
8:15 am - 8:45 am

Registration & Exhibit Browsing

Managing Editor, Asia & the Middle East, ISMG
ISMG, a global industry leader in information security news will host the first edition of 2021 South East Asia virtual summit series on February 23-24, 2021. With the ongoing pandemic, cybersecurity professionals have been stretched plenty, for enhancing corporate agility and also reduce risk, to ensure resilience. As the region witnessed a meteoric rise in online fraud, phishing scams in 2020, CISOs are expected to rethink security and risk strategies in 2021.
Join our summit to gain insight from the Cybersecurity Thought Leaders on the myths and realities about deploying new frameworks, applying lessons learned, and think strategically, moving beyond the assumption that a bigger team is the best way to respond to increased risk.
23 and 24 February at 9 am SGT
Speaker:
Shane Read, Group CISO, Noble Group (Hong Kong)
COVID-19 has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation?
Enterprises consider 2021 to be the decade of digital trust as the CISOs expect cybersecurity to have a tremendous impact on the nation's critical infrastructure.
This exclusive keynote session describes:
Speaker:
Dr. Amirudin Wahab, Chief Executive Officer, CyberSecurity Malaysia
The year 2021 will see an increase in organized cybercrime activities, APTs, and ransomware attacks targeted at the critical infrastructure organizations across South East Asia. Also, the remote workforce. Economic stress. Pandemic fatigue has made created a "perfect storm" for an increase in security breach risks. What can you do to improve monitoring, detection, and mitigation of the risks in these unique conditions?
This exclusive session details:
Speaker:
Kunal Jha, Senior Director Application Delivery and Security, APJ, Citrix
For years, playing whack-a-mole with security threats has been the only way to keep attackers at bay. With specialized solutions suited to every flavor of attack out there, cybersecurity has become capital intensive and increasingly complex. But what if, instead of ‘mole-whacking’ vector-based defense, IT could cover up the holes from which they tend to pop up? Why not use precious resources, protecting only the assets that need to be protected and cast aside what doesn’t?
The ‘zero trust’ approach can help you deliver the security promise.
The session will discuss:
Speaker:
Gary Gardiner, Head of Security Engineering, APAC, Check Point
Check Point’s white hat research team which has discovered the existing malware out in the wild and also the’zero-day vulnerabilities discusses use cases around how organizations with responsible disclosure can further secure networks and devices.
It is imperative for organizations to under what the threat actors are doing in real-time.
The session discusses:
Speaker:
Yuko Miyahara, Commercial Team Lead, Darktrace
The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.
The session discusses:
Speaker:
Hywel Morgan, Manager, System Engineering, ASEAN & Korea, Sophos
Historically, cybersecurity has focused on protection, preventing threats exploiting weaknesses within an organization. This is changing as organisations accept that due to gaps in defences allied with the attack's sophistication, threats will enter your organization and often remain undetected for weeks or months, exfiltrating data and moving across your assets. Businesses are increasingly focusing on threat detection and response to address this risk.
In this ever-evolving landscape, it is imperative to understand the right threat detection and response approach for your organisation; is it the Endpoint Detection and Response (EDR), or Extended Detection and Response (XDR) or Managed Detection and Response (MDR), and what are next-generation defences required.
The session will discuss:
Speaker:
Joshua Foo, Regional Director, South Asia, Hong Kong and Taiwan, Chainalysis
Covid-19 had a major impact on cryptocurrency activity, both legal and illegal, resulting in record breaking ransomware attacks seen around the world. As the pandemic raged, cybercriminals took advantage of new extortion tactics, with victim payments rising over 500% compared to 2019. Join us as we break down the ransomware ecosystem and show how surprisingly few cybercriminals enable such massive destruction.
What are the main components of the ransomware ecosystem? Is there a way to mitigate the risks posed by these attacks?
This session discusses how blockchain analysis can help your organization:
Speaker:
Abid Adam, Group Chief Information Security Officer & Group Head of Privacy, Axiata, Malaysia
While corporate strategies around digital transformation drive good business outcomes, cybersecurity threats are amplified by the ongoing pandemic and the emergence of new technologies such as IoT and cloud momentum. How can security leaders avoid obstacles and become catalysts for change and deliver business value and mitigate risks arising from this digital transformation? How can they ensure security and privacy in their digital transformation journey, and what are the various aspects that need to be kept in mind to ensure business continuity.
This session discusses CISOs role:
Speaker:
Mark Johnston, Head of Security, Customer Engineering, Google Cloud APAC, Google
Enterprises traditionally used on-premises IAM software to manage identity and access policies. With companies adopting cloud services, the process of managing identities is getting more complicated. Therefore, adopting cloud IAM solutions becomes a logical step. However, mapping single sign-on users and IAM roles can become challenging as users can have multiple functions that span several cloud accounts.
The session will discuss:
Speaker:
AJ Eserjose, Regional Director, OT-ISAC (Operational Technology Information Sharing and Analysis Center)
Asset owners and operators are experiencing a convergence of IT and OT in this era of digital transformation, which is resulting in increased cyber risk to industrial control systems. Legacy ICS components are not designed to embrace this digital transformation and the heightened liability that accompanies it.
It has become imperative to redefine security architecture to build and improve the cyber resiliency of ICS in this connected world, and equip teams and systems to prevent or respond to sophisticated threats and actors now taking advantage of this new environment.
The session discusses:
Speaker:
Nathanael Iversen, Chief Evangelist, Illumio
As organizations pursue a new generation of infrastructure with SDN and cloud, business is primed to move and shift faster than ever, but speed without security is simply a risk multiplier. It is vital to learn how global organizations have operationalized a simple, fast, and safe segmentation strategy to secure agile, dynamic, and complex environments and stop the lateral movement of threats. What would be the security and risk outcomes and the role of micro-segmentation in building the ‘zero trust’ framework? An insight into the lessons learned from segmenting over 1 million workloads.
The session will discuss:
Speaker:
Clive Finlay, Chief Technology Officer, APJ & EMEA, Symantec Enterprise Division, Broadcom
Throughout 2020 organizations widely adopted a zero trust architecture in response to the pandemic and it is now fast replacing traditional VPN approaches. As the zero trust approach continues to evolve, the challenge for organizations in 2021 and beyond lies in how to implement this approach across environments, both in the cloud and on-premise.
This session will discuss:
Speaker:
Neil Campbell, Vice President, APJ, Rapid 7
Fixing a breach is far more costly than prevention. Organizations are under pressure to respond to it faster. More often than not, though, it can be weeks or months before you’ve even realized that you’ve suffered one.
The session will discuss:
Speaker:
Karunanand Menon, Senior Sales Engineer, APAC - Sales Engineering, Okta
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use daily.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, but they are also expensive and offer a poor user experience. Is there a better way to protect your applications and prevent account takeover incidents?
The session will discuss:
Speaker:
Rich Thompson, VP, Global Sales Engineering, BlackBerry
When it comes to enterprise security, Zero Trust is a concept that is becoming popular. More of a philosophy than a set of procedures, Zero Trust requires a deeper discussion and look at security. Is it practical for every one? Should Zero Trust be a priority? Why does it matter? What are the challenges? What is important? What about IoT? What role does our current security program play?
This session will explore the important questions about whether Zero Trust should be a priority for your organization and touches on the role of users and devices, environment and network. We will discuss the approaches and challenges with Zero Trust, addressing business drivers such as cloud environments and business continuity needs.
Speaker:
Lee Dolsen, Chief Architect, Asia Pacific & Japan, Zscaler
The IT and security heads are challenged from time to time about keeping the systems up and running, with availability and cyber resilience paramount. Breaking the kill chain is critical to understand in securing the environment. How can a ‘zero trust’ architecture be used in building this network and security transformation in a cloud-ready environment?
The session discusses:
Speaker:
Jonathan Andresen, Senior Director, Marketing & Products, Asia Pacific & Japan, Bitglass
Network security architectural best practices are undergoing a dramatic shift. Two prominent IT security trends have dominated InfoSec discussions during this ongoing pandemic: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE). In practical terms, which is more important, what is the relationship between them, and how will they improve cybersecurity effectiveness?
As security teams prepare for either a return to the office or a more distributed workforce and as cyber threats continue to proliferate, IT teams must understand the differences between these two essential security paradigms.
The session will discuss:
Speaker:
Eric Lam, Director for Security Solutions, Microsoft Asia Pacific
The recent cyberattacks have shown increased sophistication in the breadth of tactics used to penetrate, expand across, and persist in affected infrastructure. They have posed a serious threat to every organization. While the tactics, techniques, and procedures (TTPs) that the bad actors utilized are not new to defenders, we have also come to realize that many organizations have once again been caught unprepared.
Companies should start or continue to adopt a ‘zero trust’ mentality across their environment to defend against such attacks. A ‘zero trust’ mindset creates a more resilient, consistent, and responsive posture to new incidents. It helps address gaps in unprotected devices, weak passwords, and gaps in multi-factor authentication (MFA) coverage that attackers can exploit.
The session will discuss:
How to strategize and see security in a new light amidst new challenges. The emergence of technologies such as IoT, skill shortage, insider threats, and cloud movement has posed the most significant risks for enterprises in the current times, which are amplified by increasing phishing attacks, targeted attacks, disruption, distortion, and deterioration.
A panel of experts discuss:
The popular SolarWinds hack, the supply chain attack that implanted a backdoor in the Orion network monitoring software pushed to 18,000 of the firm's customers, is considered to be potentially the most significant intrusion in our history.
The campaign's full scale, including all of the tactics, techniques and procedures being used by attackers remaining unknown, has left most enterprises across the regions in a state of shock.
What are the lessons the CISOs need to learn from this attack? Do you have a process to evaluate your vendor's security policies and frameworks?
The panel will discuss:
Speaker:
Shane Read, Group CISO, Noble Group (Hong Kong)
COVID-19 has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation?
Enterprises consider 2021 to be the decade of digital trust as the CISOs expect cybersecurity to have a tremendous impact on the nation's critical infrastructure.
This exclusive keynote session describes:
Speaker:
Dr. Amirudin Wahab, Chief Executive Officer, CyberSecurity Malaysia
The year 2021 will see an increase in organized cybercrime activities, APTs, and ransomware attacks targeted at the critical infrastructure organizations across South East Asia. Also, the remote workforce. Economic stress. Pandemic fatigue has made created a "perfect storm" for an increase in security breach risks. What can you do to improve monitoring, detection, and mitigation of the risks in these unique conditions?
This exclusive session details:
Speaker:
Kunal Jha, Senior Director Application Delivery and Security, APJ, Citrix
For years, playing whack-a-mole with security threats has been the only way to keep attackers at bay. With specialized solutions suited to every flavor of attack out there, cybersecurity has become capital intensive and increasingly complex. But what if, instead of ‘mole-whacking’ vector-based defense, IT could cover up the holes from which they tend to pop up? Why not use precious resources, protecting only the assets that need to be protected and cast aside what doesn’t?
The ‘zero trust’ approach can help you deliver the security promise.
The session will discuss:
Speaker:
Gary Gardiner, Head of Security Engineering, APAC, Check Point
Check Point’s white hat research team which has discovered the existing malware out in the wild and also the’zero-day vulnerabilities discusses use cases around how organizations with responsible disclosure can further secure networks and devices.
It is imperative for organizations to under what the threat actors are doing in real-time.
The session discusses:
Speaker:
Yuko Miyahara, Commercial Team Lead, Darktrace
The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.
The session discusses:
Speaker:
Hywel Morgan, Manager, System Engineering, ASEAN & Korea, Sophos
Historically, cybersecurity has focused on protection, preventing threats exploiting weaknesses within an organization. This is changing as organisations accept that due to gaps in defences allied with the attack's sophistication, threats will enter your organization and often remain undetected for weeks or months, exfiltrating data and moving across your assets. Businesses are increasingly focusing on threat detection and response to address this risk.
In this ever-evolving landscape, it is imperative to understand the right threat detection and response approach for your organisation; is it the Endpoint Detection and Response (EDR), or Extended Detection and Response (XDR) or Managed Detection and Response (MDR), and what are next-generation defences required.
The session will discuss:
Speaker:
Joshua Foo, Regional Director, South Asia, Hong Kong and Taiwan, Chainalysis
Covid-19 had a major impact on cryptocurrency activity, both legal and illegal, resulting in record breaking ransomware attacks seen around the world. As the pandemic raged, cybercriminals took advantage of new extortion tactics, with victim payments rising over 500% compared to 2019. Join us as we break down the ransomware ecosystem and show how surprisingly few cybercriminals enable such massive destruction.
What are the main components of the ransomware ecosystem? Is there a way to mitigate the risks posed by these attacks?
This session discusses how blockchain analysis can help your organization:
Speaker:
Abid Adam, Group Chief Information Security Officer & Group Head of Privacy, Axiata, Malaysia
While corporate strategies around digital transformation drive good business outcomes, cybersecurity threats are amplified by the ongoing pandemic and the emergence of new technologies such as IoT and cloud momentum. How can security leaders avoid obstacles and become catalysts for change and deliver business value and mitigate risks arising from this digital transformation? How can they ensure security and privacy in their digital transformation journey, and what are the various aspects that need to be kept in mind to ensure business continuity.
This session discusses CISOs role:
Speaker:
Mark Johnston, Head of Security, Customer Engineering, Google Cloud APAC, Google
Enterprises traditionally used on-premises IAM software to manage identity and access policies. With companies adopting cloud services, the process of managing identities is getting more complicated. Therefore, adopting cloud IAM solutions becomes a logical step. However, mapping single sign-on users and IAM roles can become challenging as users can have multiple functions that span several cloud accounts.
The session will discuss:
Speaker:
AJ Eserjose, Regional Director, OT-ISAC (Operational Technology Information Sharing and Analysis Center)
Asset owners and operators are experiencing a convergence of IT and OT in this era of digital transformation, which is resulting in increased cyber risk to industrial control systems. Legacy ICS components are not designed to embrace this digital transformation and the heightened liability that accompanies it.
It has become imperative to redefine security architecture to build and improve the cyber resiliency of ICS in this connected world, and equip teams and systems to prevent or respond to sophisticated threats and actors now taking advantage of this new environment.
The session discusses:
Speaker:
Nathanael Iversen, Chief Evangelist, Illumio
As organizations pursue a new generation of infrastructure with SDN and cloud, business is primed to move and shift faster than ever, but speed without security is simply a risk multiplier. It is vital to learn how global organizations have operationalized a simple, fast, and safe segmentation strategy to secure agile, dynamic, and complex environments and stop the lateral movement of threats. What would be the security and risk outcomes and the role of micro-segmentation in building the ‘zero trust’ framework? An insight into the lessons learned from segmenting over 1 million workloads.
The session will discuss:
Speaker:
Clive Finlay, Chief Technology Officer, APJ & EMEA, Symantec Enterprise Division, Broadcom
Throughout 2020 organizations widely adopted a zero trust architecture in response to the pandemic and it is now fast replacing traditional VPN approaches. As the zero trust approach continues to evolve, the challenge for organizations in 2021 and beyond lies in how to implement this approach across environments, both in the cloud and on-premise.
This session will discuss:
Speaker:
Neil Campbell, Vice President, APJ, Rapid 7
Fixing a breach is far more costly than prevention. Organizations are under pressure to respond to it faster. More often than not, though, it can be weeks or months before you’ve even realized that you’ve suffered one.
The session will discuss:
Speaker:
Karunanand Menon, Senior Sales Engineer, APAC - Sales Engineering, Okta
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use daily.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, but they are also expensive and offer a poor user experience. Is there a better way to protect your applications and prevent account takeover incidents?
The session will discuss:
Speaker:
Rich Thompson, VP, Global Sales Engineering, BlackBerry
When it comes to enterprise security, Zero Trust is a concept that is becoming popular. More of a philosophy than a set of procedures, Zero Trust requires a deeper discussion and look at security. Is it practical for every one? Should Zero Trust be a priority? Why does it matter? What are the challenges? What is important? What about IoT? What role does our current security program play?
This session will explore the important questions about whether Zero Trust should be a priority for your organization and touches on the role of users and devices, environment and network. We will discuss the approaches and challenges with Zero Trust, addressing business drivers such as cloud environments and business continuity needs.
Speaker:
Lee Dolsen, Chief Architect, Asia Pacific & Japan, Zscaler
The IT and security heads are challenged from time to time about keeping the systems up and running, with availability and cyber resilience paramount. Breaking the kill chain is critical to understand in securing the environment. How can a ‘zero trust’ architecture be used in building this network and security transformation in a cloud-ready environment?
The session discusses:
Speaker:
Jonathan Andresen, Senior Director, Marketing & Products, Asia Pacific & Japan, Bitglass
Network security architectural best practices are undergoing a dramatic shift. Two prominent IT security trends have dominated InfoSec discussions during this ongoing pandemic: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE). In practical terms, which is more important, what is the relationship between them, and how will they improve cybersecurity effectiveness?
As security teams prepare for either a return to the office or a more distributed workforce and as cyber threats continue to proliferate, IT teams must understand the differences between these two essential security paradigms.
The session will discuss:
Speaker:
Eric Lam, Director for Security Solutions, Microsoft Asia Pacific
The recent cyberattacks have shown increased sophistication in the breadth of tactics used to penetrate, expand across, and persist in affected infrastructure. They have posed a serious threat to every organization. While the tactics, techniques, and procedures (TTPs) that the bad actors utilized are not new to defenders, we have also come to realize that many organizations have once again been caught unprepared.
Companies should start or continue to adopt a ‘zero trust’ mentality across their environment to defend against such attacks. A ‘zero trust’ mindset creates a more resilient, consistent, and responsive posture to new incidents. It helps address gaps in unprotected devices, weak passwords, and gaps in multi-factor authentication (MFA) coverage that attackers can exploit.
The session will discuss:
How to strategize and see security in a new light amidst new challenges. The emergence of technologies such as IoT, skill shortage, insider threats, and cloud movement has posed the most significant risks for enterprises in the current times, which are amplified by increasing phishing attacks, targeted attacks, disruption, distortion, and deterioration.
A panel of experts discuss:
The popular SolarWinds hack, the supply chain attack that implanted a backdoor in the Orion network monitoring software pushed to 18,000 of the firm's customers, is considered to be potentially the most significant intrusion in our history.
The campaign's full scale, including all of the tactics, techniques and procedures being used by attackers remaining unknown, has left most enterprises across the regions in a state of shock.
What are the lessons the CISOs need to learn from this attack? Do you have a process to evaluate your vendor's security policies and frameworks?
The panel will discuss:
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.