Highlight Topics
- Enhancing Your Security Posture
- Third Party Risk Management
- Cyber Governance
- 5G Network Security and Business Opportunities
- Zero Trust
Singapore’s prominence as a global and regional hub for finance, commerce and other business services is fueled by its technology innovations across domains that influence the other regions of Asia-Pacific. This has made it equally vulnerable to cyberattacks.
According to a survey report, in 2023, 84% of organizations in Singapore were victims of ransomware attacks between March 2022 and March 2023. The country had the highest ransomware attack rates worldwide during this period.
Looking ahead to 2024, we can expect the prevalence of cloud technologies, DevOps, big data, adaptive AI, 5G, API, SaaS, blockchain, and environmental, social, and governance technology, leading to a cascading effect on cybersecurity.
ISMG’s Cybersecurity and Business Transformation Summit centered around the theme, “Leadership, Strategic Innovation and Cybersecurity Defense,” addresses the key challenges that IT and security leaders face. The event aims to explore the implications of these challenges and offer strategic and tactical approaches to implement technologies and employ robust defenses to protect innovations from cyberattacks.
As enterprises increasingly adopt artificial intelligence to drive technological advancement, the associated risks have also been rising exponentially, challenging them to evaluate the level of risk they are willing to accept to accomplish their business goals.
A successful business transformation will largely depend on the organization’s ability to balance customer convenience, innovation, offense, and defense with the use of the right tools, technologies and best practices.
Join ISMG’s Cybersecurity and Business Transformation Summit to gain insights into how leaders are spearheading excellence across technology implementations, crafting unique user experiences, and establishing a cyber-resilient enterprise that leverages innovation for business growth. The summit will cover topics including managing risk and preparing for the gen AI era, the impact of APIs on the future of business governance, building custom-built IT architectures, unlocking innovation through CIO leadership, responding to ransomware attacks, developing risk mitigation plans against new forms of attacks, implementing effective authentication mechanisms, and more.
The summit will also delve into the diverse trends and opportunities in the ever-evolving landscape of cybersecurity and business transformation.
You can also earn CPE credits by attending the summit.
ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter experts.
Singapore
As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps? Can you deploy suitable asset inventory methods and map the IT/OT risks?
This session will cover:
The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats?
The session will cover:
The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the “cloud-first” strategy to optimize the IT spend and secure their hybrid work environment. However, the major challenge is to tackle the risk associated with moving legacy applications to the cloud and find ways to build a risk management program to protect these applications.
The session will cover:
It’s called “Responsible Defense,” and Katie Jenkins, EVP and CISO of Liberty Mutual Insurance, addresses it in this exclusive keynote. Beyond this cultural shift, she discusses:
In a cloud account compromise, attackers gain control over the legitimate user’s cloud-based email or collaboration service account that gives access to the data and contacts. They can persuade users and business partners to wire money or damage an organization’s reputation. As more business assets move to cloud, attackers follow close behind.
The session will cover:
As organizations undergo more digital transformation, there is a greater focus on digitalizing processes and improving customer experiences. Consequently, the roles of CIOs and CISOs are evolving to new archetypes such as business enabler, digital enabler and value enabler.
Partnerships with the CIO and other business heads are imperative to drive business goals. The CIO and CISO are now partners in a mission to drive business enablement and to defend the organization from threats.
In this fireside chat, the participants will discuss:
Different industries are struggling to implement the various technologies under zero trust. Microsegmentation and access management are not easy to deploy. What works for one industry might not work for another as zero trust is not a monolithic approach. For many, zero trust architecture has become complex. Given this, are CISOs just tipping their toes? How must they get more granular in their approach?
This session will cover:
Besides, CISOs are compelled to force relationships with business functions and become evangelists for cybersecurity within the organization to gain the board’s attention. CISOs must adorn multiple hats of a leader, defender and offender during a cyber war to be resilient enough to stay on top of emerging threats and rebalance their skills to meet the changing demand.
The panel will discuss:
By neglecting to prioritize comprehensive cybersecurity strategies, businesses expose themselves to increased risk and hinder their ability to successfully implement other technology projects. It is essential that executive leadership takes an active role in championing proper cybersecurity investments and ensuring they are a top priority in order to secure the business and maximize the potential of technology projects.
In this session we will explore:
Cyber insurance, when properly deployed, can help avoid and respond to incidents, as well as reduce the financial impact of such incidents. This session reviews hot topics in cyber insurance, and provides a road map to maximizing your insurance recovery in the event of a loss.
Key learning objectives:
Companies are trying to optimize their infrastructure to address the increased complexity, scalability and security issues, and cloud seems to be the most viable answer. Beyond just the recognized advantages of cloud, the coming years will see how capabilities are built to enable seamless collaboration, harnessing strength of the hybrid cloud and practical applications for the IoT, AI and blockchain.
The session will cover:
It’s called “Responsible Defense,” and Katie Jenkins, EVP and CISO of Liberty Mutual Insurance, addresses it in this exclusive keynote. Beyond this cultural shift, she discusses:
With the normalization of remote work, companies are now tasked to support and provide critical services to their off-site workforce. While it gives a great deal of flexibility, it also widens the threat surface and enables cyberattackers to exploit systems.
A survey suggests that 27% of organizations have experienced a security incident in their public cloud infrastructure within the last 12 months. Regulators are seeking to tighten the rules around data sovereignty and localization, thus posing challenges for many industries to move to the cloud. While cloud adoption is on the rise, it is not free from multiple challenges. How are CXOs dealing with those?
The session will cover:
The economic and financial models are grounded in decades of traditional IT practices that are based on “owning” IT instead of “consuming” it.
As a consequence, companies are developing business cases, negotiating contracts and making economic calculations that don’t take into account the different financial approaches and models that are specific to cloud. Not only is this resulting in value derived from the cloud falling short of expectations, but it is also, in some cases, threatening cloud programs, with some businesses even considering reversing course.
The session will cover:
#ISMGSummit
@ISMG_News
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
RSVP here to attend our events. You can select for multiple or individual tickets.
Upcoming ISMG Events