Highlight Topics
- Enhancing Your Security Posture
- Third Party Risk Management
- Cyber Governance
- 5G Network Security and Business Opportunities
- Zero Trust
Cybersecurity leaders say Southeast Asia has become a hotbed for cybercrime activities.
In 2022, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. The region must take a collaborative defense approach to respond to this new threat environment. The challenge for enterprises has been to ascertain how much risk they are willing to accept to accomplish their mission.
In the hybrid and interconnected world, the noticeable change has been changing consumption patterns of security technologies, which require new ways to deploy frameworks. The enterprise’s success will depend on its endurance to balance offense and defense to mitigate these threats using the right tools, technologies, and best practices. To gain insights into how to establish a secure ecosystem in this dynamic world, attend ISMG’s cybersecurity summit and explore diverse cybersecurity trends from ransomware to supply chain attacks, infrastructure security to automotive cybersecurity, endpoint security featuring AI, connected devices’ challenges, critical infrastructure vulnerabilities, ICS risk, crypto challenges, extended detection and response, cyber insurance, and more.
You can also earn your CPE credits by attending the summit. ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Singapore
As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps? Can you deploy suitable asset inventory methods and map the IT/OT risks?
This session will cover:
The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats?
The session will cover:
The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the “cloud-first” strategy to optimize the IT spend and secure their hybrid work environment. However, the major challenge is to tackle the risk associated with moving legacy applications to the cloud and find ways to build a risk management program to protect these applications.
The session will cover:
It’s called “Responsible Defense,” and Katie Jenkins, EVP and CISO of Liberty Mutual Insurance, addresses it in this exclusive keynote. Beyond this cultural shift, she discusses:
In a cloud account compromise, attackers gain control over the legitimate user’s cloud-based email or collaboration service account that gives access to the data and contacts. They can persuade users and business partners to wire money or damage an organization’s reputation. As more business assets move to cloud, attackers follow close behind.
The session will cover:
As organizations undergo more digital transformation, there is a greater focus on digitalizing processes and improving customer experiences. Consequently, the roles of CIOs and CISOs are evolving to new archetypes such as business enabler, digital enabler and value enabler.
Partnerships with the CIO and other business heads are imperative to drive business goals. The CIO and CISO are now partners in a mission to drive business enablement and to defend the organization from threats.
In this fireside chat, the participants will discuss:
Different industries are struggling to implement the various technologies under zero trust. Microsegmentation and access management are not easy to deploy. What works for one industry might not work for another as zero trust is not a monolithic approach. For many, zero trust architecture has become complex. Given this, are CISOs just tipping their toes? How must they get more granular in their approach?
This session will cover:
Besides, CISOs are compelled to force relationships with business functions and become evangelists for cybersecurity within the organization to gain the board’s attention. CISOs must adorn multiple hats of a leader, defender and offender during a cyber war to be resilient enough to stay on top of emerging threats and rebalance their skills to meet the changing demand.
The panel will discuss:
By neglecting to prioritize comprehensive cybersecurity strategies, businesses expose themselves to increased risk and hinder their ability to successfully implement other technology projects. It is essential that executive leadership takes an active role in championing proper cybersecurity investments and ensuring they are a top priority in order to secure the business and maximize the potential of technology projects.
In this session we will explore:
Cyber insurance, when properly deployed, can help avoid and respond to incidents, as well as reduce the financial impact of such incidents. This session reviews hot topics in cyber insurance, and provides a road map to maximizing your insurance recovery in the event of a loss.
Key learning objectives:
Companies are trying to optimize their infrastructure to address the increased complexity, scalability and security issues, and cloud seems to be the most viable answer. Beyond just the recognized advantages of cloud, the coming years will see how capabilities are built to enable seamless collaboration, harnessing strength of the hybrid cloud and practical applications for the IoT, AI and blockchain.
The session will cover:
It’s called “Responsible Defense,” and Katie Jenkins, EVP and CISO of Liberty Mutual Insurance, addresses it in this exclusive keynote. Beyond this cultural shift, she discusses:
With the normalization of remote work, companies are now tasked to support and provide critical services to their off-site workforce. While it gives a great deal of flexibility, it also widens the threat surface and enables cyberattackers to exploit systems.
A survey suggests that 27% of organizations have experienced a security incident in their public cloud infrastructure within the last 12 months. Regulators are seeking to tighten the rules around data sovereignty and localization, thus posing challenges for many industries to move to the cloud. While cloud adoption is on the rise, it is not free from multiple challenges. How are CXOs dealing with those?
The session will cover:
The economic and financial models are grounded in decades of traditional IT practices that are based on “owning” IT instead of “consuming” it.
As a consequence, companies are developing business cases, negotiating contracts and making economic calculations that don’t take into account the different financial approaches and models that are specific to cloud. Not only is this resulting in value derived from the cloud falling short of expectations, but it is also, in some cases, threatening cloud programs, with some businesses even considering reversing course.
The session will cover:
#ISMGSummit
@ISMG_News
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
RSVP here to attend our events. You can select for multiple or individual tickets.
Upcoming ISMG Events
Upcoming ISMG Events