Highlight Topics
- Complying with the DPDP Act
- Dark Web Challenges and Response
- Third Party Risk
- Deepfakes, Deception and AI
- Quantum Agility
- Zero Trust in the AI Era
South East Asia’s prominence as a global and regional hub for finance, commerce and other business services is fueled by technology innovations across domains that influence the other regions of Asia-Pacific. This has made it equally vulnerable to cyberattacks.
According to a survey report, 84% of organizations in South East Asia were victims of ransomware attacks between March 2022 and March 2023. The country had the highest ransomware attack rates worldwide during this period.
In 2024, we anticipate the prevalence of cloud technologies, DevOps, big data, adaptive AI, 5G, API, SaaS, blockchain, and environmental, social and governance technology, which will have a cascading effect on cybersecurity.
ISMG’s Cybersecurity and Business Transformation Summit centered around the theme, “Leadership, Strategic Innovation and Cybersecurity Defense,” addresses the key challenges that IT and security leaders face. The event aims to explore the implications of these challenges and offer strategic and tactical approaches to implement technologies and employ robust defenses to protect critical systems from cyberattacks.
As enterprises increasingly adopt artificial intelligence to drive technological advancement, the associated risks have also risen exponentially, challenging them to evaluate the level of risk they are willing to accept to accomplish their business goals.
A successful business transformation will largely depend on the organization’s ability to balance customer convenience, innovation, offense and defense with the use of the right tools, technologies and best practices.
Join ISMG’s Cybersecurity and Business Transformation Summit to gain insights into how leaders are spearheading excellence across technology implementations, crafting unique user experiences and establishing a cyber-resilient enterprise that leverages innovation for business growth. The summit will cover topics, including managing risk and preparing for the generative AI era, the impact of APIs on the future of business governance, building custom-built IT architectures, unlocking innovation through CIO leadership, responding to ransomware attacks, developing risk mitigation plans against new forms of attacks, implementing effective authentication mechanisms, and more.
The summit will also delve into the diverse trends and opportunities in the ever-evolving landscape of cybersecurity and business transformation.
You can also earn CPE credits by attending the summit.
ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter experts.
Our Summit Advisory Committee comprises industry visionaries who guide the conference’s content, ensuring that it remains relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities.
Industry leaders from various sectors in the technology domain share their experience on how the role of chief technology officers (CTOs) has become indispensable across organizations. They discuss unique strategies and techniques applied in businesses, making technology an intrinsic part of their organizational DNA. Additionally, these thought leaders delve into how they have redefined leadership to enhance the organization’s resilience and share their insights on artificial intelligence, sustainability, and the future of internet.
Day 1: ISMG Cybersecurity Conference
This dynamic interaction between AI and cybersecurity underscores how leveraging AI in cybersecurity defense mechanisms is not just a strategic imperative but a necessity in today’s digitally driven environment.
Security practitioners must take a practical approach to integrate AI into cybersecurity frameworks. This will enable organizations to build a proactive defense mechanism along with the rapid response process. Although AI presents numerous opportunities, it poses challenges in fostering innovation and collaboration within the cybersecurity ecosystem. This requires continuous learning, adaptation and strategic leadership informed by AI-driven insights.
The session will cover:
Abid Adam, Group Chief Risk & Compliance Officer, Axiata
However, this digital transformation comes with a heightened risk of cyberthreats that can disrupt operations, compromise sensitive data and damage reputation. The keynote address aims to explore the crucial intersection between innovation, business success and cybersecurity preparedness.
The keynote will:
Esti Peshin, VP, General Manager, Cyber Division, IAI – Israel Aerospace Industries
To accomplish this, CISOs must align their strategies with business priorities, move from a defense to an offense mindset, and collaborate to ensure that their organization’s cybersecurity approach delivers business value.
Building a resilient enterprise depends on the leadership traits of a CISO and the strategic road map to achieve the goal. Most security practitioners argue that CISOs need to embody all leadership traits, take ownership and wear multiple caps to build resiliency and demonstrate their inclusive leadership skills.
The session will cover:
Jagathesh Ragavasagam, Risk and Cybersecurity Officer, Abbott
Sourabh Chitrachar, Regional Vice President/Head- Asia Technology Strategy & Operations, Liberty Mutual Insurance
Justin Ong, APAC CISO and Chief Privacy Officer, Panasonic Asia Pacific Pte.Ltd
The fundamental question that arises is, “should privacy be considered a CISO’s problem, and how privacy can be operationalized in the context of security and data protection issues?”
How much security is required in an environment where openly shared data and research results fuel business? Is a CISO more than just another corporate policy developer and technology evangelist in terms of privacy and security matters?
What role does a CISO play in operationalizing data protection and privacy regulations?
The session will cover:
Carolyn Bigg, Partner and Global Co-Chair of the Data, Privacy and Cyber Group, DLA Piper, Singapore
Sunari Dandeniya, Chief Information Security Officer, Commercial Bank of Ceylon PL
These devices lack robust security measures such as those found in other endpoints.
Some security leaders believe that implementing endpoint detection and response on IoT and OT devices is challenging due to lack of agent support and specific security features. While IoT risks are an enterprise-wide challenge, having right remediation tactics, techniques and measures to counter the risks is critical.
It is crucial to have these to ascertain the behavior of a threat actor and assess the structured framework for executing a cyberattack.
The session will cover:
Jenny Tan, President, ISACA-Singapore Chapter
John Lee, Managing Director-Asia Pacific, GRF
Steven Sim Kok Leong, Chair, Executive Committee, OT-ISAC
This is possible because the modern digital business increasingly relies on technology partnerships, leveraging third-party applications and data to deliver new functionality and optimized user experiences to market, often resulting in mishaps.
Security leaders have the daunting task of establishing accountability for checking the malicious code in their supply chain. It is imperative to establish a methodology for a secure and transparent coding process. They are grappling with the challenge of assessing and managing risks and vulnerabilities at the source code level and responding to software supply chain threats. Are there the right kinds of tools and applications to remediate these risks in this AI era?
The session will discuss:
Reuben Athaide, Head, Cyber Security Advisory and DevSecOps, Standard Chartered Bank
By following the right path, security and risk leaders can feel confident in their approach to managing the cyber risk posed by third parties.
This session will discuss:
Raina Verma, Advisory Council Member, Association of Certified Fraud Examiners (ACFE)
Sujit Christy, Secretary/Immediate past president, ISC2- Colombo Chapter, Sri Lanka, President, Circulo de CISO
These solutions can help in adeptly identifying and monitoring potential data access abnormalities, swiftly alerting cybersecurity professionals to potential threats. Therefore, they significantly reduce the time it takes to detect and remediate security issues in real time, ultimately bolstering data protection and safeguarding against unauthorized access or data breaches. This innovative approach not only enhances data security but also enables organizations to respond proactively to emerging threats, consequently fortifying their cybersecurity posture.
The session will cover:
Dr. Jassim Haji, Executive Advisor for AI & Data Science, NAIRDC
Mahesh Chandran, Director AI, Fujitsu Research
Day 2: CIO.inc Business Transformation Conference
It also examines the collaborative co-evolution of humans and AI systems, shedding light on the extensive societal impact in Singapore, spanning industries, workforce dynamics, and the broader societal framework. The session elaborates on the profound influence of AI in businesses and the technologies adopted. It delves in the transformative power of AI to revolutionize the way businesses innovate and operate.
The session will cover:
Arlene Romasanta, Director IV, Department of Environment and Natural Resources (DENR)
CIOs will gain valuable insights into aligning their technology and digital strategies with the broader corporate objectives. This collaborative discussion will provide a platform for the exchange of ideas and the formulation of strategies. The goal is to ensure that CIOs are well-prepared to contribute to realizing CEOs’ priorities and driving impactful technological transformations.
The session will cover:
Zaved Akhtar, Chairman & Managing Director, Unilever Bangladesh
The panel will highlight the crucial role of CIOs in building and leading resilient organizations.
The session will cover:
Ruwanthi Fernando, Chief Information and Process Officer, Hela Clothing
Atif Najam, Former Chief Information Officer, Gatron (Industries) Ltd. (Gatro-nova Group)
Both the terms are often used interchangeably but have distinct connotations. While both emphasize the utilization of data for decision-making, data-first involves inga comprehensive data-centric approach across the organization, placing data at the core of the operations – as opposed to specific projects – to inform decision-making.
The session will delve into what it takes for organizations to scale from a data-driven to data-first enterprise.
The session will cover:
Guy Sheppard, Chief Commercial Officer, Aboitiz Data Innovation
The session will explore the current macroeconomic landscape through the lens of AI-driven transformation, offering CIOs insights, recommendations and best practices to navigate digital evolution amid uncertainty.
The session will cover:
Bilal Javeri, CIO, Lucky Motor Corp
Ts. Izuddin Abdullah, Head of IT, TNB Integrated Learning Solution Sdn Bhd
APIs are no longer just tools for developers, they are becoming the backbone of modern business strategies. As CIOs, understanding the pivotal role of APIs in your digital strategy is essential for staying ahead in the ever-evolving business landscape. Embracing APIs as the future of business can unlock new opportunities, streamline operations and drive growth.
The session will cover:
Hussein Hassanali, Head of IT Advisory Internal Audit, HBL – Habib Bank Limited
James Thang, Group Chief Information Officer, UCSI Group Holdings Sdn. Bhd.
Rishi Ganiswaran, Head of Legal (Technology) and Group Chief Privacy Officer,Yinson
CIOs and technology leaders will gain valuable insights into harnessing the potential of cutting-edge technologies to elevate customer experiences, streamline business operations and maintain a competitive edge. The session provides a platform to exchange knowledge and ideas as technology advances, shaping strategies for a future where innovative solutions and digital growth are central to business operations.
The session will cover:
Ali Abdulla Al Sadadi, Chief of Information Technology, Ministry of Oil & Environment, Kingdom of Bahrain
#ISMGSummit
@ISMG_News
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
RSVP here to attend our events. You can select for multiple or individual tickets.
Upcoming ISMG Events
Upcoming ISMG Events