-
08:30
DAY 1 Registration and breakfast
-
08:50
Welcoming Remarks from Corinium
Eleen Meleng - Content Director, CISO Malaysia - Corinium
-
08:55
Chair's Opening Remarks
Manmeet Mahinderjit Singh - Associate Professor - Universiti Sains Malaysia
-
09:00
International Keynote
Navigating Emerging Technologies in CybersecurityDato’ Dr Haji Amirudin Abdul Wahab - CEO - CyberSecurity Malaysia
- Exploring the role of artificial intelligence, quantum computing, and blockchain in shaping the future of cybersecurity
- Understanding their potential benefits and vulnerabilities
- Harnessing these technologies to enhance protection against evolving cyber threats
-
09:25
Active Directory Under Attack: Preventing AD Disasters & Reducing Recovery Time
Ken Low - Regional Director, Asia - Semperis
If Active Directory (AD) had malware placed on the AD (imagine that malware changed every password in AD) there would be no choice but to perform a manual recovery of AD which takes on average two weeks. Remember while AD is down nothing works, no authentication to any server, email, data files, nothing. In this session we will talk about why AD is such a target, how recovery is done today, and how you can mitigate the attempts on your AD before it gets as far as malware on the AD.
-
09:50
Cybersecurity Leaders Panel
Strategic Cybersecurity Governance: How CISOs Navigates the Digital Frontier- Understanding the critical role of strategic cybersecurity governance in our rapidly evolving digital landscape
- Exploring the intricacies of cyber risk management, policy implementation, and board-level decision-making
- Driving impactful cybersecurity governance that reinforces the foundation of your organization's secure digital future
Moderator
- Hakim Razip, CRO, Berjaya Sompo
Panellists
- Aishah Farha Mohd Raih, CISO, Permodalan Nasional Berhad
- Dr Sheila Mahalingam, Researcher, UTEM
- Kenneth Devan, Country Sales Manager - Malaysia, Okta
- Dr Meisam Eslahi, Executive Director – Cybersecurity, EC-Council Global Services
- Ts. Haji Aizuddin Mohd Ghazali, Director, Cyber Security Department, Bank Negara Malaysia
-
10:25
Navigating the Terrain of UNKNOWN in Real-time
Mun How Chin - Sales Director - Tanium
-
10:50
Coffee and connect
-
11:20
Navigating the Future: Cybersecurity Trends in Malaysia and the Role of Network in SASE Transformation
Jeremy Jorrot - SASE Specialist, ASEAN - Cloudflare
- Why organizations in Malaysia need to move beyond legacy security solutions and adopt a future-proof architecture based on SASE to stay ahead of cyber threats.
- Discuss the increasing sophistication of cyberattacks and the need for agile and adaptable security solutions.
- Explain the limitations of on-premises security solutions and the benefits of cloud-based SASE architecture.
- Showcase how Cloudflare's SASE platform can help Malaysian organizations build a secure and scalable security architecture for the future.
- Highlight the future of network security and how SASE is paving the way for new innovations.
-
11:45
Fostering Cybersecurity Culture For Conglomerates
Eddie Hau - CISO - Sunway Group
There are many organisations throughout the world are shifting to the hybrid working model and adopting cloud solutions at a rapid pace. At the same time, the surge of simple and sophisticated cyberattacks which not a surprise cybersecurity have been identified as one of the top priority for businesses to adopt and protect themselves.
While there is clearly a need for cybersecurity strategies, but at the same time it’s important to understand that leaders must proactively invest in fostering a cybersecurity culture across the organisation.
Having a top management leadership that is well prepared, willing to engage their employees is the first step in adopting an effective cybersecurity culture. This is foundational to helping to merge both the concept of security and user behaviour across the businesses.
-
12:10
Connecting the Dots: A Unified Approach to Security Resilience
Sandeep Yadav - Technical Solutions Architect - Cybersecurity - Cisco System
-
12:35
Lunch and networking
-
12:35
PROOFPOINT'S VIP LUNCHEON
By invite onlySpeakers:
- Philip Sow (CISSP), Head of Systems Engineering, Southeast Asia & Korea, Proofpoint
- Evan Dumas, Area Vice President, Southeast Asia & Korea, Proofpoint
-
12:35
TANIUM'S VIP LUNCHEON
By invite onlySpeaker:
Dominic Cheah, Director Technical Solutions Engineering, Tanium
-
Track A: SECURITY IMPERATIVES
-
13:35
Organisation Transformation with a Scalable, Sustainable Secure Framework
Chris Liu - Director of Transformation Architecture, APJ - Zscaler
- Discuss approaches to balance agility with security during periods of significant change
- Building a robust security framework by taking into account the essential components of scalable and sustainable framework
- Exploring real-world examples of organizations that have successfully implemented secure frameworks that can endure the challenges of the rapidly changing digital landscape
-
14:00
Cybersecurity Risk and ESG as an Opportunity to Embrace to A Better Future
Mohd Hanapi Bisri - Head of Group IT - Petra Energy
- Integratingf ESG Principles into Cybersecurity Strategy – exploring the evolving landscape ESG principles intersect with cybersecurity risk management
- Discussing how organizations can integrate ESG considerations into their cybersecurity strategies, aligning security practices with broader corporate responsibility
- Exploring the potential benefits, such as enhanced brand reputation and stakeholder trust, and examining the challenges and opportunities in this integration
-
14:25
Crafting Digital Resilience: Tactical Strategies Against Application and API Threats
Shahnawaz Backer - Senior Solutions Architect, Asia Pacific, China & Japan - F5
In the current landscape of ever-evolving cyber threats, the demand for resilient application security has reached unprecedented levels. Every element of the application puzzle, from code to customer, is susceptible to compromise. Join us in this session as we explore real-world application attacks and unveil how a unified, converged approach to application security elevates situational awareness. Discover how this enhanced awareness on infrastructure and APIs empowers organizations to respond swiftly and effectively to the intricacies of modern and complex threats.
-
14:50
Fireside Chat
Enabling Swiftness with Security: DevSecOps and Value Stream Management in the Age of AI Development- Integrating security early in the development process enhances agility without compromising on data protection
- Examining the vulnerabilities AI applications may introduce and explore strategies to embed security measures throughout the AI development lifecycle
- Optimising value stream management for end-to-end AI development process while aligning development and security
Speakers:
- Gaurav Sharma, Group CIO, MMC Ports
- Thavaselvi Munusamy, Director – GRC (IT/OT), ITT
- Soumo Mukherjee, Head of Cybersecurity, PRefChem
-
15:15
Trust in the Age of Disruption: Innovations in Third-Party Risk Management
Han Yang Lau - Manager, Solutions Architects, APAC - SecurityScorecard
In today’s rapidly evolving business landscape, trust is a precious currency. With increasing reliance on third-party relationships, the management of third-party risks has become paramount. This session will delve into the complex world of “Reviewing Trust” and explore innovative strategies in “Third-Party Risk Management” to help organizations navigate the challenges of an interconnected and dynamic global economy.
-
Track B: NEW DEVELOPMENTS
-
13:35
Challenges for Next-Gen IT Security
Leonard Sim - Head of Sales Engineering, ASEAN - Sophos
-
14:00
Managing Challenges in Achieving Application Security
Ebenezer Godomon - Head, Cyber Security - Sabah State Computer Services Department
- Bridging the gap between intent and actual level of security achieved, and addressing the hurdles
- Exploring methods to establish a culture of continuous security testing, including automated tools and penetration testing, to maintain a resilient application security posture
- Lessons learnt from recent experience
-
14:25
Actionable Zero Trust: from Cyber Conscious to Cyber Resilient
Andrew Kay - Director, Systems Engineering, APJ - Illumio
How cyber leaders are adopting Zero Trust Segmentation as a simple way to not only protect their organisation from immediate and evolving threat, but also to strategically balance business innovation and cyber risk. Rethinking security architectures for modern business platforms - from conscious reaction to resilient anticipation.
-
14:50
Improving Information Risk Management
Remko van Yperen - How To Do Better in Security Risk Management - Coinmerce
- Improving return on investment - making controls more cost-effective
- Measure risk and control effectiveness
- Complexity and security
-
15:15
How to Strengthen Your Organisation's Last Line of Defense: Your Human Firewall
David Bochsler - VP of Sales, APAC - KnowBe4
Social Engineering attacks, in the form of phishing, BEC, and Ransomware attacks are becoming ever more commonplace. The number of cyberattacks that start by manipulating a human into allowing access to protected systems or sensitive information steadily increases.
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. This session will help you better understand how you can keep your users on their toes with security top of mind. It will also include a product demonstration of the innovative Kevin Mitnick Security Awareness Training Platform, which will show how easy it is to train and phish your users:
- Send fully automated simulated phishing attacks, using thousands of customisable templates with unlimited usage.
- Train your users with access to the world's largest library of always-fresh awareness training content.
- AI-driven phishing and training recommendations based on your users' phishing and training history.
- Use assessments to gauge proficiency of your users in security knowledge and security culture attitudes.
- Easy user management using Active Directory or SCIM integration.
-
15:40
Teh Tarik & Networking
-
15:40
ACCENTURE'S HIGH TEA ROUNDTABLE
By invite onlySpeaker:
- Vinod Shankar Easwaramoorthy, Cyber Security Leader, Managing Director for ASEAN, Accenture
-
16:10
Panel Discussion
Empowering Cybersecurity Leadership: Nurturing Skills, Culture, and Resources- Addressing the cybersecurity skills gap and strategies to bridge the shortage of skilled professionals
- cultivating a strong cybersecurity culture and fostering culture where security is ingrained in everyday practices
- Allocating resources for cybersecurity initiatives to ensure robust measures and responses
Moderator
- Sivanathan Subramaniam, GM of Cyber Security & Resilience, CTOS Digital Berhad
Panellists
- Ismamuradi Abdul Kadir, CISO, Bank Muamalat
- Joseph Yong, Head of Technology Information Security Office (Malaysia), OCBC Bank
- Raja Azrina Raja Othman, CISO, Telekom Malaysia
- David Bochsler, VP of Sales, APAC, KnowBe4
-
16:45
The Rising Complexities of Software Supply Chain: A Proactive Approach to Security
Atanu M - Senior Security Consultant - CloudSEK
An overview of the intricate nature of modern software supply chains, demonstrated using real-world case studies
- Business Repercussions: Discussion on potential aftermaths including data exposure, operational disruptions, and reputational loss.
- Preventative Measures: Highlighting proactive measures organisations can take in identifying and countering risks in the digital supply chain.
-
17:10
Panel Discussion
Securing the Digital Future: Navigating Emerging Technologies and Cyber Threats- Exploring how emerging technologies impacts cybersecurity challenges and how to adapt to evolving threats
- Addressing the best practices to manage access, encryption and data protection in the context of digital transformation
- Examining the trade-offs between innovation and risk mitigation, and exploring ways to ensure a resilient digital future
Moderator
- Datuk Alan See, Co-Founder & CEO, Firmus
Panellists
- Azril Rahim, Senior Manager, Cybersecurity, Tenaga Nasional Berhad
- Toh Shang Yee, Head of Information Security (CISO), MCIS Berhad
- Suresh Sankaran Srinivasan, Group Head – Cyber Security & Privacy, Axiata
- Irfan Ismail, CISO, AEON Bank
- Vinod Shankar Easwaramoorthy, Cyber Security Leader, Managing Director for ASEAN, Accenture
-
17:45
Chair's Closing Remarks
Manmeet Mahinderjit Singh - Associate Professor - Universiti Sains Malaysia
-
17:50
Cheers with peers: Mocktails and mingle
Not Found