-
08:30
Registration and breakfast
-
08:50
Welcoming Remarks from Corinium
Eleen Meleng - Content Director, CISO Malaysia - Corinium
-
08:55
Chair's Opening Remarks
Manmeet Mahinderjit Singh - Associate Professor - Universiti Sains Malaysia
-
09:00
Speed Networking – Making new connections at CISO Malaysia!
During this 5-minute networking session, the aim of the game is to go and meet three people you don't already know. Have fun!
-
09:05
Opening Keynote
From Policy to Practice: Making the Cyber Security Act 2024 Work for Your OrganisationDato’ Dr Haji Amirudin Abdul Wahab - CEO - CyberSecurity Malaysia
As Malaysia enters a new era of cyber governance, this session unpacks what the Cyber Security Act 2024 really means for CISOs, especially those responsible for critical infrastructure and high-risk sectors.
- Understanding the evolving role of the CISO under the Act: compliance, accountability, and strategic alignment
- Readiness strategies for NCII sectors: threat modelling, incident reporting, and collaboration with NACSA
- Bridging the gap between regulatory intent and operational execution through governance, tooling, and workforce enablement
-
09:30
AI-Powered Threats & Defences: Navigating the Double-Edged Sword
- Unpacking how attackers are using AI to automate, personalise, and scale cyberattacks—from deepfakes to intelligent phishing
- Exploring defensive applications of AI in threat detection, anomaly analysis, and response orchestration
- Addressing the governance, ethical, and operational risks of embedding AI into your cybersecurity stack
-
09:55
Executive Panel
CISOs at a Crossroads: From Firefighter to Forward Strategist- With the Cyber Security Act 2024 and Malaysia's national push for digital resilience, the CISO role is evolving from technical enforcer to strategic business leader
- Boards and regulators increasingly expect CISOs to articulate risk, trust, and resilience in business terms—beyond compliance
- Balancing real-time threat response with long-term transformation, regulatory alignment, and enterprise value creation
Moderator
Datuk Alan See Co-Founder & CEO Firmus
Panellists
Amir Abdul Samad Head, Cyber Security (CISO) PETRONAS
Suresh Sankaran Srinivasan Group Head – Cyber Security & Privacy Axiata
Nantha Kumar Krishnan Head of Information Technology Operation – APMEA Kerry
Norman Leong Head of Cybersecurity Governance, Risk, and Assurance AirAsia
-
10:25
Attack Surface Management: Keeping Pace with Digital Transformation
- How digital transformation, remote work, and cloud sprawl have redefined the enterprise attack surface
- Tools and tactics for continuous visibility, risk prioritisation, and response at scale
- Why traditional perimeter thinking no longer works—and how leading CISOs are adapting
-
10:50
Coffee & Connect
-
11:20
Technical Panel
Secure by Design: Building Resilient, Digital-Native Security Architectures- Key principles for architecting secure, scalable environments across cloud, hybrid, and edge
- How to embed resilience and agility without compromising speed or user experience
- Real-world approaches to modernising legacy infrastructure while preparing for future threats
Moderator
Abdul Hakim Razip Chief Risk Officer Generali Insurance
Panellists
Naveen Chantiran Head of Cyber Security Air Liquide
Yusfarizal Yusoff Head of Security Architecture PETRONAS Digital
Prasad Jayabalan Head of Cybersecurity Strategy & Architecture Axiata
-
11:50
Securing Active Directory & Critical Infrastructure: Lessons from Ransomware Incidents
- Analysing real-world ransomware attacks that exploited AD and disrupted critical systems
- Implementing foundational controls to detect lateral movement and privilege escalation
- Strengthening recovery, segmentation, and monitoring strategies to harden AD environments
-
12:15
Bridging IT and OT: Securing Critical Infrastructure in a Connected World
Edd Barber - CISO - WEL Networks
- Identifying and managing risks in hybrid IT-OT environments
- Implementing Zero Trust principles in OT networks
- Governance, compliance, and workforce training in OT security
-
12:40
The First 72 Hours – Real-World Crisis Playbooks
- How leading teams coordinate across security, legal, comms, and business during an active breach
- What real-world playbooks reveal about decision-making, escalation, and containment
- Turning crisis into resilience through post-incident learning and tabletop exercises
-
13:05
Lunch & Networking
-
TRACK A: STRATEGY
-
14:05
AI-Powered Cybersecurity as Innovations Enabler
Ebenezer Godomon - Deputy Director II (Cyber Security) - Sabah State Computer Services Department
- Showcasing how AI-driven cybersecurity enhances business resilience, operational efficiency, and customer trust
- Translating AI-powered security insights and threat intelligence into business-relevant outcomes for executive stakeholders
- Aligning AI-led security investments with enterprise-wide digital transformation and innovation strategies
-
14:30
Resilience Planning: From Incident Response to Cyber Insurance
- Showcasing how AI-driven cybersecurity enhances business resilience, operational efficiency, and customer trust
- Translating AI-powered security insights and threat intelligence into business-relevant outcomes for executive stakeholders
- Aligning AI-led security investments with enterprise-wide digital transformation and innovation strategies
-
14:55
Changing the DNA: Leading Culture Shifts in Cybersecurity
Ts. Saiful Bakhtiar Osman - Head of IT - PNB Commercial
- Turning policy into practice through behaviour, incentives, and leadership modelling
- How to embed security ownership across departments, not just in IT
- Lessons from leaders driving organisation-wide change in mindset and accountability
-
15:20
Metrics that Matter: Measuring the Maturity of Your Security Program
- How to measure security program maturity in ways that resonate with executives
- Linking metrics to risk reduction, operational performance, and business outcomes
- Using data to justify investments, guide strategy, and benchmark progress
-
15:45
Fireside Chat
Think Like an Attacker: Building a Proactive Threat Hunting Program- Core capabilities and tools needed to shift from reactive to proactive detection
- How to prioritise hunting targets based on business risk and threat intelligence
- Integrating threat hunting with SOC workflows and incident response
Speakers:
Edd Barber CISO WEL Networks
-
16:10
From Response to Readiness: Maturing Your Incident Response Strategy
- Establishing a proactive incident response culture across functions
- Integrating threat intelligence and automation into the IR lifecycle
- Lessons learned from real-world cyber incident exercises
-
TRACK B: ARCHITECTURE
-
14:05
Cloud & Identity Security: Guardrails for a Decentralised Workforce
Mohammed Hashim - Security Architect - Cloud Security Alliance Malaysia Chapter
- Showcasing how AI-driven cybersecurity enhances business resilience, operational efficiency, and customer trust
- Translating AI-powered security insights and threat intelligence into business-relevant outcomes for executive stakeholders
- Aligning AI-led security investments with enterprise-wide digital transformation and innovation strategies
-
14:30
From Point Tools to Security Platforms
- Showcasing how AI-driven cybersecurity enhances business resilience, operational efficiency, and customer trust
- Translating AI-powered security insights and threat intelligence into business-relevant outcomes for executive stakeholders
- Aligning AI-led security investments with enterprise-wide digital transformation and innovation strategies
-
14:55
Smarter, Faster, Leaner: AI-Powered Threat Detection in the Modern SOC
Thayaalakumar Pakerysamy - Associate Director, Digital Security - IAM Systems - AIA Digital+
- How AI and automation are transforming detection, triage, and response at scale
- Building a modern SOC that balances machine efficiency with human oversight
- Real-world use cases for reducing false positives and accelerating incident response
-
15:20
Convergence of IT, OT & IoT — Securing the Blended Infrastructure
- Understanding unique risks at the intersection of IT, OT, and IoT
- Building unified frameworks for asset discovery, segmentation, and response
- Addressing governance, safety, and uptime in critical infrastructure
-
15:45
Passwordless Authentication: How Far Are We?
- Evaluating current adoption trends and technology maturity
- Understanding usability, privacy, and implementation challenges
- Balancing security needs with user experience across diverse environments
-
16:10
Zero Trust in Action: From Strategy to Real-World Implementation
- How leading organisations are implementing Zero Trust across hybrid and multi-cloud environments
- Breaking down real-world playbooks: identity, segmentation, continuous verification
- Overcoming resistance, complexity, and legacy system limitations on the path to Zero Trust
-
16:35
Teh Tarik & Networking
-
17:05
Closing Panel
Mapping Threats in 2026: From Ransomware to AI-Chaos- Anticipating the next generation of ransomware, APTs, and AI-powered attacks
- Understanding how geopolitical shifts and AI misuse could destabilise security ecosystems
- Rethinking playbooks, tooling, and collaboration for the threat landscape of tomorrow
Panellists
Ebenezer Godomon Deputy Director II (Cyber Security) Sabah State Computer Services Department
Jeya Ganesh CIO Taylor’s Schools
Mohammed Hashim Security Architect Cloud Security Alliance Malaysia Chapter
-
17:35
Chair's Closing Remarks
Manmeet Mahinderjit Singh - Associate Professor - Universiti Sains Malaysia
-
17:40
Cheers with peers: Mocktails and mingle
-
18:30
Close of CISO Malaysia 2026
Not Found