-
DAY 1 - 20 August
-
08:30
Registration, Coffee & Networking in the Exhibition Area
-
09:00
Welcoming Remarks from Corinium & Chair's Remarks
Reuben Athaide - Head Cyber Security Advisory and DevSecOps - Standard Chartered
-
09:10
Speed Networking
-
09:20
Keynote Headliner: Becoming cyber resilience by supporting cybersecurity’s role in creating a securer future (topic to be confirmed)
Charles Nwatu - Head of Enterprise Governance & Assurance - Netflix (USA)
-
09:55
Topic to be confirmed
Senior representative - - Snyk
Senior representative Snyk
-
10:20
Keynote Panel: Key steps of an incoming CISO - What should new CISOs prioritise during the first three months in office?
- What is the first order of business for a new CISO?
- How would you lay out the framework for the first three months?
- What challenges and change will you anticipate and how would you manage the team’s expectations and needs?
Panel:
Baz Bosman Chief Information Security Officer Sephora Asia
Aslyn Koh Director, Technology & Digital Transformation Thomson Medical
Jimmy Hor Head IT Security, NUHS Synapxe
Rajnish Kapur Head of IT Security, Asia ex Japan Nomura
-
10:55
Mid-Morning Coffee & Networking in the Exhibition Area
-
11:10
Topic to be confirmed
Senior representative - - Tanium
-
11:50
Keynote Panel: Non-tech meets tech - Taking the cyber risk seriously across the board
- Aligning the different perspectives between tech and non-tech leaders to establish common goals
- Fostering a growth-focused relationship with the board
- Presentation is key: What makes a good board presentation and how do you drive board-supported cybersecurity initiatives?
Panellists:
Jenny Tan, President, ISACA SG Chapter
David Wang Regional Information Security Lead (ASEAN) NS BlueScope
Justin Ong APAC CISO Panasonic
Yaron Slutzky CISO Agoda
-
12:25
Presentation: Increasing cybersecurity synergy with your third-party partners
- How has third-party risk evolved with the changing landscape and lessons learnt from each new publicly known attack?
- What do the MAS Third Party Risk Management guidelines mean for businesses moving forward?
- How do we work with vendors to ensure everyone is secure and protected?
-
12:50
Buffet Lunch & Networking in the Exhibition Area
-
12:50
By-Invite Private Luncheon
-
TRACK A: Security Programs
-
14:00
Topic to be confirmed
Senior representative - - Axonius
-
14:25
How do you determine what is a successful cybersecurity program?
Bruce Leong - Director, Technology and Strategy - Mt. Alvernia Hospital
- What are the metrics that determine success or failure?
- Plan for success: The critical 5 steps to take
- Beat sophisticated attacks with sophisticated defensive play
-
14:50
Topic to be confirmed soon
Senior representative - - Cloudflare
-
15:15
Cyber hygiene practices that serve conglomerates
Eddie Hau - CISO - Sunway Malaysia
- How cyber hygiene supports our cyber responses to attacks and threats
- How can we improve our security measures as end-users?
- How do you manage cyber hygiene from a conglomerate perspective?
-
15:40
Security program management strategy, risk, and deliverables
- Preparing for continuous change in technology and landscape
- Working with vendor limitations: Early identification of technology limitations
- How quickly your team can adapt and if they are attached to a particular tool?
- Optimising your resources to deliver positive outcomes
-
Track B: New Developments
-
14:00
Topic to be confirmed soon
Senior representative - - Illumio
-
14:40
Factoring in security imperatives around privacy, storage and data sharing
Joyce Chua - First Vice President Data Management Office - UOB
- New end point security risks and priorities – managing even more endpoints than before
- Dealing with a sophisticated threat – where do you start?
- The top 5 end point threats in 2023
-
14:50
Topic to be confirmed
Senior representative - - Tenable
-
15:15
How CISOs can contribute and drive the cybersecurity agenda when managing IAM
Tan Hwee Cher - Group Head, Information Security & Data Governance - CGS-CIMB Securities
- What are the current security challenges of IAM?
- How can the cybersecurity teams contribute to identity and access management?
- Navigate the complexities of IAM with your security processes and protocols
- Restrictions and allowances, where do we draw the line in the name of safety?
-
15:40
Presentation: Expedite cyber maturity with a strong governance foundation
Governance is the foundation of strong and effective cybersecurity strategy. During this session, the speaker will share their experiences embracing governance as an enabler for cyber maturity, and how implementing a structured, risk-based, management system helped optimise the organisation’s cybersecurity programmes.
-
16:05
Afternoon Tea & Networking in the Exhibition Area
-
16:35
Aligning modern technology with security and business objectives
Dr Martin Leo - Chief Risk Officer - National University of Singapore
During this session, we’ll explore how we can integrate modern technologies into business and security planning with minimal disruption. Join our session and get invaluable insights that will help you drive change, and build a cybersecurity driven culture.
-
17:00
Presentation: Communicate the potential damage and articulate the impact of loss and what this means to business
- Business fundamentals: What do you care about as an organisation? What would happen if a security breach meant those assets were no longer available?
- Phrasing this to the board
- Put in place a structure for the senior leadership team
- What are you doing in place in of recovery?
-
17:25
Closing Keynote Panel: What modern cybersecurity strategies will help tackle the new cyber battleground?
- Modern strategies in cybersecurity: How can we manage new threats that are emerging?
- Risk and threat management in 2024, how has this changed and what has stayed the same?
- How can we anticipate changes that 2025 will bring?
Panellists:
Phoram Mehta Senior Director, APAC CISO Paypal
Steven Sim Chair OT-ISAC Executive Committee & CISO role at a large MNC
-
18:00
Closing Remarks
-
18:00
Cheers with peers: Drinks Reception & Networking in the Exhibition Area
Not Found
-
Day 2 - 21 August
-
08:45
Chair’s Opening Remarks
DR Kawin Boonyapredee - Cyber Risk Subcommittee - Singapore FinTech Association
-
09:10
Keynote Presentation: Selecting your guardrails for General Artificial Intelligence (GAI)
Aniket Kulkarni - Global Group CISO - Circles
- How should we approach AI guardrail management within our organisation?
- Compartmentalising AI by risk: Identifying and addressing high risk AI
- Will we see the EU Artificial Intelligence act impact cybersecurity in Singapore and other parts of the world and how will this change materialise?
-
09:35
Presentation: Aligning modern technology with security and business objectives
During this session, we’ll explore how we can integrate modern technologies into business and security planning with minimal disruption. Join our session and get invaluable insights that will help you drive change, and build a cybersecurity driven culture.
-
10:00
Industry perspective on transforming to support AI – a global CIO’s perspective
Damian Leach - Chief Information Officer - Seaco
-
10:25
API adoption from a security lens
- The challenges of API adoption: Will it protect or increase the attack surface?
- Benefits and risks of APIs and how CISOs can facilitate its secure integration into business
- What do you need most from security APIs?
-
10:50
Mid-Morning Coffee & Networking in the Exhibition Area
-
11:20
Designing a robust and future-oriented digital security strategy framework
Veronica Tan - Director, Safer Cyberspace - Cyber Security Agency of Singapore (CSA)
Organisations are accelerating their pace of digital transformation, and this warrants strategic security planning amid the dynamic landscape of cyber threats. Frontier technologies such as AI are also re-shaping digital transformation. This session will discuss the strategies and frameworks for organisations to manage their cybersecurity and AI risks.
-
11:45
Going beyond Gen AI - Strike a safer balance between Applied and Innovative AI
-
12:10
Panel: Offensive versus defensive security with AI - Will embracing AI enhance efficiency?
- Offensive versus defensive approaches to AI: Where should we stand?
- Embracing the power of Gen AI and newer technologies: How much is too much?
- The value-add that AI can bring to information security and where do we look for it?
Panellists:
Christopher Lek Director, Cyber Security, Centre for IT Services Nanyang Technological University
Aaron Engel Chief Information Security Officer ExpressVPN
-
12:45
By-Invite Private Luncheon
-
12:45
Buffet Lunch & Networking in the Exhibition Area
-
13:45
Preparing cyber talent for tomorrow, not today (topic to be confirmed)
Anthony Lim - Fellow, Cybersecurity, Governance & FinTech - Singapore University of Social Sciences
- What are the current challenges around preparing future cybersecurity talent for an ever-changing future?
- Exploring initiatives to close the talent gap: Can AI support the current talent shortage?
- Anticipating the right skills: What skills should a successful future team possess?
-
14:10
Securing online businesses from modern risks and threats
Pasi Koistinen - Chief Information Security Officer - Coinhako
-
14:35
Tabletop Exercises - When planning for failure brings success
** Reserved
-
14:50
Afternoon Tea & Networking in the Exhibition Area
-
15:20
Engaging in cyber psychology to strengthen security
- The impact of technology on human behaviour: What is cyber psychology?
- The learnings cyber psychology can bring to the field of cybersecurity
- How cyber psychology helps CISOs: From understanding the threat landscape created by the hackers to managing your team’s mental health
-
15:45
Closing Keynote Panel: Regional cybersecurity compliance hurdles and how can you overcome cross border limitations?
- An overview of politics and economics impacting international security landscapes
- Challenges with cross border privacy and data protection regulations
- Collaboration and coordination go a long way: Working together to strengthen security posture
Moderator:
Neha Agarwal, Vice-President, IT Audit, Citibank
Panellists:
Nan Maguire, Head of Information Security, Privacy and Resilience APAC, abrdn
-
16:20
Close of CISO Singapore 2024
Not Found