The summit has been carefully designed with the support and guidance of the 'editorial advisory board', including senior thought leaders from the ASEAN region, to capture the regional security challenges that resonate with current concerns.
The South East Asia region is poised for digital transformation across enterprises; it has become an easy and prime target for cyberattacks.
It’s no longer a matter of if, but when you’re going to be the victim of a cyberattack. Are you prepared? It’s no longer a theory about protecting your critical infrastructure. It’s a different world today, post-Solarwinds, Colonial Pipeline, Log4J, and Ukraine, and it requires a different cybersecurity strategy to fight hybrid warfare. Various regional governments have tightened their cyber defenses as attacks surge and to protect digital domains.
Do you think yesterday’s cyber strategy will hold well for 2022? What needs to change in how CISOs conduct business and secure digital assets from ever-evolving, ever-automating cyber adversaries?
The session will cover:
With the dawn of the fourth industrial revolution (industry 4.0), organizations have put their digital transformation at the top of their agenda. While the digital transformation will enhance competitiveness and bring agility and optimal decision-making capabilities, it brings cybersecurity risks and innovation. It is indeed driving automation, accelerating the adoption of IIoT, which is expected to contribute most of IoT’s business value potential.
The plenary session cover:
We have been hearing about digital transformation for some time. Your business could be looking to reduce the cost or thinking about agility and swiftly bringing your services to market.
Many of us are on a similar journey! New terms, new architectures, confusing statements, and more security technologies are afoot. And, of course, we have to confront our capacity to deliver on these technologies whilst ensuring information remains secure as best as we can.
Brendan will explain how we can help your team determine risk, build secure applications, monitor threats and evolve to automated remediation on any workload or asset, whether on-premise, hybrid or cloud-centric.
The daunting task for CISOs today is to turn today’s threats into tomorrow’s advantage. The tool that most security leaders are leaning on is the XDR to build resilient, dynamic, and living security. You could argue that true XDR can bring material benefit, but only if it combines different detection capabilities directly at the data source (network and endpoint)? However, the security promise of XDR would ensure detection, response, and adaptive prevention.
The session will cover:
Banks in the ASEAN have seen their customers targeted by social engineering frauds. New fraudulent methods are bypassing Web application firewalls and multi-factor authentication security controls.
This session will cover:
The challenge for CISOs in their digital transformation journey is to understand the right technologies required for their business and how do you secure those endpoints that are going to expand. The question would arise on what you need to focus on endpoint security that could protect all access points which are vulnerable to cyber criminals to breach your network.
The session will cover:
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and part of technology innovation? Is the CTO function aligned with security in driving innovation? Meeting the Expectations.
The session discusses how to get a CTO and the CISO on a common goal to facilitate the continued success of their organization. Where is the disconnect?
Organizations believe that cloud computing brings a whole new level of autonomy and functionality, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud and enterprises are in a race to adopt the ‘cloud-first’ strategy to optimize the IT spend and secure their hybrid work environment.
CISO are tasked with building a cloud-first security strategy and mitigating risks arising with this.
The session will cover:
The region has witnessed the most prominent organizations hitting the headlines. It is beyond doubt that organizations have a huge staff and a myriad of cybersecurity tools to secure their environment; yet, they were still breached. The current approach is insufficient, and the deployed technologies don’t provide the necessary intel to detect the blind spots.
It is imperative to assess the effectiveness of the cyber threat intelligence program, and building a business case is essential in driving actionable threat intelligence.
Building relationships with business unit leaders and driving a practical risk-based discussion with the board is critical in making informed risk decisions.
The daunting task for CISOs is the uncertainty around the reporting of significant risks, including just what represents a 'significant' risk, which challenges many organizations today. Can you question the management and boards regarding how strategy affects risk and vice versa and their best approach to risk and discuss risk management in a meaningful and productive way?
The session will cover:
The popular SolarWinds hack, the supply chain attack that implanted a backdoor in the Orion network monitoring software pushed to 18,000 of the firm's customers, is considered to be potentially the most significant intrusion in our history.
The campaign's full scale, including all of the tactics, techniques and procedures being used by attackers remaining unknown, has left most enterprises across the regions in a state of shock.
What are the lessons the CISOs need to learn from this attack? Do you have a process to evaluate your vendor's security policies and frameworks?
The session will cover:
As Russia and Ukraine invasions are making the headlines, organizations across the globe are facing a series of DDoS attacks. Besides, new forms of malware intrusions are surfacing that can destroy infected machines. How are organizations in the South East Asian regions responding to DDoS attacks? How vulnerable are financial institutions to DDoS attacks?
The session will cover:
Where does the journey to ‘zero trust’ begin and what are the common entry points and how can it unfold. Experts agree that ‘zero trust’ is based on the premise, ‘assume breach’, and treat every asset as breached, and all traffic as hostile.
The plenary session will discuss how the way we approach security has changed dramatically as security perimeters have dissolved and assess the maturity of ‘zero trust’ state with a realistic look at security and its dependencies with other functions in securing the future work environment.
The year 2021 stands as testimony to the large ransomware attacks witnessed globally. The South East Asia is not an exception. The Southeast Asian region will see a spike in multifaceted extortion with more public breaches, along with an increase in ransomware-as-a-service operations in 2022. the increase will be driven by the rise in cryptocurrency value and the difficulty in attributing the arrest of people associated with a specific cyber campaign, experts say.
What needs to change as CISOs experience increasing hacking burnout in preventing such malware intrusions? Can they operationalize technology in their prevention and incidence response mechanism to address ransomware issues?
The panel will cover:
Most OT systems are designed with very little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission-critical for enterprise security. As a CISO, can you reduce risk, security, and risk management functions silos to bridge the security gaps? Can you deploy the suitable asset inventory methods and map the IT/OT risks?
This session will cover:
With the risks from third-parties escalating at a fast pace, enterprises across Southeast Asia are leaning towards SOC2, (Systems and Organization Controls) an audit procedure that ensures services providers securely manage their data and establish privacy and controls. How should CISOs comply with this standard as organizations move to the cloud and take up the digital transformation journey?
The session will cover:
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider that cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks ushers in the risk: supplier vulnerabilities which are the common cause of compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response.
The session will cover:
The summit has been carefully designed with the support and guidance of the 'editorial advisory board', including senior thought leaders from the ASEAN region, to capture the regional security challenges that resonate with current concerns.
The South East Asia region is poised for digital transformation across enterprises; it has become an easy and prime target for cyberattacks.
It’s no longer a matter of if, but when you’re going to be the victim of a cyberattack. Are you prepared? It’s no longer a theory about protecting your critical infrastructure. It’s a different world today, post-Solarwinds, Colonial Pipeline, Log4J, and Ukraine, and it requires a different cybersecurity strategy to fight hybrid warfare. Various regional governments have tightened their cyber defenses as attacks surge and to protect digital domains.
Do you think yesterday’s cyber strategy will hold well for 2022? What needs to change in how CISOs conduct business and secure digital assets from ever-evolving, ever-automating cyber adversaries?
The session will cover:
With the dawn of the fourth industrial revolution (industry 4.0), organizations have put their digital transformation at the top of their agenda. While the digital transformation will enhance competitiveness and bring agility and optimal decision-making capabilities, it brings cybersecurity risks and innovation. It is indeed driving automation, accelerating the adoption of IIoT, which is expected to contribute most of IoT’s business value potential.
The plenary session cover:
We have been hearing about digital transformation for some time. Your business could be looking to reduce the cost or thinking about agility and swiftly bringing your services to market.
Many of us are on a similar journey! New terms, new architectures, confusing statements, and more security technologies are afoot. And, of course, we have to confront our capacity to deliver on these technologies whilst ensuring information remains secure as best as we can.
Brendan will explain how we can help your team determine risk, build secure applications, monitor threats and evolve to automated remediation on any workload or asset, whether on-premise, hybrid or cloud-centric.
The daunting task for CISOs today is to turn today’s threats into tomorrow’s advantage. The tool that most security leaders are leaning on is the XDR to build resilient, dynamic, and living security. You could argue that true XDR can bring material benefit, but only if it combines different detection capabilities directly at the data source (network and endpoint)? However, the security promise of XDR would ensure detection, response, and adaptive prevention.
The session will cover:
Banks in the ASEAN have seen their customers targeted by social engineering frauds. New fraudulent methods are bypassing Web application firewalls and multi-factor authentication security controls.
This session will cover:
The challenge for CISOs in their digital transformation journey is to understand the right technologies required for their business and how do you secure those endpoints that are going to expand. The question would arise on what you need to focus on endpoint security that could protect all access points which are vulnerable to cyber criminals to breach your network.
The session will cover:
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and part of technology innovation? Is the CTO function aligned with security in driving innovation? Meeting the Expectations.
The session discusses how to get a CTO and the CISO on a common goal to facilitate the continued success of their organization. Where is the disconnect?
Organizations believe that cloud computing brings a whole new level of autonomy and functionality, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud and enterprises are in a race to adopt the ‘cloud-first’ strategy to optimize the IT spend and secure their hybrid work environment.
CISO are tasked with building a cloud-first security strategy and mitigating risks arising with this.
The session will cover:
The region has witnessed the most prominent organizations hitting the headlines. It is beyond doubt that organizations have a huge staff and a myriad of cybersecurity tools to secure their environment; yet, they were still breached. The current approach is insufficient, and the deployed technologies don’t provide the necessary intel to detect the blind spots.
It is imperative to assess the effectiveness of the cyber threat intelligence program, and building a business case is essential in driving actionable threat intelligence.
Building relationships with business unit leaders and driving a practical risk-based discussion with the board is critical in making informed risk decisions.
The daunting task for CISOs is the uncertainty around the reporting of significant risks, including just what represents a 'significant' risk, which challenges many organizations today. Can you question the management and boards regarding how strategy affects risk and vice versa and their best approach to risk and discuss risk management in a meaningful and productive way?
The session will cover:
The popular SolarWinds hack, the supply chain attack that implanted a backdoor in the Orion network monitoring software pushed to 18,000 of the firm's customers, is considered to be potentially the most significant intrusion in our history.
The campaign's full scale, including all of the tactics, techniques and procedures being used by attackers remaining unknown, has left most enterprises across the regions in a state of shock.
What are the lessons the CISOs need to learn from this attack? Do you have a process to evaluate your vendor's security policies and frameworks?
The session will cover:
As Russia and Ukraine invasions are making the headlines, organizations across the globe are facing a series of DDoS attacks. Besides, new forms of malware intrusions are surfacing that can destroy infected machines. How are organizations in the South East Asian regions responding to DDoS attacks? How vulnerable are financial institutions to DDoS attacks?
The session will cover:
Where does the journey to ‘zero trust’ begin and what are the common entry points and how can it unfold. Experts agree that ‘zero trust’ is based on the premise, ‘assume breach’, and treat every asset as breached, and all traffic as hostile.
The plenary session will discuss how the way we approach security has changed dramatically as security perimeters have dissolved and assess the maturity of ‘zero trust’ state with a realistic look at security and its dependencies with other functions in securing the future work environment.
The year 2021 stands as testimony to the large ransomware attacks witnessed globally. The South East Asia is not an exception. The Southeast Asian region will see a spike in multifaceted extortion with more public breaches, along with an increase in ransomware-as-a-service operations in 2022. the increase will be driven by the rise in cryptocurrency value and the difficulty in attributing the arrest of people associated with a specific cyber campaign, experts say.
What needs to change as CISOs experience increasing hacking burnout in preventing such malware intrusions? Can they operationalize technology in their prevention and incidence response mechanism to address ransomware issues?
The panel will cover:
Most OT systems are designed with very little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission-critical for enterprise security. As a CISO, can you reduce risk, security, and risk management functions silos to bridge the security gaps? Can you deploy the suitable asset inventory methods and map the IT/OT risks?
This session will cover:
With the risks from third-parties escalating at a fast pace, enterprises across Southeast Asia are leaning towards SOC2, (Systems and Organization Controls) an audit procedure that ensures services providers securely manage their data and establish privacy and controls. How should CISOs comply with this standard as organizations move to the cloud and take up the digital transformation journey?
The session will cover:
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider that cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks ushers in the risk: supplier vulnerabilities which are the common cause of compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response.
The session will cover:
April 12 - 13, 2022
Virtual Cybersecurity Summit: South East Asia