-
DAY 1 - 19 August
-
08:30
Registration, Coffee & Networking in the Exhibition Area
-
09:00
Welcoming Remarks from Corinium & Chair's Remarks
DR Kawin Boonyapredee - Chief Strategy Officer - Applied Quantum
-
09:10
Speed Networking
-
09:15
Keynote Presentation: Topic to Be Confirmed
Konrads Klints - Chief Information Security Officer - Rajah & Tann LLP
-
09:40
Lead Partner: Guardrails for General Artificial Intelligence (GAI) – Governance, Tools, and Culture
This session will focus on the critical aspects of building and enhancing a modern developer security program. We will discuss the implementation, management, and scaling of security practices tailored to the unique challenges of software development. From integrating security into the DevOps pipeline to fostering a security-first culture, attendees will gain insights into the strategies and tools necessary to protect their applications and infrastructure effectively. As a CISO, navigating the landscape of vulnerabilities can be overwhelming. This session will provide insights into effectively prioritising risks within your organisation. We will discuss methods for assessing vulnerabilities based on their potential impact and likelihood of exploitation, helping you allocate resources where they are most needed. By implementing a risk-based approach to vulnerability management, you can strengthen your organisation's security posture and protect against the most pressing threats.
-
10:05
Anticipating Threats, Elevating Security: Being Smarter in RISKS to Level Up our Defence Game Plan
Bernard Tan - Director of the Cyber Security Group - GovTech
-
10:30
Mid-Morning Coffee & Networking in the Exhibition Area
-
11:00
Topic to Be Confirmed
Senior Representative - - Tanium
-
11:25
Keynote Panel: Ethical Responsibility in AI: A CISO’s Guide to Navigating the Future of Cybersecurity
- Examine the ethical scope of responsibility for CISOs in the implementation of AI-driven cybersecurity solutions – what should CISOs be responsible for?
- Assess the balance between AI innovation and safeguarding privacy, security, and compliance frameworks
- Explore strategies for CISOs to ensure transparency, accountability, and fairness in AI security systems
- Discuss the evolving role of the CISO in addressing AI-related cybersecurity risks and ethical dilemmas
Moderator:
Jason Lau Chief Information Security Officer Crypto.com
Panellists:
Tan Too Ping CISO Changi Airport
Kamran Rafiq Senior Assistant Director, Cyber Security MOH Office for Healthcare Transformation (MOHT)
Aniket Kulkarni Global Group CISO Circles
Leonard Ong Director, Cyber Defense Group & Chief Risk Office Synapxe
-
12:00
Cyber Security Metrics That Matter: Unlocking Value for Senior Management and Boards
- Identify which cyber security metrics offer clear, actionable insights for senior management and boards
- Aligning cyber security performance with business goals and risk appetite
- Highlighting the importance of presenting cyber security data in a way that drives decision-making and strategic direction
-
12:25
Keynote Panel: Cyberstorm Survival – Strategies for Leading Through Rapidly Shifting Digital Battlefields
- Outsmarting Emerging Threats: Implementing cutting-edge strategies and adaptive risk frameworks to stay one step ahead
- Engaging employees through continuous training and fostering a culture of transparent communication
- Syncing cyber security with business growth by aligning risk management with budgets, and cross-department collaboration to drive success without compromising security
Moderator:
Tobias Klingel Director of Information Security Aspire
Panellists:
Thuy Dinh Coordinator, Asia South Pacific Joint Operations Against Cybercrime Interpol
Steven Sim Chair OT-ISAC Executive Committee
Frankie Shuai APAC CISO Financial Services Sector
Ee Lin Lim Director of CISO & Governance Home Team Science and Technology Agency (HTX) -
13:00
The Rising Complexities of Software Supply Chains: A Proactive Approach to Security
- Reviewing how the nature of modern software supply chains have changed, demonstrated using real-world case studies
- Preventative Measures: Highlighting proactive measures organisations can take in identifying and countering risks in the digital supply chain
- Exploring strategies to enhance transparency, accountability, and collaboration across the supply chain to mitigate vulnerabilities and ensure continuity
-
13:25
Buffet Lunch & Networking in the Exhibition Area
-
13:25
By-Invite Private Luncheon - Hosted By Tanium
-
TRACK A: Threat Resilience
-
14:25
Topic to Be Confirmed
Senior Representative - - Illumio
-
14:50
AI, Crypto, and Security: Navigating the Triple Threat to Digital Trust
Pasi Koistinen - Chief Information Security Officer - Coinhako
-
15:15
Topic to Be Confirmed
Senior representative - - One Identity
-
15:40
Unmasking Deception: Safeguarding Against Deepfakes
Edmund Goh - Head, Asia South Pacific Desk - Interpol
- Explore cutting-edge strategies to detect deepfake content and protect communication channels
- Harness multi-factor authentication (MFA), real-time identity verification, and employee training to defend against virtual impersonations
- Assess the role of biometric and behavioural recognition technologies in strengthening remote access security and safeguarding sensitive data
- Update cyber security training programs to foster a culture of scepticism and reduce vulnerability to digital threats
-
16:05
Topic to Be Confirmed
Senior representative - - KnowB4
-
Track B: AI-Driven Defense
-
14:25
Topic to Be Confirmed
Senior representative - - Rapid 7
The Zero Trust model continues to be the critical framework for protecting organizational assets, reducing risks and achieving regulatory compliance. This session will demystify Zero Trust common myths, provide clear, actionable insights and catalysts to get started. We will explore real-world use cases that highlight the tangible benefits and outcomes of adopting a Zero Trust approach and how if not already, it should be at the heart of your governance practices.
-
14:50
Guardians of the Future: Securing AI Amidst a Turbulent Threat Landscape
Veronica Tan - Director, Safer Cyberspace - Cyber Security Agency of Singapore (CSA)
- What are the current challenges around preparing future cybersecurity talent for an ever-changing future?
- Exploring initiatives to close the talent gap: Can AI support the current talent shortage?
- Anticipating the right skills: What skills should a successful future team possess?
-
15:15
Topic to Be Confirmed
Senior representative - - Tenable
-
15:40
Cybercrime 2.0: How AI is Supercharging Attacks on the Dark Web
Balaji Kapsikar - Head of Technology & Cyber Risk - Funding Societies Singapore
-
16:05
Topic to Be Confirmed
Senior representative - - Silverfort
-
16:30
Afternoon Tea & Networking in the Exhibition Area
-
17:00
From Static to Smart: The OT Security Shift with Autonomous Robots
Vijayaraj Suriyakumar - Head of Cybsersecurity & Privacy - Continental Automotive Singapore
-
17:25
Panel: Breaking Silos - Uniting Boards, Leadership, and Departments for a Resilient Cybersecurity Posture
- How can boards and senior leadership effectively align cybersecurity priorities with overall business objectives?
- What are the biggest communication gaps between cybersecurity teams, executives, and boards, and how can they be bridged?
- How can organisations break down departmental silos to create a more integrated approach to cybersecurity risk management?
- What governance frameworks and reporting structures best support collaboration between technical teams and executive decision-makers?
Panellists:
Scott Flower Co-Founder CI-ISAC International
Anil K Appayanna Chief Information Security Officer India International Insurance (III) Singapore
-
17:50
Closing Remarks
-
17:50
Cheers with peers: Drinks Reception & Networking in the Exhibition Area
Not Found
-
Day 2 - 20 August
-
09:00
Chair’s Opening Remarks
Jannem Yong - Head of IT Security - SBI Digital Markets
-
09:10
Keynote Headliner: Three Current Challenges in Cyber Security and the Strategies to Navigate Them - AI, Insider Threat, and Secure by Design
Vannessa Van Beek - Global CISO - Fortescue
- Effectively Integrating AI into the Enterprise
- Navigating governance and transparency in AI adoption
- Managing Insider Threat in a complex environment
- Balancing trust, transparency, and detection without creating fear
- Leveraging cross-functional insights from HR, legal, and cyber teams
- Secure by Design
- Shifting to a security-first culture
- Insights and reflections
-
09:35
Risk Intelligence at Scale: Are You Risk Operations Centre Ready?
- Discover how a Risk Operations Centre (ROC) enhances cyber risk management through real-time monitoring and proactive decision-making
- Unpack key concepts like Value at Risk (VAR) and Enterprise True Risk Management (ETM) to prioritise threats effectively
- Incorporate the “language of risk” in comms for clearer communication of cyber threats to senior leadership and stakeholders
- Gain insights into building or optimising a ROC to align risk management with organisational objectives
-
10:00
Securing Data in the Age of GenAI
Angela Chee - Director - Special Projects AI, Cybersecurity / Data Privacy, Connectivity - A*STAR Institute
-
10:25
Streamlining Access Control for Business Resilience Through Identity Management
- Using identity lifecycle management to reduce human error and enhance compliance with cybersecurity frameworks
- Leveraging identity data to detect, respond to, and mitigate breaches faster in your cyber security processes
- Privileged Access Under Attack: Implementing secure privileged access management (PAM) to protect critical systems from insider threats and advanced persistent threats (APTs)
-
10:50
Mid-Morning Coffee & Networking in the Exhibition Area
-
11:20
Securing and Validating Your Code with Confidential Computing
Yonggil Choi - Technology Evangelist - TikTok
Confidential Computing is an emerging technology to protect sensitive code while it is being processed. Its underlying technology, hardware-based Trusted Execution Environment (TEE), prevents unauthorized access or modification of applications and data while in use regardless of infrastructure access privileges. Additionally, an attestation process can assure that the isolated environment is secure and only the expected application can be executed. As one of the privacy-enhancing technologies, Confidential Computing plays an important role in TikTok's innovation in privacy and security. In this talk, we will give an overview of this technology - its past, present and future. Then, we will introduce our privacy innovation with Confidential Computing and potential use cases for data collaboration, data protection and software transparency.
-
11:45
Responsible Innovation: Navigating Privacy and Cybersecurity in Singapore’s Emerging Tech Ecosystem
- Navigating Singapore’s evolving regulatory landscape, including the Personal Data Protection Act (PDPA), to drive innovation responsibly
- Managing the privacy and cybersecurity implications of AI, IoT, and data-driven technologies amidst increasing cyber risks in a hyperconnected business environment
- Embedding privacy-first principles into digital transformation efforts to meet regulatory requirements and build consumer trust
- Ensuring robust cybersecurity measures in alignment with Singapore’s Cybersecurity Act and sector-specific guidelines, such as for financial services and critical infrastructure
-
12:10
Keynote Headliner: Readying for Next Gen Cyber Threats
Justin Ong - APAC CISO - Panasonic
-
12:35
Keynote Panel: How Can We Transform Cyber Security into a Strategic Business Enabler?
- Explore strategies to integrate cyber security initiatives with broader business goals to strengthen organisational resilience and drive sustainable growth
- Unpack approaches to involve executives in cyber security strategies, ensuring it remains a top priority within the organisation
- Highlight the potential of cyber security as a strategic asset to deliver business value, enhance resilience, and establish a competitive edge
- How can organisations shift from reactive to proactive risk management, anticipating threats and building a robust security posture?
Moderator:
Joey Chua Director of Digital and IT Transformation Gulf Marine
Panellists:
Deepak Anand Maharaj CISO AirAsia
Lyle Sudheeran Madhavan Head, Program Management & Governance Sentosa Development Corp
Jenny Tan President ISACA SG Chapter
Christopher Lek Director, Cyber Security, Centre for IT Services Nanyang Technological University
Laura Lees Head of Cybersecurity for Client Citibank
-
13:10
Buffet Lunch & Networking in the Exhibition Area
-
14:10
Technology Risks: What Else is Out There?
Anthony Lim - Fellow, Cybersecurity, Governance & FinTech - Singapore University of Social Sciences
-
14:35
Overcoming the Roadblocks: What Does Successful Zero Trust Adoption Look Like?
Tan Hwee Cher - Group Head, Information Security & Data Governance - CGS International Securities
-
15:00
Panel Discussion: AI Governance in Cyber Security - Combating Digital Fraud and Protecting the Enterprise
- Discover how AI governance can address vulnerabilities exploited by increasingly sophisticated cyber fraud techniques
- Learn to implement secure, compliant AI systems that enhance fraud detection while safeguarding sensitive data
- Gain insights into balancing innovation and cyber security to build trust and resilience against digital threats
- Dealing with advance phishing and digital scam tactics as a business
Panellists:
Perry Young CISO Kyndryl
Jon Lau Director A*STAR - Agency for Science, Technology and Research
Anil K Appayanna Chief Information Security Officer India International Insurance (III) Singapore
Scott Flower Co-Founder CI-ISAC International -
15:35
Afternoon Tea & Networking in the Exhibition Area
-
16:05
Advancing Cyber Security Maturity with Reduced IT Security Budgets
- Prioritising critical risk areas to effectively allocate security resources
- Implementing automation and AI tools to streamline threat detection and response
- Enhancing collaboration across teams to align security efforts with organisational goals, all aimed at advancing your cyber security maturity despite reduced IT security budgets
-
16:30
Effective Training Strategies for Managing Insider Threats and Supply Chain Risks
- Techniques to influence lasting behavioural change in employees
- How can you effectively measure the success of training programs?
- Planning gamified phishing campaigns and immersive attack simulations for C-suite executives and non-technical teams
- Training approaches fand techniques for managing insider threats and supply chain vulnerabilities
-
16:55
Close of CISO Singapore 2025
Not Found