Join us at the 9th CISO Leaders Singapore Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
8th June 2023, Marina Bay Sands Expo
& Convention Centre, Singapore
Join us at the 9th CISO Leaders Singapore Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
8th June 2023, Marina Bay Sands Expo
& Convention Centre, Singapore
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected Security IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Singapore.

 

Anti Virus

 

Network Security

 

Analytics

 

Cyber Security

 

Mobile & cloud
security

 

Identity
Management

 

Fraud
Protection

 

End Point
Security

Join us at the 9th CISO Leaders
Singapore Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
8TH JUNE 2023, MARINA BAY SANDS EXPO & CONVENTION CENTRE, SINGAPORE

Join the gathering

ABOUT THE EVENT

The upcoming 9th CISO Leaders Singapore Summit 2023 will bring together over 150 of the country’s leading CISOs, Heads of IT Security, Cyber Security and CIOs on the 8th June at the Marina Bay Sands Expo & Convention Centre, Singapore.

This years theme will be focused around 'Cybersecurity Modernisation with a Threat-Informed Defence' where we will have over 15 presentations, workshops and roundtables taking place over the day.

Our attending audience will have the opportunity to personalise their own agenda and maximise their time out of the office by engaging in only the most relevant sessions for their business.

We also invite you along to our official networking drinks where you will have the opportunity to interact and catch up with your peers in a very relaxed setting.

SPEAKERS

Mac Esmilla
plus

Mac Esmilla

Chief Information Security Officer, World Vision International

Yogesh Madaan
plus

Yogesh Madaan

Head Information & Cyber Security, Bukalapak

Andrew Milroy
plus

Andrew Milroy

Chief Research Advisor, Focus Network

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Registration, Badge Collection & Refreshments

20min

Welcome & Introduction

Tyron McGurgan, Chief Executive Officer, Focus Network

5min

Master of Ceremonies – CISO Track

Andrew Milroy, Chief Research Advisor, Focus Network

5min

Andrew Milroy

Andrew Milroy is Focus Network’s Chief Research Advisor. He is a well-known technology thought leader and speaker in the APAC region. He has [...]

Opening Keynote Presentation – Cybersecurity Modernisation with A Threat-Informed Defence

Speaker coming soon

The traditional network infrastructure model of centralised corporate data centres secured by on-premises network perimeters does not work today. Data that once resided in data centres is now in the cloud, on SaaS applications, and on endpoints.

This presentation will focus on the need for companies to transform and modernise their approach to cybersecurity, and adapt to the constantly changing threat landscape. Key takeaways will include, the benefits of a threat informed defence and the how to secure assets that sit outside the traditional network perimeter.

20min

Keynote Panel Discussion – Mitigating Ransomware Risk

Panellists TBC

Recently, we have seen a series of devastating ransomware attacks which have included attacks on critical infrastructure. We’ve also seen an increase in attacks on soft targets such as schools and hospitals.

Key discussion points in this panel will include, the reasons why the threat from ransomware is increasing and the best ways to mitigate ransomware risk.

35min

Keynote Presentation – Adopting A Zero-Trust Approach To Cybersecurity

Speaker coming soon

A zero-trust approach requires a change of focus for organisations. It requires an assumption that breaches will occur as organisations evaluate current and desired cybersecurity posture, aligned with risk appetite.

This presentation will explain how to adopt a zero-trust approach and how it can be aligned with cybersecurity policies. Key takeaways will include an understanding of how to take a zero-trust approach and the benefits of zero-trust.

20min

Networking Break

20min

One-to-One Meetings 1

30min

Roundtable Discussion 1 – Reducing Risk With Modern Identity Management.

Speaker coming soon

As digital transformation accelerates, more data and applications are being pushed out to devices and remote users. Companies need to focus on who is accessing corporate resources, from where and why. They need to understand what their data is being used for and be able to identify vulnerabilities rapidly. Improved visibility of user behaviour is critical to reduce the threats from adversaries as well as from insiders.

Key discussion points include, enabling business with IAM and managing access efficiently.

30min

Roundtable Discussion 2 – Modernising Cyber Operations With AI And ML

Speaker coming soon

SOCs are becoming overwhelmed with alerts, many of which are false positives. The modern SOC needs to fully leverage automation and AI to detect and respond to threats in the most efficient way. This roundtable with discuss how and why today’s SOCs are overwhelmed and how automating SOCs and using AI are essential.

Key discussion points will include, managing the growing number of false positives and using AI and ML to detect and respond to threats.

30min

Roundtable discussion 3 – Policy As Code And Application Security

Speaker coming soon

As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.

Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

30min

Roundtable discussion 4 – Reducing Complexity With A Cybersecurity Mesh

Speaker coming soon

Companies are struggling with increased cybersecurity complexity as they wrestle with a growing number of cybersecurity tools, typically operating independently of each other. A new approach is required where controls are integrated and policy is consistent.

This roundtable will discuss how a cybersecurity mesh can enable the centralised control of policies and the scaling of controls. It will also discuss how a cybersecurity mesh can offer greater flexibility and reliability.

30min

One-to-One Meetings 2

30min

Roundtable Discussion 5 – Reducing Risk With Modern Identity Management

Speaker coming soon

As digital transformation accelerates, more data and applications are being pushed out to devices and remote users. Companies need to focus on who is accessing corporate resources, from where and why. They need to understand what their data is being used for and be able to identify vulnerabilities rapidly. Improved visibility of user behaviour is critical to reduce the threats from adversaries as well as from insiders.

Key discussion points include, enabling business with IAM and managing access efficiently.

30min

Roundtable Discussion 6 – Modernising Cyber Operations With AI And ML

Speaker coming soon

SOCs are becoming overwhelmed with alerts, many of which are false positives. The modern SOC needs to fully leverage automation and AI to detect and respond to threats in the most efficient way. This roundtable with discuss how and why today’s SOCs are overwhelmed and how automating SOCs and using AI are essential.

Key discussion points will include, managing the growing number of false positives and using AI and ML to detect and respond to threats.

30min

Roundtable discussion 7 – Policy As Code And Application Security

Speaker coming soon

As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.

Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

30min

Roundtable discussion 8 – Reducing Complexity With A Cybersecurity Mesh

Speaker coming soon

Companies are struggling with increased cybersecurity complexity as they wrestle with a growing number of cybersecurity tools, typically operating independently of each other. A new approach is required where controls are integrated and policy is consistent.

This roundtable will discuss how a cybersecurity mesh can enable the centralised control of policies and the scaling of controls. It will also discuss how a cybersecurity mesh can offer greater flexibility and reliability.

30min

Speaking Presentation – Chain Of Vulnerabilities – Detecting and Responding To Supply Chain Threats.

Speaker coming soon

Recent supply chain attacks highlight the severe downstream consequences when a technology vendor is compromised. Supply chain attacks are increasingly being used as a vehicle for the most sophisticated and damaging attacks.

This presentation will highlight the vulnerabilities that are present in today’s supply chains. It will then discuss rapid detection and mitigation of supply chain attacks.

Key takeaways will include an understanding of supply chain vulnerabilities and ways to mitigate supply chain threats.

20min

Speaking Presentation – The New Threat Landscape: The Cyber Physical World

Speaker coming soon

Attacks on critical infrastructure have highlighted the vulnerabilities that emerge as operational technology converges with information technology. Greater digitalisation of the physical world combined with edge computing and new IoT technologies are accelerating the pace of this convergence.

This presentation will discuss the blending of information technology with operational technology and the new threats that this brings, particularly with reference to critical infrastructure.

Key takeaways will include an explanation of the types of vulnerabilities that operational technology presents and the best practices in mitigating the risk of attacks on operational technology.

20min

Networking Lunch

40min

Speaking Presentation: Shifting Left: Cloud Native DevSecOps

Speaker coming soon

Baking security into code is critical for securing applications. To do this effectively, DevOps teams also need to work with security teams.

This presentation will discuss the importance of baking security into code and best practices in ‘shifting left’. 

Key discussion points will include, 

  • The importance of DevSecOps and 
  • DevSecOps use cases.

20min

One-to-One Meetings 3

30min

Delegate Workshop 1: Moving Beyond Prevention To Proactive Defence

Mac Esmilla, Chief Information Security Officer, World Vision International

Too many companies focus purely on preventing all breaches and assume that all company resources remain inside corporate firewalls. As remote working and the use of multiple clouds becomes normal, this approach has become outdated.

Key discussion points in this roundtable include how companies need to move beyond a traditional preventive ‘castle and moat’ approach to cybersecurity, and how they can take a much more proactive approach.

Active Response as Your Enterprise’s Default Defence Posture

CISOs are drowning in security alerts as more security tools generate more alerts and a more disparate view of enterprise security. Advanced cybersecurity requires an active response. Simply knowing that a threat exists is not enough. You must be able to respond. When an organization is facing “alert fatigue,” complacency sets in and security suffers. Without the ability to seamlessly assess, respond to and resolve the ever-growing number of alerts, the investment in cybersecurity technologies is wasted. This roundtable will discuss components that are critical to active response in defending your enterprise.


30min

Mac Esmilla

Mac is based in Singapore and currently serves as CISO at World Vision International (WVI). Mac is part of the elite group of information [...]

One-to-One Meetings 4

30min

Delegate Workshop 2: Shared Responsibility In The Cloud

Speaker coming soon

Confusion remains around the segregation of responsibilities for cloud security. This leads to unnecessary vulnerabilities and potentially devastating attacks.

Key discussion point in this roundtable are the elements of cybersecurity that are typically addressed by cloud service providers and the elements which must be managed by the customer.

30min

Networking Break

15min

Speaking Presentation – Enforcing Policy Control With A Secure Service Edge (SSE) Platform.

Speaker coming soon

The Secure Access Service Edge (SASE) approach to cybersecurity has given way to SSE. SSE accommodates changing working patterns and wider cloud usage.

Key takeaways from this presentation will include the importance of SSE platforms as remote working and cloud usage become more widespread and the importance of integrating multiple cloud cybersecurity services in the cloud.

20min

Keynote Panel Presentation – Becoming The Hunter Instead Of The Hunted With Threat Intelligence, AI and Automation

Panellists:
Yogesh Madaan, Head Information & Cyber Security, Bukalapak
Moderator:
coming soon

Organisations need to take a forward-leaning proactive approach to cybersecurity. They need to minimise attacks by identifying them and responding to them before any damage is caused. Threat hunting requires the use of automation and AI to be effective. It also needs access to the best sources of threat intelligence.

This panel will discuss best practices in threat hunting and how companies can become the hunters instead of being the hunted.


35min

Yogesh Madaan

Yogesh is the Head Information and Cyber Security/CISO at Bukalapak. He is a seasoned technology leader with 18+ years of experience in [...]

Closing Keynote Presentation: Building Resilience With Defence-In-Depth

Speaker coming soon

No company can eliminate all breaches. Instead, companies can focus on mitigating risk by minimising the damage and breach can cause. Increasingly, companies are implementing multiple layers of controls.

Key takeaways from this presentation will be the need for multiple complementary controls to manage risk and how a defence in depth approach can be implemented.

20min

Closing Remarks From The Chair And End Of The Forum

Andrew Milroy, Chief Research Advisory, Focus Network

5min

Andrew Milroy

Andrew Milroy is Focus Network’s Chief Research Advisor. He is a well-known technology thought leader and speaker in the APAC region. He has [...]

Networking Drinks

60min

WHY ATTEND

STAR KEYNOTES
AND PRESENTERS

We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

NETWORKING
OPPORTUNITIES

Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

1-1 PRIVATE
MEETINGS

Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.

TARGETED
SESSIONS

Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.

NETWORKING
LUNCH

Interact and relax amongst your peers at the Networking lunch where you will have the opportunity to be part of the entertainment.

PERSONALISED
PROGRAM

The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

REGISTER YOUR INTEREST

PURCHASE TICKETS

Should you wish to attend this years upcoming 9th CISO Leaders Summit Singapore on the 8th of June 2023, please purchase your tickets below

1 Ticket

USD $1990

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
Group Ticket (2 - 4)

USD $1790

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
GROUP TICKETS (5+)

USD $1470

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW

LATEST NEWS

Trends in Cybersecurity – Andrew Milroy

Andrew Milroy, Founder, Veqtor8 APAC organisations are increasingly vulnerable to cybersecurity attacks. As digital transformation accelerates, […]

Data Strategy: Approaches to Drive Cohesive Digital Transformation – Kshitij Mulay

Kshitij Mulay, Chief Information Officer – Global SK-II (Prestige Beauty), Procter & Gamble This presentation covered: The why, what and […]

Risk, Visibility & Protection in a Distributed World – Justin Ong

Justin Ong, APAC CISO, Panasonic Asia Pacific Pte. Ltd. Cybersecurity attacks are like COVID-19, they are becoming much more […]

Modernize to maximum with cloud adoption in enterprise organization – Jia Yee Low

Jia Yee Low, Chief Technology Officer, Kenanga Investment Bank This presentation focused on: How organizations transform from legacy to cloud […]

Meet leading IT Security executives from Singapore's strongest brands.

Interact and engage with some of the strongest and most powerful brands from across Singapore.

'This Summit gave me direct contact with some of the key presenters and vendors. There is a good balance between keynotes, panel discussions and one to one meetings. It was not overloaded, giving ample opportunity to spend time networking.'

 

– SINGAPORE SPORTSHUB

'My favourite thing about this event was the balanced mix of events – speakers, panels, one to ones and think tanks. The topics were interesting and the speakers great. The one on ones provided a pulse on what is happening in the space. And finally I thoroughly enjoyed the networking opportunities with my CIO peers.'

 

– OGILVYONE

'This event was excellent! We all enjoyed getting to network with one another and meeting one to one with vendors. I found many of the keynote topics interesting and valuable also as they provided me with insightful information on applying technologies to address challenges.'

 

– ASCENDAS

“This is one of the better events that I've been to in terms of the content. There's been a good amount of challenge sharing and practical examples that I was able to connect to. I've had conversations that I will follow up on and have already scheduled a catch up for next week from one of my one to one meetings.”

 

– OLAM INTERNATIONAL

DIAMOND SPONSORS

PLATINUM SPONSOR

GOLD SPONSORS

SILVER SPONSORS

BECOME A SPONSOR

OUR PARTNERS


Marina Bay Sands Expo & Convention Centre
10 Bayfront Ave, Singapore 018956
Telephone: +65 6688 8888
Email: sales@marinabaysands.com

More Information
Copyright 2022 ©Focus Network. All rights reserved