Cybersecurity Summit: Singapore
Virtual Summit October 6 - 7, 2022
Cybersecurity leaders say Southeast Asia has become a hotbed for cybercrime activities. In 2022, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. The region must take a collaborative defense approach to respond to this new threat environment. The challenge for enterprises has been to ascertain how much risk they are willing to accept to accomplish their mission. In the hybrid and interconnected world, the noticeable change has been changing consumption patterns of security technologies, which require new ways to deploy frameworks. The enterprise’s success will depend on its endurance to balance offense and defense to mitigate these threats using the right tools, technologies, and best practices. To gain insights into how to establish a secure ecosystem in this dynamic world, attend ISMG's cybersecurity summit and explore diverse cybersecurity trends from ransomware to supply chain attacks, infrastructure security to automotive cybersecurity, endpoint security featuring AI, connected devices’ challenges, critical infrastructure vulnerabilities, ICS risk, crypto challenges, extended detection and response, cyber insurance, and more. You can also earn your CPE credits by attending the summit. ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Charmaine Valmonte
CISO
Aboitiz Group
Mel Migrino
Group CISO
Manila Electric Company (MERALCO)
Anthony M. Bargar
Chief Information Security Officer (CISO)/ Head of Technology Risk
The Siam Commercial Bank Ltd.
Abid Adam (Conference Co-Chair)
Group Chief Risk and Compliance Officer
Axiata
Leonard Ong
Senior Director | Regional Information Security Officer, Intercontinental & China
GE HealthCare
Mex Martinot (Conference Chair)
VP & Global Head of Growth - Industrial Cybersecurity
Siemens Energy
Abid Adam (Conference Co-Chair)
Group Chief Risk and Compliance Officer
Axiata
Micky Lo
Head of Technology and Cyber Risk
Galaxy Entertainment Group
Leonard Ong
Senior Director | Regional Information Security Officer, Intercontinental & China
GE HealthCare
Ong is senior director, regional security officer, APAC at GE Healthcare. He has more than 20 years of experience in Information, Cyber and Corporate Security gained in telecommunication, enterprise, banking, pharmaceutical and healthcare industries.
Edmund Situmorang
Group CTO
Asian Bulk Logistics, Indonesia
Situmorang is managing director and CTO of TechConnect Academy & PRODIGI (Sinarmas Group). He has worked in the U.S. for 11 years as a programmer and strategist, and enthusiastic about technology especially in the field of artificial intelligence.
Jacqueline Jayne
Security Awareness Advocate
KnowBe4
Mex Martinot (Conference Chair)
VP & Global Head of Growth - Industrial Cybersecurity
Siemens Energy
Joey Fontiveros
Commanding Officer
Cyber Battalion, ASR, Philippine Army
Justin Ong
APAC CISO
Panasonic Asia Pacific Pte. Ltd
Naresh Sharma
Head of IT Risk and Security
Cathay Pacific
Soumo Mukherjee
Head of Cyber Security
PRefChem
Soumo Mukherjee is the Head of Cybersecurity at PRefChem. He has over 20 years of experience with companies like Microsoft & Petronas, where he has worked on multiple fields including Cybersecurity architecture, frameworks, traffic quality & monitoring etc. With a...
Geetha Nandikotkur
Managing Editor & Conference Chair, Asia & Middle East
ISMG
Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs...
Mel Migrino
Group CISO
Manila Electric Company (MERALCO)
Migriño is the vice president and group CISO of Meralco, the largest power distribution conglomerate in the Philippines. She has more than 15 years of combined experience in cyber governance, application and infrastructure security, operational technology security, business continuity, privacy,...
Steven Sim Kok Leong
President
ISACA Singapore
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Charmaine Valmonte
CISO
Aboitiz Group
Heide Young
Founding Partner
Women in Cyber Security Middle East (WiCSME)
Suparna Goswami
Associate Editor
ISMG
Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she...
View Agenda
Opening Remarks: An Insight into the Summit Sessions
Mex Martinot (Conference Chair), VP & Global Head of Growth - Industrial Cybersecurity, Siemens Energy
Geetha Nandikotkur, Managing Editor & Conference Chair, Asia & Middle East, ISMG
Mex  Martinot (Conference Chair)
Geetha Nandikotkur
  • 09:15 AM
  • 09:29 AM
Keynote: Enterprise Security Preparedness in 2022 and Beyond: Tactical and Strategic Lessons for CISOs
Abid Adam (Conference Co-Chair), Group Chief Risk and Compliance Officer, Axiata

One cannot deny Southeast Asia has become a hotbed for cybercrime activities in 2022. Besides, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. Despite substantial annual spending on cybersecurity, breaches are still being reported at a disturbingly high rate.  

Enterprises have been trying to put their best foot forward to mitigate the threats and attacks. In addition, they initiate ransomware planning and response with the adoption of concepts such as ‘zero trust’, layered security approach, and multifactor authentication. While these have helped address a few tactical requirements, CISOs have been grappling with the challenge of taking a long-term strategy to fight threats.  

The keynote session will dive into how enterprises need to bolster their defences in fighting threats in 2022 and beyond and the lessons learned. 

Abid Adam (Conference Co-Chair)
  • 09:30 AM
  • 10:00 AM
Conquering Third-Party Insecurities: Lessons for CISOs
Soumo Mukherjee, Head of Cyber Security, PRefChem

The industry has witnessed the largest breaches and security incidents involving third-party vendors. These include mishaps involving business associates and vulnerabilities and exploits involving third-party software and supply chain partners. Organizations have now started establishing departments focused exclusively on third-party vendor risk management to assess third-party risks and mitigate them. 

The session will cover: 

  • How to eliminate third-party risks by using the right tools 
  • How to evaluate third-party vendors’ security 
  • Streamlining software bills of materials
Soumo Mukherjee
  • 10:00 AM
  • 10:29 AM
Fireside Chat: OT and IT Convergence: Measuring the Security Risks
Mel Migrino, Group CISO, Manila Electric Company (MERALCO)
Mex Martinot (Conference Chair), VP & Global Head of Growth - Industrial Cybersecurity, Siemens Energy

Most OT systems are designed with little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission-critical for enterprise security. 

As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps?  Can you deploy suitable asset inventory methods and map the IT/OT risks? 

This session will cover:  

  • Building complete visibility and monitoring your IT and OT assets with the right access control 
  • Integrating OT threat monitoring into SoC for threat detection
  • .Implementing essential steps to establish OT security
Mel  Migrino
Mex  Martinot (Conference Chair)
  • 10:30 AM
  • 10:50 AM
Never Underestimate the Importance of Communicating Cybersecurity Effectively
Jacqueline Jayne, Security Awareness Advocate, KnowBe4

Every industry has unique jargon and buzzwords, and cybersecurity is no different.  The challenge faced by IT professionals across the globe is how to engage employees effectively in their role in making better online decisions.  Breaking down the technical elements into non-technical elements is not as easy as you think.

There are tried and true methods to communicate cybersecurity effectively in your organisation. This session will demonstrate the positive impact this can have on creating behaviour change and move you towards building a culture of security.

In this session, you will discover:

  • The value of effective communication as it relates to cybersecurity
  • The elephant in the room - human error
  • How people move from learning to behaviour change
  • What doesn't work vs what does work
Jacqueline Jayne
  • 10:50 AM
  • 11:19 AM
Plenary: Role of Zero Trust in Establishing Cyber Resilience: A CISO’s Pragmatic Approach
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity

Where does the journey to “zero trust begin and what are the common entry points for accessing data? Experts agree that zero trust is based on the assume breach premise that treats every asset as breached and all traffic as hostile. 

The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats? 

The session will cover:  

  • How has the approach toward security changed as security perimeters disappear? 
  • How to assess the maturity of the “zero trust” state with a realistic look at security and its dependencies on other functions in securing the future work environment? 
John Kindervag
  • 11:25 AM
  • 11:55 AM
Fireside Chat: Two-Way Street: A Cybersecurity Debate Between CTO and CISO — Where Is the Disagreement?
Edmund Situmorang, Group CTO, Asian Bulk Logistics, Indonesia
Charmaine Valmonte, CISO, Aboitiz Group

The majority of CISOs across regions face the single-most significant challenge of procuring necessary funding to support their cybersecurity programs. Are security leaders creating value for business as part of technology innovation? Are the functions of the CTO and CISO aligned in driving innovation and establishing a cyber-resilient enterprise?   

The session discusses how to align the CTO and CISO to a common goal to facilitate the continued success of their organization. Where is the disconnect?  

Edmund Situmorang
Charmaine Valmonte
  • 11:55 AM
  • 12:16 PM
Panel Discussion: Protecting Your Legacy Applications in Cloud and Building a Risk Management Program
Leonard Ong, Senior Director | Regional Information Security Officer, Intercontinental & China, GE HealthCare
Naresh Sharma, Head of IT Risk and Security, Cathay Pacific

Cloud computing brings a whole new level of autonomy and functionality to an organization, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the “cloud-first” strategy to optimize the IT spend and secure their hybrid work environment. However, the major challenge is to tackle the risk associated with moving legacy applications to the cloud and find ways to build a risk management program to protect these applications. 

The session will cover:  

  • Risks of moving legacy applications to the cloud 
  • Building an effective risk management program 
  • A holistic approach to protect cloud applications 
Leonard  Ong
Naresh  Sharma
  • 12:15 PM
  • 12:51 PM
Women in Cybersecurity: Adorning the Leadership Role
Heide Young, Founding Partner, Women in Cyber Security Middle East (WiCSME)

The ongoing challenges to fill mass cybersecurity job vacancies amid the backdrop of a lack of diversity continues to haunt one of the world’s hottest industries. 

According to analysts, we are witnessing the ratio of women rising in the cybersecurity industry growing by 11% year on year.  

However, the big challenge is how to attract and retain them and bridge the skill gap and empower them. What are the unique challenges women CISOs face in their journey and what takes them to the top to be leaders?   

The session will discuss:  

  • Changing role of women in cybersecurity;  
  • Essential skills that women prefer to build;  
  • Women’s contribution to securing the enterprise – a unique approach  
Heide  Young
  • 12:50 PM
  • 01:10 PM
IoT Security: The Good, the Bad and the Ugly
Justin Ong, APAC CISO, Panasonic Asia Pacific Pte. Ltd

Organizations have been incorporating new tech and smart devices over the years.  These become the weakest link for cybercriminals to get and stay inside an organization. 

You’re securing more endpoints than ever across the most significant attack surface. Enter: IoT devices and the risks they bring. But they also get new business benefits. The threat is real for operators and manufacturers of connected devices. 

The session will discuss:    

  • IoT risks and who is impacted by them   
  • A reality check of security by design in IoT   
  • How do malware developers and hackers plan an attack against IoT devices
Justin Ong
  • 01:10 PM
  • 01:40 PM
Panel: Building a Cyber-Resilient Enterprise: Bringing the C-Suite and Board Along
Micky Lo, Head of Technology and Cyber Risk, Galaxy Entertainment Group
Steven Sim Kok Leong, President, ISACA Singapore
Joey Fontiveros, Commanding Officer, Cyber Battalion, ASR, Philippine Army

Enterprises across the region are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and to support the digital economy.    

Can they align their strategy with business priorities and rise to the expectations? What does digital innovation mean to security, and where is the disconnect? How to address the skill challenge? What needs to change, both tactically and strategically, to build a cyber-resilient organization?  

Micky Lo
Steven Sim  Kok Leong
Joey Fontiveros
  • 01:40 PM
  • 02:16 PM

Cybersecurity leaders say Southeast Asia has become a hotbed for cybercrime activities. In 2022, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. The region must take a collaborative defense approach to respond to this new threat environment. The challenge for enterprises has been to ascertain how much risk they are willing to accept to accomplish their mission. In the hybrid and interconnected world, the noticeable change has been changing consumption patterns of security technologies, which require new ways to deploy frameworks. The enterprise’s success will depend on its endurance to balance offense and defense to mitigate these threats using the right tools, technologies, and best practices. To gain insights into how to establish a secure ecosystem in this dynamic world, attend ISMG's cybersecurity summit and explore diverse cybersecurity trends from ransomware to supply chain attacks, infrastructure security to automotive cybersecurity, endpoint security featuring AI, connected devices’ challenges, critical infrastructure vulnerabilities, ICS risk, crypto challenges, extended detection and response, cyber insurance, and more. You can also earn your CPE credits by attending the summit. ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Charmaine Valmonte
CISO
Aboitiz Group
Mel Migrino
Group CISO
Manila Electric Company (MERALCO)
Anthony M. Bargar
Chief Information Security Officer (CISO)/ Head of Technology Risk
The Siam Commercial Bank Ltd.
Abid Adam (Conference Co-Chair)
Group Chief Risk and Compliance Officer
Axiata
Leonard Ong
Senior Director | Regional Information Security Officer, Intercontinental & China
GE HealthCare
Mex Martinot (Conference Chair)
VP & Global Head of Growth - Industrial Cybersecurity
Siemens Energy

Abid Adam (Conference Co-Chair)
Group Chief Risk and Compliance Officer
Axiata
Micky Lo
Head of Technology and Cyber Risk
Galaxy Entertainment Group
Leonard Ong
Senior Director | Regional Information Security Officer, Intercontinental & China
GE HealthCare
Ong is senior director, regional security officer, APAC at GE Healthcare. He has more than 20 years of experience in Information, Cyber and Corporate Security gained in telecommunication, enterprise, banking, pharmaceutical and healthcare industries.
Edmund Situmorang
Group CTO
Asian Bulk Logistics, Indonesia
Situmorang is managing director and CTO of TechConnect Academy & PRODIGI (Sinarmas Group). He has worked in the U.S. for 11 years as a programmer and strategist, and enthusiastic about technology especially in the field of artificial intelligence.
Jacqueline Jayne
Security Awareness Advocate
KnowBe4
Mex Martinot (Conference Chair)
VP & Global Head of Growth - Industrial Cybersecurity
Siemens Energy
Joey Fontiveros
Commanding Officer
Cyber Battalion, ASR, Philippine Army
Justin Ong
APAC CISO
Panasonic Asia Pacific Pte. Ltd
Naresh Sharma
Head of IT Risk and Security
Cathay Pacific
Soumo Mukherjee
Head of Cyber Security
PRefChem
Soumo Mukherjee is the Head of Cybersecurity at PRefChem. He has over 20 years of experience with companies like Microsoft & Petronas, where he has worked on multiple fields including Cybersecurity architecture, frameworks, traffic quality & monitoring etc. With a...
Geetha Nandikotkur
Managing Editor & Conference Chair, Asia & Middle East
ISMG
Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs...
Mel Migrino
Group CISO
Manila Electric Company (MERALCO)
Migriño is the vice president and group CISO of Meralco, the largest power distribution conglomerate in the Philippines. She has more than 15 years of combined experience in cyber governance, application and infrastructure security, operational technology security, business continuity, privacy,...
Steven Sim Kok Leong
President
ISACA Singapore
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Charmaine Valmonte
CISO
Aboitiz Group
Heide Young
Founding Partner
Women in Cyber Security Middle East (WiCSME)
Suparna Goswami
Associate Editor
ISMG
Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she...

View Agenda
Opening Remarks: An Insight into the Summit Sessions
Mex Martinot (Conference Chair), VP & Global Head of Growth - Industrial Cybersecurity, Siemens Energy
Geetha Nandikotkur, Managing Editor & Conference Chair, Asia & Middle East, ISMG
Mex  Martinot (Conference Chair)
Geetha Nandikotkur
  • 09:15 AM
  • 09:29 AM
Keynote: Enterprise Security Preparedness in 2022 and Beyond: Tactical and Strategic Lessons for CISOs
Abid Adam (Conference Co-Chair), Group Chief Risk and Compliance Officer, Axiata

One cannot deny Southeast Asia has become a hotbed for cybercrime activities in 2022. Besides, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. Despite substantial annual spending on cybersecurity, breaches are still being reported at a disturbingly high rate.  

Enterprises have been trying to put their best foot forward to mitigate the threats and attacks. In addition, they initiate ransomware planning and response with the adoption of concepts such as ‘zero trust’, layered security approach, and multifactor authentication. While these have helped address a few tactical requirements, CISOs have been grappling with the challenge of taking a long-term strategy to fight threats.  

The keynote session will dive into how enterprises need to bolster their defences in fighting threats in 2022 and beyond and the lessons learned. 

Abid Adam (Conference Co-Chair)
  • 09:30 AM
  • 10:00 AM
Conquering Third-Party Insecurities: Lessons for CISOs
Soumo Mukherjee, Head of Cyber Security, PRefChem

The industry has witnessed the largest breaches and security incidents involving third-party vendors. These include mishaps involving business associates and vulnerabilities and exploits involving third-party software and supply chain partners. Organizations have now started establishing departments focused exclusively on third-party vendor risk management to assess third-party risks and mitigate them. 

The session will cover: 

  • How to eliminate third-party risks by using the right tools 
  • How to evaluate third-party vendors’ security 
  • Streamlining software bills of materials
Soumo Mukherjee
  • 10:00 AM
  • 10:29 AM
Fireside Chat: OT and IT Convergence: Measuring the Security Risks
Mel Migrino, Group CISO, Manila Electric Company (MERALCO)
Mex Martinot (Conference Chair), VP & Global Head of Growth - Industrial Cybersecurity, Siemens Energy

Most OT systems are designed with little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission-critical for enterprise security. 

As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps?  Can you deploy suitable asset inventory methods and map the IT/OT risks? 

This session will cover:  

  • Building complete visibility and monitoring your IT and OT assets with the right access control 
  • Integrating OT threat monitoring into SoC for threat detection
  • .Implementing essential steps to establish OT security
Mel  Migrino
Mex  Martinot (Conference Chair)
  • 10:30 AM
  • 10:50 AM
Never Underestimate the Importance of Communicating Cybersecurity Effectively
Jacqueline Jayne, Security Awareness Advocate, KnowBe4

Every industry has unique jargon and buzzwords, and cybersecurity is no different.  The challenge faced by IT professionals across the globe is how to engage employees effectively in their role in making better online decisions.  Breaking down the technical elements into non-technical elements is not as easy as you think.

There are tried and true methods to communicate cybersecurity effectively in your organisation. This session will demonstrate the positive impact this can have on creating behaviour change and move you towards building a culture of security.

In this session, you will discover:

  • The value of effective communication as it relates to cybersecurity
  • The elephant in the room - human error
  • How people move from learning to behaviour change
  • What doesn't work vs what does work
Jacqueline Jayne
  • 10:50 AM
  • 11:19 AM
Plenary: Role of Zero Trust in Establishing Cyber Resilience: A CISO’s Pragmatic Approach
John Kindervag, Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow, ON2IT Cybersecurity

Where does the journey to “zero trust begin and what are the common entry points for accessing data? Experts agree that zero trust is based on the assume breach premise that treats every asset as breached and all traffic as hostile. 

The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats? 

The session will cover:  

  • How has the approach toward security changed as security perimeters disappear? 
  • How to assess the maturity of the “zero trust” state with a realistic look at security and its dependencies on other functions in securing the future work environment? 
John Kindervag
  • 11:25 AM
  • 11:55 AM
Fireside Chat: Two-Way Street: A Cybersecurity Debate Between CTO and CISO — Where Is the Disagreement?
Edmund Situmorang, Group CTO, Asian Bulk Logistics, Indonesia
Charmaine Valmonte, CISO, Aboitiz Group

The majority of CISOs across regions face the single-most significant challenge of procuring necessary funding to support their cybersecurity programs. Are security leaders creating value for business as part of technology innovation? Are the functions of the CTO and CISO aligned in driving innovation and establishing a cyber-resilient enterprise?   

The session discusses how to align the CTO and CISO to a common goal to facilitate the continued success of their organization. Where is the disconnect?  

Edmund Situmorang
Charmaine Valmonte
  • 11:55 AM
  • 12:16 PM
Panel Discussion: Protecting Your Legacy Applications in Cloud and Building a Risk Management Program
Leonard Ong, Senior Director | Regional Information Security Officer, Intercontinental & China, GE HealthCare
Naresh Sharma, Head of IT Risk and Security, Cathay Pacific

Cloud computing brings a whole new level of autonomy and functionality to an organization, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the “cloud-first” strategy to optimize the IT spend and secure their hybrid work environment. However, the major challenge is to tackle the risk associated with moving legacy applications to the cloud and find ways to build a risk management program to protect these applications. 

The session will cover:  

  • Risks of moving legacy applications to the cloud 
  • Building an effective risk management program 
  • A holistic approach to protect cloud applications 
Leonard  Ong
Naresh  Sharma
  • 12:15 PM
  • 12:51 PM
Women in Cybersecurity: Adorning the Leadership Role
Heide Young, Founding Partner, Women in Cyber Security Middle East (WiCSME)

The ongoing challenges to fill mass cybersecurity job vacancies amid the backdrop of a lack of diversity continues to haunt one of the world’s hottest industries. 

According to analysts, we are witnessing the ratio of women rising in the cybersecurity industry growing by 11% year on year.  

However, the big challenge is how to attract and retain them and bridge the skill gap and empower them. What are the unique challenges women CISOs face in their journey and what takes them to the top to be leaders?   

The session will discuss:  

  • Changing role of women in cybersecurity;  
  • Essential skills that women prefer to build;  
  • Women’s contribution to securing the enterprise – a unique approach  
Heide  Young
  • 12:50 PM
  • 01:10 PM
IoT Security: The Good, the Bad and the Ugly
Justin Ong, APAC CISO, Panasonic Asia Pacific Pte. Ltd

Organizations have been incorporating new tech and smart devices over the years.  These become the weakest link for cybercriminals to get and stay inside an organization. 

You’re securing more endpoints than ever across the most significant attack surface. Enter: IoT devices and the risks they bring. But they also get new business benefits. The threat is real for operators and manufacturers of connected devices. 

The session will discuss:    

  • IoT risks and who is impacted by them   
  • A reality check of security by design in IoT   
  • How do malware developers and hackers plan an attack against IoT devices
Justin Ong
  • 01:10 PM
  • 01:40 PM
Panel: Building a Cyber-Resilient Enterprise: Bringing the C-Suite and Board Along
Micky Lo, Head of Technology and Cyber Risk, Galaxy Entertainment Group
Steven Sim Kok Leong, President, ISACA Singapore
Joey Fontiveros, Commanding Officer, Cyber Battalion, ASR, Philippine Army

Enterprises across the region are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and to support the digital economy.    

Can they align their strategy with business priorities and rise to the expectations? What does digital innovation mean to security, and where is the disconnect? How to address the skill challenge? What needs to change, both tactically and strategically, to build a cyber-resilient organization?  

Micky Lo
Steven Sim  Kok Leong
Joey Fontiveros
  • 01:40 PM
  • 02:16 PM

Speaker Interviews

October 6 - 7, 2022

Cybersecurity Summit: Singapore