June 6-7, 2024

Southeast Asia Summit (Virtual)

8:00 AM SGT - 5:00 PM SGT

Event Overview

South East Asia’s prominence as a global and regional hub for finance, commerce and other business services is fueled by technology innovations across domains that influence the other regions of Asia-Pacific. This has made it equally vulnerable to cyberattacks.

According to a survey report, 84% of organizations in South East Asia were victims of ransomware attacks between March 2022 and March 2023. The country had the highest ransomware attack rates worldwide during this period.

In 2024, we anticipate the prevalence of cloud technologies, DevOps, big data, adaptive AI, 5G, API, SaaS, blockchain, and environmental, social and governance technology, which will have a cascading effect on cybersecurity.

ISMG’s Cybersecurity and Business Transformation Summit centered around the theme, “Leadership, Strategic Innovation and Cybersecurity Defense,” addresses the key challenges that IT and security leaders face. The event aims to explore the implications of these challenges and offer strategic and tactical approaches to implement technologies and employ robust defenses to protect critical systems from cyberattacks.

As enterprises increasingly adopt artificial intelligence to drive technological advancement, the associated risks have also risen exponentially, challenging them to evaluate the level of risk they are willing to accept to accomplish their business goals.

A successful business transformation will largely depend on the organization’s ability to balance customer convenience, innovation, offense and defense with the use of the right tools, technologies and best practices.

Join ISMG’s Cybersecurity and Business Transformation Summit to gain insights into how leaders are spearheading excellence across technology implementations, crafting unique user experiences and establishing a cyber-resilient enterprise that leverages innovation for business growth. The summit will cover topics, including managing risk and preparing for the generative AI era, the impact of APIs on the future of business governance, building custom-built IT architectures, unlocking innovation through CIO leadership, responding to ransomware attacks, developing risk mitigation plans against new forms of attacks, implementing effective authentication mechanisms, and more.

The summit will also delve into the diverse trends and opportunities in the ever-evolving landscape of cybersecurity and business transformation.

You can also earn CPE credits by attending the summit.

ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter experts.

Santosh Nair (Conference Chair)

Regional Head of Innovation and Process Consulting, APAC IT, Siemens Healthineers

Christophe Barel (Conference Co-chair)

Managing Director-APAC, FS-ISAC Singapore Chapter

Rishi Ganiswaran

Head of Legal (Technology) and Group Chief Privacy Officer, Yinson

Sourabh Chitrachar

Regional Vice President/Head- Asia Technology Strategy & Operations Liberty, Mutual Insurance

Jenny Tan

President, ISACA-Singapore Chapter

Reuben Athaide

Head, Cyber Security Advisory and DevSecOps, Standard Chartered Bank

Steven Sim Kok Leong

Chair, Executive Committee, OT-ISAC

Advisors

Thought Leaders on Stage and Leading Deep Dive Discussions

Our Summit Advisory Committee comprises industry visionaries who guide the conference’s content, ensuring that it remains relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities.

Speakers

Thought Leaders Leading Deep-Dive Discussions on Stage

Industry leaders from various sectors in the technology domain share their experience on how the role of chief technology officers (CTOs) has become indispensable across organizations. They discuss unique strategies and techniques applied in businesses, making technology an intrinsic part of their organizational DNA. Additionally, these thought leaders delve into how they have redefined leadership to enhance the organization’s resilience and share their insights on artificial intelligence, sustainability, and the future of internet.

Ruwanthi Fernando

Chief Information and Process Officer, Hela Clothing

Carolyn Bigg

Partner and Global Co-Chair of the Data, Privacy and Cyber Group, DLA Piper, Hongkong

Justin Ong

APAC CISO and Chief Privacy Officer, Panasonic Asia Pacific Pte.Ltd

Guy Sheppard

Chief Commercial Officer, Aboitiz Data Innovation

Esti Peshin

VP, General Manager, Cyber Division, IAI - Israel Aerospace Industries

Ali Abdulla Al Sadadi

Chief of Information Technology, Ministry of Oil & Environment, Kingdom of Bahrain

Atif Najam

Chief Information Officer, Gatron (Industries) Ltd. (Gatro-nova Group)

Abid Adam

Group Chief Risk & Compliance Officer, Axiata

Arlene Romasanta

Director IV, Department of Environment and Natural Resources

Highlight Topics

  • Complying with the DPDP Act
  • Dark Web Challenges and Response
  • Third Party Risk
  • Deepfakes, Deception and AI
  • Quantum Agility
  • Zero Trust in the AI Era

Agenda - Day 1

Day 1: ISMG Cybersecurity Conference

Welcome and Opening Remarks

Abid Adam

Group Chief Risk & Compliance Officer, Axiata

Plenary: AI's Influence on Cybersecurity Leadership, Innovation and Defense

This dynamic interaction between AI and cybersecurity underscores how leveraging AI in cybersecurity defense mechanisms is not just a strategic imperative but a necessity in today’s digitally driven environment.

Security practitioners must take a practical approach to integrate AI into cybersecurity frameworks. This will enable organizations to build a proactive defense mechanism along with the rapid response process. Although AI presents numerous opportunities, it poses challenges in fostering innovation and collaboration within the cybersecurity ecosystem. This requires continuous learning, adaptation and strategic leadership informed by AI-driven insights.

The session will cover: 

  • The evolving landscape of cybersecurity threats in a global context, spanning Southeast Asia; 
  • Use cases related to deploying AI-focused programs for enterprise security, innovation and defense; 
  • The intersection of AI, data privacy and ethics in establishing cybersecurity governance. 

Abid Adam, Group Chief Risk & Compliance Officer, Axiata

Esti Peshin

VP, General Manager, Cyber Division, IAI - Israel Aerospace Industries

Keynote: Innovating and Thriving in a Digital Economy: Do Security Leaders Have the Right Defenses and Strategies?

However, this digital transformation comes with a heightened risk of cyberthreats that can disrupt operations, compromise sensitive data and damage reputation. The keynote address aims to explore the crucial intersection between innovation, business success and cybersecurity preparedness.

The keynote will:  

  • Highlight the digital transformation landscape;   
  • Examine cybersecurity challenges in the AI era;
  • Evaluate security leaders’ role;   
  • Explore adaptive defense strategies.

Esti Peshin, VP, General Manager, Cyber Division, IAI – Israel Aerospace Industries

Jagathesh Ragavasagam

Risk and Cybersecurity Officer, Abbott

Sourabh Chitrachar

Regional Vice President/Head- Asia Technology Strategy & Operations, Liberty Mutual Insurance

Justin Ong

APAC CISO and Chief Privacy Officer, Panasonic Asia Pacific Pte.Ltd

Leadership Traits of a CISO: A Strategic Road Map

To accomplish this, CISOs must align their strategies with business priorities, move from a defense to an offense mindset, and collaborate to ensure that their organization’s cybersecurity approach delivers business value.

Building a resilient enterprise depends on the leadership traits of a CISO and the strategic road map to achieve the goal. Most security practitioners argue that CISOs need to embody all leadership traits, take ownership and wear multiple caps to build resiliency and demonstrate their inclusive leadership skills.

The session will cover: 

  • How to become a strategic thinker and imbibe the qualities of a knight; 
  • How to make “security” a part of the corporate strategy and DNA; 
  • How to demonstrate leadership in countering information warfare and establishing organizational resilience.

Jagathesh Ragavasagam, Risk and Cybersecurity Officer, Abbott
Sourabh Chitrachar, Regional Vice President/Head- Asia Technology Strategy & Operations, Liberty Mutual Insurance
Justin Ong, APAC CISO and Chief Privacy Officer, Panasonic Asia Pacific Pte.Ltd

Carolyn Bigg,

Partner and Global Co-Chair of the Data, Privacy and Cyber Group, DLA Piper, Singapore

Sunari Dandeniya

Chief Information Security Officer, Commercial Bank of Ceylon PLC

Fireside chat - Is Privacy a CISO’s Problem? How to Operationalize It?

The fundamental question that arises is, “should privacy be considered a CISO’s problem, and how privacy can be operationalized in the context of security and data protection issues?”

How much security is required in an environment where openly shared data and research results fuel business? Is a CISO more than just another corporate policy developer and technology evangelist in terms of privacy and security matters?  

What role does a CISO play in operationalizing data protection and privacy regulations? 

The session will cover:

  • The intersection between security and privacy;   
  • How much is a CISO accountable for privacy;   
  • Data protection versus security controls

Carolyn Bigg, Partner and Global Co-Chair of the Data, Privacy and Cyber Group, DLA Piper, Singapore
Sunari Dandeniya, Chief Information Security Officer, Commercial Bank of Ceylon PL

Networking & Exhibition Break

Jenny Tan

President, ISACA-Singapore Chapter

John Lee

Managing Director-Asia Pacific, GRF

Steven Sim Kok Leong

Chair, Executive Committee, OT-ISAC

Panel: IoT Risks: Tactics, Techniques and Procedures to Remediate

These devices lack robust security measures such as those found in other endpoints.

Some security leaders believe that implementing endpoint detection and response on IoT and OT devices is challenging due to lack of agent support and specific security features. While IoT risks are an enterprise-wide challenge, having right remediation tactics, techniques and measures to counter the risks is critical.

It is crucial to have these to ascertain the behavior of a threat actor and assess the structured framework for executing a cyberattack.

The session will cover:

  • What should the TTPs constitute in remediating IoT risks; 
  • Defending the devices while maintaining privacy; 
  • CISOs’ consideration on the right investments and accountability.

Jenny Tan, President, ISACA-Singapore Chapter
John Lee, Managing Director-Asia Pacific, GRF
Steven Sim Kok Leong, Chair, Executive Committee, OT-ISAC

Reuben Athaide

Head, Cyber Security Advisory and DevSecOps, Standard Chartered Bank

Spotlight - Conquering Software Supply Chain Insecurities: The Security Promise

This is possible because the modern digital business increasingly relies on technology partnerships, leveraging third-party applications and data to deliver new functionality and optimized user experiences to market, often resulting in mishaps. 

Security leaders have the daunting task of establishing accountability for checking the malicious code in their supply chain. It is imperative to establish a methodology for a secure and transparent coding process. They are grappling with the challenge of assessing and managing risks and vulnerabilities at the source code level and responding to software supply chain threats. Are there the right kinds of tools and applications to remediate these risks in this AI era? 

The session will discuss: 

  • How to establish a secure coding process without malicious intent and compromised source control system 
  • How to adopt a “shift left” strategy in taking a security-by-design approach through automation 
  • Building a cybersecurity framework for faster detection and remediation of supply chain attacks 
  • Streamlining the software bill of materials process with continuous monitoring and visibility into the overall system 

Reuben Athaide, Head, Cyber Security Advisory and DevSecOps, Standard Chartered Bank

Raina Verma

Advisory Council Member, Association of Certified Fraud Examiners (ACFE)

Sujit Christy

Secretary/Immediate past president, ISC2- Colombo Chapter, Sri Lanka, President, Circulo de CISO

Third-Party Suppliers: Risks and Response

By following the right path, security and risk leaders can feel confident in their approach to managing the cyber risk posed by third parties. 

This session will discuss: 

  • How third-party risk environment has evolved; 
  • Building an effective risk management program with right processes and tools; 
  • Right prescription to third party SLAs; 
  • The challenges of implementing third-party risk program; 
  • How do you respond to third party risks. 

Raina Verma, Advisory Council Member, Association of Certified Fraud Examiners (ACFE)
Sujit Christy, Secretary/Immediate past president, ISC2- Colombo Chapter, Sri Lanka, President, Circulo de CISO

Dr. Jassim Haji

Executive Advisor for AI & Data Science, NAIRDC

Mahesh Chandran

Director AI, Fujitsu Research

Fireside Chat: AI-Powered Shadow Data Monitoring: Rapid Threat Detection and Remediation

These solutions can help in adeptly identifying and monitoring potential data access abnormalities, swiftly alerting cybersecurity professionals to potential threats. Therefore, they significantly reduce the time it takes to detect and remediate security issues in real time, ultimately bolstering data protection and safeguarding against unauthorized access or data breaches. This innovative approach not only enhances data security but also enables organizations to respond proactively to emerging threats, consequently fortifying their cybersecurity posture.

The session will cover: 

  • The concept of shadow data and its relevance in the context of data security; 
  • The capabilities of AI solutions in identifying and monitoring potential data access abnormalities; 
  • Proactive response to emerging threats. 

Dr. Jassim Haji, Executive Advisor for AI & Data Science, NAIRDC
Mahesh Chandran, Director AI, Fujitsu Research

Agenda - Day 2

Day 2: CIO.inc Business Transformation Conference

Welcome and Opening Remarks - ISMG

Arlene Romasanta

Director IV, Department of Environment and Natural Resources (DENR)

Plenary: The Upcoming Age: AI’s Influence on the Technology Innovation

It also examines the collaborative co-evolution of humans and AI systems, shedding light on the extensive societal impact in Singapore, spanning industries, workforce dynamics, and the broader societal framework. The session elaborates on the profound influence of AI in businesses and the technologies adopted. It delves in the transformative power of AI to revolutionize the way businesses innovate and operate.

The session will cover:

  • Exploring approaches to evaluate return on investment in business AI initiatives; 
  • Navigating complexities in implementing AI-driven optimization solutions; 
  • Identifying and discussing common challenges faced by businesses in adopting AI technologies. 

Arlene Romasanta, Director IV, Department of Environment and Natural Resources (DENR)

Zaved Akhtar

Chairman & Managing Director, Unilever Bangladesh 

CEO Keynote: CEO Priorities in 2024: Impact and Strategies for CIOs 

CIOs will gain valuable insights into aligning their technology and digital strategies with the broader corporate objectives. This collaborative discussion will provide a platform for the exchange of ideas and the formulation of strategies. The goal is to ensure that CIOs are well-prepared to contribute to realizing CEOs’ priorities and driving impactful technological transformations.

The session will cover: 

  • The need to foster innovation and technology partnership to achieve business goals; 
  • Harnessing Data-driven decision-making and nurturing talent development; 
  • The importance of aligning strategic priorities.

Zaved Akhtar, Chairman & Managing Director, Unilever Bangladesh 

Ruwanthi Fernando

Chief Information and Process Officer, Hela Clothing

Atif Najam

Former Chief Information Officer, Gatron (Industries) Ltd. (Gatro-nova Group)

Panel: Making of a Resilient Enterprise: How Will CIOs Raise the Bar?

The panel will highlight the crucial role of CIOs in building and leading resilient organizations. 

The session will cover: 

  • A CIO checklist for driving resilience within organizations; 
  • Emerging technologies that enhance agility, adaptability and robustness; 
  • Building resilience through collaborative partnerships with vendors and suppliers; 
  • Leveraging an agile and adaptive IT infrastructure, including cloud, microservices and containerization, to swiftly respond to changing business needs. 

Ruwanthi Fernando, Chief Information and Process Officer, Hela Clothing
Atif Najam, Former Chief Information Officer, Gatron (Industries) Ltd. (Gatro-nova Group)

Networking Break

Guy Sheppard

Chief Commercial Officer, Aboitiz Data Innovation

Fireside Chat: Building a Data-Driven to Data-First Enterprise in the Digital Era

Both the terms are often used interchangeably but have distinct connotations. While both emphasize the utilization of data for decision-making, data-first involves inga comprehensive data-centric approach across the organization, placing data at the core of the operations – as opposed to specific projects – to inform decision-making.

The session will delve into what it takes for organizations to scale from a data-driven to data-first enterprise.

The session will cover: 

  • Playbook for data-first enterprise;  
  • Extensive cross-functional data integration;  
  • New technology tools and opportunities for innovation. 

Guy Sheppard, Chief Commercial Officer, Aboitiz Data Innovation

Bilal Javeri

CIO, Lucky Motor Corp

Ts. Izuddin Abdullah

Head of IT, TNB Integrated Learning Solution Sdn Bhd

Panel: Macroeconomic Uncertainty: Establishing Digital Innovation and Resilience Guided by AI

The session will explore the current macroeconomic landscape through the lens of AI-driven transformation, offering CIOs insights, recommendations and best practices to navigate digital evolution amid uncertainty. 

The session will  cover: 

  • Market shifts and emerging trends in AI-driven transformation; 
  • Analysis of challenges experienced by enterprises; 
  • Agile methodologies organizations need to implement to adapt to the market dynamics; 
  • Strategies for achieving excellence and innovation in turbulent economic times. 

Bilal Javeri, CIO, Lucky Motor Corp
Ts. Izuddin Abdullah, Head of IT, TNB Integrated Learning Solution Sdn Bhd

Hussein Hassanali

Head of IT Advisory Internal Audit, HBL - Habib Bank Limited

James Thang

Group Chief Information Officer, UCSI Group Holdings Sdn. Bhd.

Rishi Ganiswaran

Head of Legal (Technology) and Group Chief Privacy Officer,Yinson

Panel - APIs: Impacting the Future of IT and Business

APIs are no longer just tools for developers, they are becoming the backbone of modern business strategies. As CIOs, understanding the pivotal role of APIs in your digital strategy is essential for staying ahead in the ever-evolving business landscape. Embracing APIs as the future of business can unlock new opportunities, streamline operations and drive growth.

The session will cover: 

  • Security and governance; 
  • Monetizing opportunity; 
  • Enhancing innovation and customer experience. 

Hussein Hassanali, Head of IT Advisory Internal Audit, HBL – Habib Bank Limited
James Thang, Group Chief Information Officer, UCSI Group Holdings Sdn. Bhd.
Rishi Ganiswaran, Head of Legal (Technology) and Group Chief Privacy Officer,Yinson

Ali Abdulla Al Sadadi

Chief of Information Technology, Ministry of Oil & Environment, Kingdom of Bahrain

Charter for CIOs and Technology Executives in 2024: The Way Forward in Expanding Digital Delivery

CIOs and technology leaders will gain valuable insights into harnessing the potential of cutting-edge technologies to elevate customer experiences, streamline business operations and maintain a competitive edge. The session provides a platform to exchange knowledge and ideas as technology advances, shaping strategies for a future where innovative solutions and digital growth are central to business operations.

The session will cover: 

  • Leveraging modern technologies; 
  • Reshaping digital landscapes and revolutionizing business practices in 2024; 
  • Personalizing customer experiences with advanced technologies and empowering CIOs and technology executives to enhance customer interactions; 
  • Optimizing internal processes and decision-making through technology, enhancing efficiency and effectiveness across diverse industries. 

Ali Abdulla Al Sadadi, Chief of Information Technology, Ministry of Oil & Environment, Kingdom of Bahrain

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

Past Speakers

Ali Abdulla Alsadadi

Chief of Information Technology, Ministry of Oil and Environment

Jenny Tan

President, ISACA Singapore Chapter

Anil Kumar Saha

Senior Vice President, DBS Bank

Joey Fontiveros

Acting Regiment Commander, Philippines Army

Thuraya Al-Harthi

Acting Director - Government Digital Services Unified Portal, Ministry of Transport, Communications and Information Technology - Oman

Dato' Dr Amirudin Abdul Wahab

CEO, Cybersecurity Malaysia

Ivan Irawan

Director Of Information Technology, Credit Bureau Indonesia

Phoram Mehta

Senior Director, APAC CISO, PayPal

Upcoming ISMG Events

July 26, 2024

Building Agility and Resilience With Digital First, Next-Gen Connectivity, Secure by Design

July 30, 2024

Cyber Security Readiness with Splunk, Boston

August 8, 2024

Cybersecurity Summit: New Delhi

August 15, 2024

AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities

September 17, 2024

Cybersecurity Summit: London

Upcoming ISMG Events

July 26, 2024

Building Agility and Resilience With Digital First, Next-Gen Connectivity, Secure by Design

July 30, 2024

Cyber Security Readiness with Splunk, Boston

August 8, 2024

Cybersecurity Summit: New Delhi