-
DAY 1 - 19 August
-
08:30
Registration, Coffee & Networking in the Exhibition Area
-
09:00
Welcoming Remarks from Corinium & Chair's Remarks
DR Kawin Boonyapredee - Chief Strategy Officer - Applied Quantum
-
09:10
Speed Networking
-
09:15
Keynote Presentation: How to Measurably Fail
Konrads Klints - Chief Information Security Officer - Rajah & Tann LLP
-
09:40
Mastering Minimum Viable Recovery: Ensuring Rapid and Effective Business Continuity
Gareth Russell - Field Chief Technology Officer, Security for Asia Pacific (APAC) - Commvault
-
10:05
Anticipating Threats, Elevating Security: Being Smarter in RISKS to Level Up our Defence Game Plan
Bernard Tan - Director of the Cyber Security Group - GovTech
-
10:30
Mid-Morning Coffee & Networking in the Exhibition Area
-
11:00
The Power of Certainty
Yuri Pinheiro - Director of Partner Solution Architecture - Tanium
-
11:25
Keynote Panel: Ethical Responsibility in AI: A CISO’s Guide to Navigating the Future of Cybersecurity
- Examine the ethical scope of responsibility for CISOs in the implementation of AI-driven cybersecurity solutions – what should CISOs be responsible for?
- Assess the balance between AI innovation and safeguarding privacy, security, and compliance frameworks
- Explore strategies for CISOs to ensure transparency, accountability, and fairness in AI security systems
- Discuss the evolving role of the CISO in addressing AI-related cybersecurity risks and ethical dilemmas
Moderator:
Jason Lau Chief Information Security Officer Crypto.com
Panellists:
Aniket Kulkarni Global Group CISO Circles
Leonard Ong Director, Cyber Defense Group & Chief Risk Office Synapxe
Jennifer Cheng Director of Cybersecurity Strategy, Asia-Pacific and Japan Proofpoint
Prof. Dan Haagman CEO Chaleit & Honorary Professor Murdoch University
-
12:00
High Risk Users and Where to Find Them
Garrett O’Hara - Senior Director of Sales Engineering - Mimecast
Despite advancements in cyber security tools, human error remains the leading cause of breaches, with phishing attacks, insider threats, and credential misuse continuing to dominate the threat landscape. Independent research highlight 68% of cyber incidents stem from human error, reinforcing Mimecast’s human-risk research revealing that almost 10% of employees account for 80% of security incidents.
My session will explore the factors contributing to user vulnerabilities that lead to certain individuals being classed as high-risk.
You will gain insights into measuring user risk effectively and implementing tailored strategies to enhance cyber security across their organisations. My session will also highlight how a personalised and adaptive security approach can provide customised security measures for each user. By focusing on these high-risk individuals, organisations can safeguard their workforce while maintaining operational productivity.
-
12:25
Keynote Panel: Cyberstorm Survival – Strategies for Leading Through Rapidly Shifting Digital Battlefields
- Outsmarting Emerging Threats: Implementing cutting-edge strategies and adaptive risk frameworks to stay one step ahead
- Engaging employees through continuous training and fostering a culture of transparent communication
- Syncing cyber security with business growth by aligning risk management with budgets, and cross-department collaboration to drive success without compromising security
Moderator:
Prof. Dan Haagman CEO Chaleit & Honorary Professor Murdoch University
Panellists:
Thuy Dinh Coordinator, Asia South Pacific Joint Operations Against Cybercrime Interpol
Steven Sim Chair OT-ISAC Committee
Frankie Shuai APAC CISO Financial Services Sector
Garrett O’Hara Senior Director of Sales Engineering Mimecast
Eugene Teo Chief Security Advisor, ASEAN Microsoft
-
13:00
Buffet Lunch & Networking in the Exhibition Area
-
13:00
By-Invite Private Luncheon - Hosted By Tanium
Dominic Cheah - Solutions Engineering Director - Tanium
-
TRACK A: Threat Resilience
-
Chair
DR Kawin Boonyapredee - Chief Strategy Officer - Applied Quantum
-
14:00
From Data Silos to Unified Insight: The Role of AI in Holistic Cyber Exposure Management
Henry Ong - Senior Manager of Security Engineering - Tenable
- The challenge of fragmented security data and siloed tools in large enterprises
- How AI processes, normalises, and contextualises diverse security data
- How AI identifies hidden attack paths and interdependencies across different environments
- The concept of a "single pane of glass" for understanding and managing cyber exposure with deeper monitoring
- How a unified vulnerability management view enables better strategic decision-making and resource allocation
-
14:25
AI, Crypto, and Security: Navigating the Triple Threat to Digital Trust
Pasi Koistinen - Chief Information Security Officer - Coinhako
-
14:50
AI and Human Error: Navigating the Evolving Cyber Security Landscape
David Bochsler - VP APJ - KnowB4
68% of all data breaches are due to human error, and despite significant investments in technical safeguards, phishing and social engineering attacks remain the #1 threat to your organisation.
As cyber criminals harness AI-enabled deepfake technology to craft increasingly convincing social engineering attacks, organisations must adapt their security awareness strategies to counter these sophisticated threats.
In this session we will explore:- How AI is really being used by cyber criminals in today's threat landscape
- Key considerations for detecting and preventing AI-powered attacks
- How to Align user AI risks, threats, and vulnerabilities to an appropriate risk mitigation framework
- Practical strategies to to protect and educate your workforce in the AI era
-
15:15
Evolving Strategies: INTERPOL’s Response to the Changing Cybercrime Threat Landscape
Edmund Goh - Head, Asia South Pacific Desk - Interpol
- Explore cutting-edge strategies to detect deepfake content and protect communication channels
- Harness multi-factor authentication (MFA), real-time identity verification, and employee training to defend against virtual impersonations
- Assess the role of biometric and behavioural recognition technologies in strengthening remote access security and safeguarding sensitive data
- Update cyber security training programs to foster a culture of scepticism and reduce vulnerability to digital threats
-
15:40
From Static to Smart: The OT Security Shift with Autonomous Robots
Vijayaraj Suriyakumar - Head of Cybsersecurity & Privacy - Continental Automotive Singapore
Speakers:
Vijayaraj Suriyakumar Head of Cybsersecurity & Privacy Continental Automotive Singapore
Rahul Singh Global Head of Software, AMR Continental Automotive Singapore
-
16:05
Beyond Humans: Managing Non-Human Identities and Governance
Subhransu Das - Cyber Security Officer, Enterprise Business Group - Starhub
Identity security is crucial for organisations of all sizes. This session will explore the key aspects of managing and securing both human and non-human identities, with insights from One Identity and StarHub. Topics will include security concerns, the importance of identity governance, best practices for managing non-human identities, and strategies for staying compliant. Attendees will gain valuable knowledge on building a secure, efficient identity framework while addressing budget constraints.
Speakers:
Subhransu Das Cyber Security Officer, Enterprise Business Group Starhub
Richard Leong Head of Channel and Alliances APJ One Identity
-
Track B: AI-Driven Defense
-
Chair
Prof. Dan Haagman - - CEO Chaleit & Honorary Professor Murdoch University
-
14:00
Overwhelmed to ‘In Command’: How AI-Driven Defense Empowers Modern SecOps
David Coleman - Director, Sales Engineering - APJ - Rapid7
Security teams are drowning in alerts. Thousands of notifications arrive every day, and buried in that noise are the few that really matter. No human team can keep up. This session explores how AI‑Driven Defense can put security teams back ‘In Command’. We’ll look at how capabilities like automated workflows, natural language investigations, and AI‑powered prioritization cut through the noise and surface the right insights at the right time. Instead of trying to build AI, security leaders can now consume these embedded capabilities to defend at machine speed—moving their teams from constant firefighting to clear, confident control.
-
14:25
Guardians of the Future: Securing AI Amidst a Turbulent Threat Landscape
Veronica Tan - Director, Safer Cyberspace - Cyber Security Agency of Singapore (CSA)
- What are the current challenges around preparing future cybersecurity talent for an ever-changing future?
- Exploring initiatives to close the talent gap: Can AI support the current talent shortage?
- Anticipating the right skills: What skills should a successful future team possess?
-
14:50
Resilience by Design: How Security Graphs Enable Rapid Containment
Ivan Lee - Senior Sales Engineer - Illumio
“Defenders think in lists, attackers think in graphs, and as long as this continues attackers win” - JLambert(Microsoft)
Join us for an insightful look at how AI Powered Security Graphs are revolutionising breach identification, helping reframe detection in a decentralised world, represent a vital component of defenders’ security observability and are transforming breach containment into board-level resilience.
-
15:15
Unleash the Power of Data to Protect Your Clouds
Leong Sheu Hau - FortiCNAPP Lead, APAC - Fortinet
Many organisations leverage on the cloud to gain agility in innovation and managing IT infrastructure/software. The challenge often is ensuring the security guardrails are in place to support the speed of innovation. Fortinet’s thesis is that security, at its heart, is a data problem. By focusing first on what is normal rather than establishing rules, consolidating many bespoke tools to achieve fewer alerts, simplifying management and automating security policies, we look into how a unified platform approach that continuously learn and “polygraph” behaviours in the cloud is easier and a smarter way to scale the operational challenges of protecting your multicloud environments.
-
15:40
Fireside Chat: Strategic Cybersecurity - Turning Risk into a Business Advantage
In this conversational session, the speakers will discuss aligning cyber planning with broader business goals for long-term resilience.
Speakers:
Vannessa Van Beek Global CISO Fortescue
Justin Ong APAC CISO Panasonic
Prof. Dan Haagman CEO Chaleit & Honorary Professor Murdoch University -
16:05
Beauty and the Beast: Unifying Identity Security Across Cloud & Legacy IAM Silos
Abbas Kudrati - Chief Identity Security Advisor – APJ - Silverfort
-
16:35
Afternoon Tea & Networking in the Exhibition Area
-
16:35
By-Invite Private - Exec Connect Cocktail Session – hosted by Commvault
Gareth Russell - Field Chief Technology Officer, Security for Asia Pacific (APAC) - Commvault
-
17:05
Panel: Breaking Silos - Uniting Boards, Leadership, and Departments for a Resilient Cybersecurity Posture
- How can boards and senior leadership effectively align cybersecurity priorities with overall business objectives?
- What are the biggest communication gaps between cybersecurity teams, executives, and boards, and how can they be bridged?
- How can organisations break down departmental silos to create a more integrated approach to cybersecurity risk management?
- What governance frameworks and reporting structures best support collaboration between technical teams and executive decision-makers?
Moderator:
Prof. Dan Haagman CEO Chaleit & Honorary Professor Murdoch University
Panellists:
Scott Flower Co-Founder CI-ISAC International
Anil K Appayanna Chief Information Security Officer India International Insurance (III) Singapore
-
17:30
Closing Remarks
-
17:40
Cheers with peers: Drinks Reception & Networking in the Exhibition Area
Not Found
-
Day 2 - 20 August
-
09:00
Chair’s Opening Remarks
Jannem Yong - Head of IT Security - SBI Digital Markets
-
09:10
Keynote Headliner: Three Current Challenges in Cyber Security — and How to Navigate Them with AI, People Insight, and Secure-by-Design Thinking
Vannessa Van Beek - Global CISO - Fortescue
The cyber threat landscape is evolving at a pace and velocity that challenges security programs. Defenders are grappling with three converging challenges: the rise of insider threats, the integration of AI in both attack and defence, and the urgent need to embed security into technology development.
This session will explore practical strategies to navigate these pressures. We will examine how insider threats require a deeper understanding of your people risk, culture, and behavioural indicators. We will examine how AI can be harnessed inside Security Operations to keep pace with, adversaries. And we will discuss the principles of secure-by-design, aligning builders, developers, and security teams to deliver innovation without creating new vulnerabilities.
-
09:35
Handshakes Study: Operationalising and Democratising Cloud Security Across Your Organisation
Jonathan Ng - Principal Digital Risk and Security Lead - Handshakes
As cloud adoption accelerates, so does the challenge of maintaining unified visibility, compliance, and control across diverse environments. Join Wiz and Jonathan Ng, Principal Digital Risk and Security Lead at Handshakes, as he shares how the team transformed their cloud security posture by gaining full visibility of their multi-cloud environment and democratising security. Whether you're grappling with cloud sprawl or striving for secure-by-design practices, this session will offer practical insights into scaling security without slowing innovation.
Speakers:
Kaiyang Cai Regional Vice President Wiz
Jonathan Ng Principal Digital Risk and Security Lead Handshakes
-
10:00
Keynote Headliner: Readying for Next Gen Cyber Threats
Justin Ong - APAC CISO - Panasonic
-
10:25
Time to Shift to Modern Human-Centric Unified Data Security
Philip Sow - Head of Systems Engineering, Southeast Asia, Korea & India - Proofpoint
Now is the time to shift to modern, human-centric data security. Join the session to learn how adaptive, AI-driven solutions unify content and behavior insights — identifying sensitive data, monitoring risky actions, and dynamically adjusting controls. Gain practical guidance on how to evaluate alternatives, transition from legacy DLP solutions, expand your program without increasing headcount, and communicate the value of your program to management and the board. -
10:50
Mid-Morning Coffee & Networking in the Exhibition Area
-
11:20
Securing and Validating Your Code with Confidential Computing
Yonggil Choi - Technology Evangelist - TikTok
Confidential Computing is an emerging technology to protect sensitive code while it is being processed. Its underlying technology, hardware-based Trusted Execution Environment (TEE), prevents unauthorized access or modification of applications and data while in use regardless of infrastructure access privileges. Additionally, an attestation process can assure that the isolated environment is secure and only the expected application can be executed. As one of the privacy-enhancing technologies, Confidential Computing plays an important role in TikTok's innovation in privacy and security. In this talk, we will give an overview of this technology - its past, present and future. Then, we will introduce our privacy innovation with Confidential Computing and potential use cases for data collaboration, data protection and software transparency.
-
11:45
Managing Data Security and Data Risk in the Age of Generative AI
Tim Stead - Technical Director - Securiti
- Value of Implementing Data Security Posture Management (DSPM) and Data Intelligence Access Governance
- How can DSPM and DIAG help organisations prepare for Generative AI Adoption
Both DSPM and Data Intelligence Access Governance are critical tools for modern organisations aiming to protect sensitive data, ensure compliance, and reduce risk. They address distinct but complementary aspects of data security and governance, helping organisations proactively manage vulnerabilities, minimise attack surfaces, and optimise data usage.
Implementing Data Security Posture Management (DSPM) and Data Intelligence Access Governance (DIAG) can significantly help organisations prepare for the adoption of Generative AI (GenAI) by addressing key challenges related to data security, governance, and compliance.
This session will provide the audience with a high level understanding of why their Cyber, Data Governance and Data Privacy teams will need to collaborate to enable the business in the age of Generative AI.
-
12:10
Fireside Chat: Engaging the Human Firewall: Education, Culture and the Future of Cyber Defence
Ang Leong Boon - Head of IT Security - National University of Singapore
Moderator:
Jannem Yong Head of IT Security SBI Digital Markets
Speakers:
Ang Leong Boon Head of IT Security National University of Singapore -
12:35
Keynote Panel: How Can We Transform Cyber Security into a Strategic Business Enabler?
- Explore strategies to integrate cyber security initiatives with broader business goals to strengthen organisational resilience and drive sustainable growth
- Unpack approaches to involve executives in cyber security strategies, ensuring it remains a top priority within the organisation
- Highlight the potential of cyber security as a strategic asset to deliver business value, enhance resilience, and establish a competitive edge
- How can organisations shift from reactive to proactive risk management, anticipating threats and building a robust security posture?
Moderator:
Joey Chua Director of Digital and IT Transformation Gulf Marine
Panellists:
Lyle Sudheeran Madhavan Head, Program Management & Governance Sentosa Development Corp
Jenny Tan President ISACA SG Chapter
Christopher Lek Director, Cyber Security, Centre for IT Services Nanyang Technological University
Laura Lees Head of Cybersecurity for Client Citibank
-
13:10
Buffet Lunch & Networking in the Exhibition Area
-
13:10
By-Invite Private Luncheon - Hosted By Abnormal
Sebastian Murphy - Regional Director - Abnormal
-
14:10
Technology Risks: What Else is Out There?
Anthony Lim - Fellow, Cybersecurity, Governance & FinTech - Singapore University of Social Sciences
-
14:35
Overcoming the Roadblocks: What Does Successful Zero Trust Adoption Look Like?
Tan Hwee Cher - Group Head, Information Security & Data Governance - CGS International Securities
-
15:00
Panel Discussion: AI Governance in Cyber Security - Combating Digital Fraud and Protecting the Enterprise
- Discover how AI governance can address vulnerabilities exploited by increasingly sophisticated cyber fraud techniques
- Learn to implement secure, compliant AI systems that enhance fraud detection while safeguarding sensitive data
- Gain insights into balancing innovation and cyber security to build trust and resilience against digital threats
- Dealing with advance phishing and digital scam tactics as a business
Moderator:
Patrick Tay Director, Program & Seminar ISACA Singapore
Panellists:
Perry Young CISO Kyndryl
Tan Too Ping CISO Changi Airport
Jon Lau Director A*STAR - Agency for Science, Technology and Research
Anil K Appayanna Chief Information Security Officer India International Insurance (III) Singapore
Scott Flower Co-Founder CI-ISAC International
-
15:35
Cyber Resilience by Design: Evolving from Cyber Security to Cyber Resilience
David Lee - Head of Security, Resilience & Protection - Asia Pacific - Aberdeen
-
16:00
Afternoon Tea & Networking in the Exhibition Area
-
16:30
Close of CISO Singapore 2025
Not Found