-
08:30
Registration and breakfast
-
08:50
Welcoming Remarks from Corinium
Eleen Meleng - Content Director, CISO Malaysia - Corinium
-
08:55
Chair's Opening Remarks
Manmeet Mahinderjit Singh - Associate Professor - Universiti Sains Malaysia
-
09:00
Speed Networking – Making new connections at CISO Malaysia!
During this 10-minute networking session, the aim of the game is to go and meet three people you don't already know. Use the questions on the screen to guide your conversation. Have fun!
-
09:05
Opening Keynote
Building Digital Trust in the Era of Quantum Computing and AI: Navigating the New Cyber RisksSuresh Sankaran Srinivasan - Group Head – Cyber Security & Privacy - Axiata
- Explore the imminent impact of quantum computing on current cryptographic standards and data protection practices
- Discuss how organizations can prepare for quantum-resilient encryption and the emerging risks quantum computing poses to sensitive data
- Examine how the rapid deployment of 5G and the growing adoption of AI are transforming both the speed and complexity of cyber threats
-
09:30
Topic TBC
Stephen (max) Gillies - Technology Evangelist - Fastly
-
09:55
CISO Panel
Navigating the Cyberstorm: Strategies for CISOs to Overcome Key Challenges in 2025- Adapting to evolving threat landscape – exploring different strategies and risk assessment framework for CISO
- Building a strong cybersecurity culture within an organisation by engaging employees through training and open communication
- Aligning cybersecurity initiatives with broader business objectives – risk management, budget, and cross-department collaboration
Moderator
- Datuk Alan See Co-Founder & CEO Firmus
Panellists
- Amir Abdul Samad Head, Cyber Security (CISO) PETRONAS
- Wan Roshaimi Wan Abdullah CTO CyberSecurity Malaysia
- Chee Lung Yuen CISO Technology Risk Management & BCM, AIA
- Thomas Lim Group CISO Affin Bank
- Ashish Vohra ED, Head - Information Security Risk Officer, SC Ventures Standard Chartered Bank
- Shah Mijanur Rahman Head of Security Inmagine Group
-
10:25
The Power of Certainty
Nick Lim - APAC Vice President - Tanium
-
10:50
Coffee and connect
-
11:20
Panel discussion
Building a Secure-by-Design Architecture: Integrating Security from the Ground Up- Understanding how integrating security from the start can reduce risks, improve resilience, and save costs
- Tailoring security architectures to fit the unique needs of the business, industry, and risk profile
- Addressing the challenges to implement secure-by-design architecture – investment justification, organizational silos, and aligning security
Panellists
- Norsyahrim Abdul Tahar Head of Enterprise Architecture & Governance Alliance Bank
- Yusfarizal Yusoff Head of Security Architecture PETRONAS Digital
- Thayaalakumar Pakerysamy Associate Director, Digital Security - IAM Systems AIA Digital+
- Mohammed Hashim Security Architect Cloud Security Alliance Malaysia Chapter
- Prasad Jayabalan Head of Cybersecurity Strategy & Architecture Axiata
- Brian Chang Solutions Architect and Advisory Fortinet Malaysia
-
11:50
Leveraging AI-Driven Identity Security: Enhancing Cyber Resilience in the Digital Era
Vijay Chaudhari - Team Lead, Solutions Engineering - Saviynt
- Introduction to AI in Identity Security: Discuss the integration of artificial intelligence and machine learning in identity governance and administration, highlighting how these technologies enhance threat detection and response.
- Overview of Saviynt's Intelligence Suite: Present Saviynt's latest AI-powered Intelligence Suite, emphasizing its capabilities in providing intelligent recommendations and analytics for identity security.
- Addressing Third-Party Access with a Converged Identity Platform: Explore how Saviynt's converged identity platform secures third-party access, mitigating risks associated with external users, contractors, and partners. Highlight features that streamline provisioning, enforce least-privilege access, and monitor third-party activities in real time.
- Case Studies and Real-World Applications: Share success stories and practical examples of organizations that have implemented AI-driven identity security solutions to strengthen their cyber resilience.
- Future Trends in Identity Security: Explore the evolving landscape of identity security, including the management of machine identities and the challenges posed by emerging technologies.
-
12:15
Security in the Age of AI
Shah Mijanur Rahman - Head of Security - Inmagine Group
- Discover how AI is reshaping the security landscape, introducing both innovation and new vulnerabilities.
- Learn strategies to secure your AI implementations while navigating emerging governance and compliance requirements.
- Explore how AI-driven tools can enhance threat detection, automate response and strengthen security teams against evolving cyber threats.
-
12:40
Topic TBC
- Senior representative - Cloudflare
-
13:05
Lunch and networking
-
Track A: AI in Cyber
-
14:05
AI-Driven Cybersecurity: Enhancing Application Defence and Securing the Future
Shahnawaz Backer - Director Solutions Engineering, Asia Pacific, China & Japan - F5
Applications have become the central hub for both professional and personal interactions, but this increased reliance on technology brings significant security challenges. The ever-expanding application attack surface, coupled with the massive amounts of data generated during user interactions, creates a complex landscape for cybersecurity. Key challenges include:
- Limited skillsets to effectively manage and analyze vast volumes of data
- Sophisticated application attacks that leave less time for response
- Rapid technological adoption, which often results in security blind spots
In this session, we will explore how AI can be harnessed to enhance application security and tackle these challenges head-on. We’ll cover:
- AI in Application Security: How AI can bolster security by preventing attacks, automating incident response, and providing real-time insights to improve threat detection and mitigation.
- Security of AI: Addressing the unique risks of AI systems themselves, including protecting the integrity and confidentiality of AI models and preventing manipulation or tampering.
- Security Against AI: Leveraging AI-powered tools to detect and prevent cyberattacks, and utilizing AI-driven threat intelligence to stay ahead of emerging threats.
By integrating AI into both application security and threat response strategies, we can create a more resilient and efficient security environment, safeguarding individuals and organizations alike from evolving cyber risks.
Join us to learn how AI is not just a tool for defense, but a game changer in the ongoing battle against cyber threats.
-
14:30
Fireside Chat
Governance and AI in Malaysia: Navigating the Intersection of Innovation and Regulation- Integratingf ESG Principles into Cybersecurity Strategy – exploring the evolving landscape ESG principles intersect with cybersecurity risk management
- Discussing how organizations can integrate ESG considerations into their cybersecurity strategies, aligning security practices with broader corporate responsibility
- Exploring the potential benefits, such as enhanced brand reputation and stakeholder trust, and examining the challenges and opportunities in this integration
Speakers:
- Jeya Ganesh VP, Information Technology Taylor’s Schools
- Anthony Jonathan Luistro Head of Cyber Security Malaysia Aviation Group
-
14:55
Strengthening Authentication and Safeguarding Access in the Age of Advanced Threats
- Senior representative - Proofpoint
- Exploring how AI is being used to enhance authentication processes – MFA systems, biometric, and continuous authentication methods
- Understanding the critical role AI plays in monitoring and analysing user behaviour to detect anomalies
- Addressing the growing threat of AI-driven attacks on IAM systems, including the potential for AI to exploit biometric vulnerabilities or manipulate identity verification processes
-
15:20
AI-Driven Cybersecurity: Strengthening Defenses Against Evolving Threats
Haris Tahir - Head of Threat and Vulnerability Management - Maybank
- Integrating security early in the development process enhances agility without compromising on data protection
- Examining the vulnerabilities AI applications may introduce and explore strategies to embed security measures throughout the AI development lifecycle
- Optimising value stream management for end-to-end AI development process while aligning development and security
Speakers:
- Gaurav Sharma, Group CIO, MMC Ports
- Thavaselvi Munusamy, Director – GRC (IT/OT), ITT
- Soumo Mukherjee, Head of Cybersecurity, PRefChem
-
15:45
Mitigating Risk to the #1 Target for Attackers: Your Enterprise Identity System
- Senior representatives - Semperis
The foundational component of a modern security architecture is a secure identity system. And though most organizations are thinking "cloud first", identity doesn't start in the cloud - it starts on premises. And overwhelmingly that on-premises identity system is Microsoft’s Active Directory (AD).
AD is involved in more than 90% of all cyberattacks today because when it's compromised it gives attackers near-total control over your IT systems. And once crippled by a cyberattack, it requires an average of two weeks to rebuild and regain trust manually - while your business is down.
In this session, Karthik and Santhosh will review:
- Why AD is such a target
- How you can increase operational resilience of this mission-critical identity system by mitigating attacks against your AD
- Significantly reducing its recovery time objective (RTO)
-
Track B: Security Architecture
-
14:05
Fortifying Against the Rising Tide: Leveraging MDR to Combat the Evolving Ransomware Threat
Kevin Goh - Senior Sales Engineer - Sophos
Ransomware remains a severe cyberthreat with significant impacts. The average cost to remediate an attack surged to $2.73 million — a 50% increase from the previous year.
Prolonged recovery times highlight the need for comprehensive response strategies. Sophisticated attacks strain security teams, with 95% reporting challenges in essential operations. These findings stress the importance of reinforcing ransomware defenses and recovery plans.
Robust endpoint protection is key. Sophos Managed Detection and Response (MDR) offers 24/7 support to strengthen security. Enhanced defenses help reduce costs, minimize recovery time, and support business continuity against this formidable threat.
-
14:30
Your Guide to Responding to Cyber Incident
Nantha Kumar Krishnan - Head of Information Technology Operation – APMEA - Kerry
- Exploring some of the security tools to mitigate the risk in digitalisation
- Understanding how technology can create security loophole
- Addressing some of the challenges in implementing preventative care and putting in place a business continuity plan
-
14:55
Strengthening Authentication and Safeguarding Access in the Age of Advanced Threats
Sandeep Yadav - Technical Solutions Architect – Cybersecurity - Cisco System
- Emphasising the value of leveraging threat intelligence to proactively identify and mitigate potential incidents.
- Collecting, analysing, and applying threat data to enhance an organisation's security posture and incident response capabilities.
- Showcasing real-world examples of how threat intelligence has helped organisations detect and respond to threats more effectively
-
15:20
Fireside Chat
Fortifying Against the Inevitable Cyberwar- Exploring the factors that make cyberwar seemingly inevitable and discussing the urgency for robust defence mechanism
- Drawing parallels between the need for automation in cyber defence today and the significance of the production line
- Reflecting on the historical intertwining of technology, markets, and war, and how this connection persists in 2024
Speakers
- Naveen Chantiran Head of Cyber Security Air Liquide
-
15:45
Breaking Barriers: How Zero Trust and Data-Centric Security Empower Information Sharing
Kunal Jha - Regional Director, Asia - Netskope
In today’s digital landscape, security professionals often face the challenge of balancing robust protection with the need for seamless information sharing. Traditionally, security measures can be perceived as barriers—where the instinct is to clamp down and restrict access. However, with the adoption of Zero Trust and Data-Centric Security, security mechanisms can shift from being obstacles to enablers of secure collaboration and information exchange.
This presentation will highlight how Zero Trust and Data-Centric Security not only enhance security but also support greater information sharing and collaboration amongst teams. Join us as we share examples and demonstrate how organisations can create a secure foundation for information exchange, empowering teams while mitigating risks and ensuring compliance with regulatory standards.
-
16:10
Teh Tarik & Networking
-
16:40
Fortifying Cybersecurity in Government Agencies in the Digital Age
Akmal Nizam Abdul Halim - Director, Head of IT Management Department - Armed Forces Fund Board (LTAT)
- Exploring how we can integrate modern technologies into business
- Planning for security with minimal disruption
- Driving change and building a cybersecurity driven culture cross-department in an organisation
-
17:05
Panel Discussion
What Modern Cybersecurity Strategies Will Help Tackle the New Cyber Battleground?Moderator
- Dr Manmeet Mahinderjit Singh Associate Professor Universiti Sains Malaysia
Panellists
- Sathis Kumar Batumalai Group Head of IT Security RHB Banking Group
- Ruban Bala Head of Infrastructure & Application Security Risk YTL-Sea Digital Bank Project
- Charles Solomon Director of Information Technology & Cybersecurity Senior Aerospace Upeca
-
17:55
Chair's Closing Remarks
-
18:00
Cheers with peers: Mocktails and mingle
Not Found