End of Conference