Join us at the CISO Leaders Malaysia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
13th July 2023, InterContinental Kuala Lumpur
Join us at the CISO Leaders Malaysia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
13th July 2023, InterContinental Kuala Lumpur
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected Security IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Malaysia.

 

Anti Virus

 

Network Security

 

Analytics

 

Cyber Security

 

Mobile & cloud
security

 

Identity
Management

 

Fraud
Protection

 

End Point
Security

Join us at the CISO Leaders
Malaysia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
13TH JULY 2023, INTERCONTINENTAL KUALA LUMPUR

Join the gathering

ABOUT THE EVENT

The upcoming CISO Leaders Malaysia Summit 2023 will bring together over 120 of the country’s leading CISOs, Heads of IT Security, Cyber Security and CIOs on the 13th of July, at InterContinental Kuala Lumpur, Malaysia.

This years theme will be focused around “Cybersecurity Modernisation with a Threat-Informed Defence” where we will have over 15 presentations, workshops and roundtables taking place over the day.

Our attending audience will have the opportunity to personalise their own agenda and maximise their time out of the office by engaging in only the most relevant sessions for their business.

We also invite you along to our official networking drinks where you will have the opportunity to interact and catch up with your peers in a very relaxed setting.

SPEAKERS

Dato’ Ts. Dr Haji Amirudin
plus

Dato’ Ts. Dr Haji Amirudin

Chief Executive Officer, Cybersecurity Malaysia

Kevin Gerard
plus

Kevin Gerard

Chief Information Security Officer, Bursa Malaysia

Eddie Hau Lian Hong
plus

Eddie Hau Lian Hong

Chief Information Security Officer, Sunway Group

Dr. Ismamuradi Abdul Kadir
plus

Dr. Ismamuradi Abdul Kadir

Chief Information Security Officer, Bank Muamalat Malaysia Berhad

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Registration, Badge Collection & Refreshments

45min

Welcome & Introduction

Tyron McGurgan, Chief Executive Officer, Focus Network

5min

Tyron McGurgan

Tyron McGurgan is an accomplished entrepreneur, media specialist, and events professional with over 17 years of experience in the industry. He is [...]

Master of Ceremonies

Andrew Milroy, Chief Research Advisor, Focus Network

5min

Andrew Milroy

Andrew Milroy is Focus Network’s Chief Research Advisor. He is a well-known technology thought leader and speaker in the APAC region. He has [...]

Opening Keynote Presentation – Cybersecurity Modernisation with A Threat-Informed Defence

The traditional network infrastructure model of centralised corporate data centres secured by on-premises network perimeters does not work today. Data that once resided in data centres is now in the cloud, on SaaS applications, and on endpoints.

 

This presentation will focus on the need for companies to transform and modernise their approach to cybersecurity, and adapt to the constantly changing threat landscape. Key takeaways will include, the benefits of a threat informed defence and the how to secure assets that sit outside the traditional network perimeter.

 

20min

Keynote Panel Discussion – Mitigating Ransomware Risk

Panellists:
Kevin Gerard, Chief Information Security Officer, Bursa Malaysia
Razman Zaki, Chief Information Security Officer, MISC Berhad
Jasmine Goh, Head, Digital Security, Employees Provident Fund
Yuwanthiran Sukalingam, Head, Cybersecurity & IT Service Operations, Carsome

Recently, we have seen a series of devastating ransomware attacks which have included attacks on critical infrastructure. We’ve also seen an increase in attacks on soft targets such as schools and hospitals.

 

Key discussion points in this panel will include, the reasons why the threat from ransomware is increasing and the best ways to mitigate ransomware risk.

35min

Kevin Gerard

Bio coming [...]

Razman Zaki

Razman has more than 25 years of experience in Information Technology. His domain of expertise ranges from “practical” digital and business [...]

Jasmine Goh

Jasmine is currently the Head of Digital Security for EPF. She has over 20 years of extensive industry experience in Information Security, [...]

Yuwanthiran Sukalingam

A dynamic Information Security Leader with a strong background in Defense-in-Depth application, Information security risk management, and [...]

Keynote Presentation – Adopting A Zero-Trust Approach To Cybersecurity

A zero-trust approach requires a change of focus for organisations. It requires an assumption that breaches will occur as organisations evaluate current and desired cybersecurity posture, aligned with risk appetite.

 

This presentation will explain how to adopt a zero-trust approach and how it can be aligned with cybersecurity policies. Key takeaways will include an understanding of how to take a zero-trust approach and the benefits of zero-trust.

   

20min

Networking Break

15min

Roundtable Discussion – Reducing Risk With Modern Identity Management

As digital transformation accelerates, more data and applications are being pushed out to devices and remote users. Companies need to focus on who is accessing corporate resources, from where and why. They need to understand what their data is being used for and be able to identify vulnerabilities rapidly. Improved visibility of user behaviour is critical to reduce the threats from adversaries as well as from insiders.

 

Key discussion points include, enabling business with IAM and managing access efficiently.

30min

Roundtable Discussion – Modernising Cyber Operations With AI And ML

SOCs are becoming overwhelmed with alerts, many of which are false positives. The modern SOC needs to fully leverage automation and AI to detect and respond to threats in the most efficient way. This roundtable with discuss how and why today’s SOCs are overwhelmed and how automating SOCs and using AI are essential.

 

Key discussion points will include, managing the growing number of false positives and using AI and ML to detect and respond to threats.

30min

Roundtable Discussion – Policy As Code And Application Security

As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.

 

Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

30min

Roundtable Discussion – Reducing Complexity With A Cybersecurity Mesh

Companies are struggling with increased cybersecurity complexity as they wrestle with a growing number of cybersecurity tools, typically operating independently of each other. A new approach is required where controls are integrated and policy is consistent.

 

This roundtable will discuss how a cybersecurity mesh can enable the centralised control of policies and the scaling of controls. It will also discuss how a cybersecurity mesh can offer greater flexibility and reliability.

   

30min

Roundtable Discussion – Reducing Risk With Modern Identity Management

As digital transformation accelerates, more data and applications are being pushed out to devices and remote users. Companies need to focus on who is accessing corporate resources, from where and why. They need to understand what their data is being used for and be able to identify vulnerabilities rapidly. Improved visibility of user behaviour is critical to reduce the threats from adversaries as well as from insiders.

 

Key discussion points include, enabling business with IAM and managing access efficiently.

30min

Roundtable Discussion – Modernising Cyber Operations With AI And ML

SOCs are becoming overwhelmed with alerts, many of which are false positives. The modern SOC needs to fully leverage automation and AI to detect and respond to threats in the most efficient way. This roundtable with discuss how and why today’s SOCs are overwhelmed and how automating SOCs and using AI are essential.

 

Key discussion points will include, managing the growing number of false positives and using AI and ML to detect and respond to threats.

30min

Roundtable Discussion – Policy As Code And Application Security

As companies start to embrace DevSecOps, developers will increasingly act as policy enforcers by building policy into code. Security by design will become more common as security programs align with DevOps to provide the automation required to secure complex technology environments. Developers will start to see baking security into code, not as an inconvenience, but as a critical part of creating new applications rapidly.

 

Key discussion points will include best practices in DevSecOps and embedding cybersecurity policies into code.

30min

Roundtable Discussion – Reducing Complexity With A Cybersecurity Mesh

Companies are struggling with increased cybersecurity complexity as they wrestle with a growing number of cybersecurity tools, typically operating independently of each other. A new approach is required where controls are integrated and policy is consistent.

 

This roundtable will discuss how a cybersecurity mesh can enable the centralised control of policies and the scaling of controls. It will also discuss how a cybersecurity mesh can offer greater flexibility and reliability.

   

30min

Speaking Presentation – Fostering Cybersecurity Culture For Conglomerates

Eddie Hau Lian Hong, Chief Information Security Officer, Sunway Group

There are many organisations throughout the world are shifting to the hybrid working model and adopting cloud solutions at a rapid pace. At the same time, the surge of simple and sophisticated cyberattacks which not a surprise cybersecurity have been identified as one of the top priority for businesses to adopt and protect themselves.

While there is clearly a need for cybersecurity strategies, but at the same time it’s important to understand that leaders must proactively invest in fostering a cybersecurity culture across the organisation.

Having a top management leadership that is well prepared, willing to engage their employees is the first step in adopting an effective cybersecurity culture. This is foundational to helping to merge both the concept of security and user behaviour across the businesses.

20min

Eddie Hau Lian Hong

Eddie is the CISO of Sunway Group and has over 20 years experience in the areas of technical infrastructure, cloud computing and cybersecurity. [...]

Speaking Presentation – Shifting Left: Cloud Native DevSecOps

  Banking security into code is critical for securing applications. To do this effectively, DevOps teams also need to work with security teams. This presentation will discuss the importance of baking security into code and best practices in ‘shifting left’. Key discussion points will include,

  • The importance of DevSecOps and
  • DevSecOps use cases.

20min

Speaking Presentation – The New Threat Landscape: The Cyber Physical World.

Attacks on critical infrastructure have highlighted the vulnerabilities that emerge as operational technology converges with information technology. Greater digitalisation of the physical world combined with edge computing and new IoT technologies are accelerating the pace of this convergence. This presentation will discuss the blending of information technology with operational technology and the new threats that this brings, particularly with reference to critical infrastructure. 

 

Key takeaways will include an explanation of the types of vulnerabilities that operational technology presents and the best practices in mitigating the risk of attacks on operational technology.

 

20min

Networking Lunch

40min

Keynote Presentation – Powering Human Centric Employee Performance and Productivity

The pandemic experience and changing labour market has reset work norms, while often distracting leaders from the fundamentals of productivity.

This session will provide CIOs clarity of the human-centric work practices that make IT employees more productive and high-performing.

20min

Speaking Session – Moving Beyond Prevention To Proactive Defence.

Too many companies focus purely on preventing all breaches and assume that all company resources remain inside corporate firewalls. As remote working and the use of multiple clouds becomes normal, this approach has become outdated.

 

Key discussion points in this roundtable include how companies need to move beyond a traditional preventive ‘castle and moat’ approach to cybersecurity, and how they can take a much more proactive approach.

30min

Speaking Session – Shared Responsibility In The Cloud

Confusion remains around the segregation of responsibilities for cloud security. This leads to unnecessary vulnerabilities and potentially devastating attacks.

 

Key discussion point in this roundtable are the elements of cybersecurity that are typically addressed by cloud service providers and the elements which must be managed by the customer.

   

30min

Networking Break

15min

Speaking Presentation – Enforcing Policy Control With A Secure Service Edge (SSE) Platform

The Secure Access Service Edge (SASE) approach to cybersecurity has given way to SSE. SSE accommodates changing working patterns and wider cloud usage.

 

Key takeaways from this presentation will include the importance of SSE platforms as remote working and cloud usage become more widespread and the importance of integrating multiple cloud cybersecurity services in the cloud.

20min

Keynote Panel Discussion – Becoming The Hunter Instead Of The Hunted With Threat Intelligence, AI and Automation

Panellist:
Dr. Ismamuradi Abdul Kadir, Chief Information Security Officer, Bank Muamalat Malaysia Berhad

Organisations need to take a forward-leaning proactive approach to cybersecurity. They need to minimise attacks by identifying them and responding to them before any damage is caused. Threat hunting requires the use of automation and AI to be effective.  It also needs access to the best sources of threat intelligence.

 

This panel will discuss best practices in threat hunting and how companies can become the hunters instead of being the hunted.

30min

Dr. Ismamuradi Abdul Kadir

  With over 22 years of experience and skillset in the field of Cybersecurity, Information Communication & Technology, Strategist, [...]

Closing Keynote Presentation – Building Resilience With Defence-In-Depth

Dato' Ts. Dr Haji Amirudin Abdul Wahab, Chief Executive Officer, Cybersecurity Malaysia

No company can eliminate all breaches. Instead, companies can focus on mitigating risk by minimising the damage and breach can cause. Increasingly, companies are implementing multiple layers of controls.

 

Key takeaways from this presentation will be the need for multiple complementary controls to manage risk and how a defence in depth approach can be implemented.

20min

Dato’ Ts. Dr Haji Amirudin

    DATO' Ts. DR HAJI AMIRUDIN ABDUL WAHAB FASc (“Dato’ Ts. Dr. Amir”) is the Chief Executive Officer of CyberSecurity [...]

Closing Remarks From The Chair And End Of The Forum

Andrew Milroy, Chief Research Advisor, Focus Network

5min

Networking Drinks

60min

WHY ATTEND

STAR KEYNOTES
AND PRESENTERS

We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

NETWORKING
OPPORTUNITIES

Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

1-1 PRIVATE
MEETINGS

Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.

TARGETED
SESSIONS

Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.

NETWORKING
LUNCH

Interact and relax amongst your peers at the Networking lunch where you will have the opportunity to be part of the entertainment.

PERSONALISED
PROGRAM

The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

REGISTER YOUR INTEREST

PURCHASE TICKETS

Should you wish to attend this years upcoming CISO Leaders Summit Malaysia on the 13th of July 2023, please purchase your tickets below

1 Ticket

USD $1990

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
Group Ticket (2 - 4)

USD $1790

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
GROUP TICKETS (5+)

USD $1470

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW

Meet leading IT executives from Malaysia's strongest brands.

Interact and engage with some of the strongest and most powerful brands from across the country.

''Great event !!! Always looking forward to the next one. Well done to the Speakers and organizers! Very professionally done…'

 

– EMERY OLEOCHEMICALS

'Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I've been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can't tell you how refreshing that is after the dealings we've had with several other event/conference providers across APAC.'

 

– GENESYS

'Overall great experience meeting all the CIO’s and having the chance to talk and understand current ongoing topics within their environment'

 

– ALLIANZ PARTNERS

“This is one of the better events that I've been to in terms of the content. There's been a good amount of challenge sharing and practical examples that I was able to connect to. I've had conversations that I will follow up on and have already scheduled a catch up for next week from one of my one to one meetings.”

 

– OLAM INTERNATIONAL

PLATINUM SPONSOR

BECOME A SPONSOR

OUR PARTNERS

InterContinental Kuala Lumpur
165 Jalan Ampang, 50450 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur, Malaysia
Telephone: +60 3 2782 6000
Website: Click here

More Information
Copyright 2023 ©Focus Network. All rights reserved