IT Security Technologies, Policies and Compliance

Watch CLOUDSEC
2017 Highlight
Singapore
Marina Bay Sands
22nd August
Tuesday
22 Speakers
Experienced speakers
By invitation only

About Event

In the face of next-tier threats,
businesses must step up their game and LEVEL UP

Enterprises and organizations are facing next-tier, multifaceted threats that are both familiar and uncharted. As the cloud and the Internet of Things (IoT) ecosystem become more interconnected, it is essential for organizations to reevaluate and redefine their understanding of threats, risks, and solutions in an ever-changing landscape.

With that, organizations and enterprises must ask: what threats should they prepare for? What risks are involved? What processes and procedures should be implemented? In the face of next-tier threats, businesses must step up their game and LEVEL UP.

This by-invitation event will cover high level strategies, forward looking security measures, and security roadmaps affecting the Singapore market. Network with senior executives and leaders in this invitation-only event for management level and above attendees. If you would like to be considered for an invitation, please RSVP your interest or call +65 6395 8036.

CLOUDSEC Hong Kong 2017

Event Schedule


8:15 - 8:55

Networking In Exhibition Area


8:55 - 9:05

Housekeeping


9:05 - 9:15

Welcome Address
David Siah, Country Manager | Trend Micro


9:15 - 9:45

LEVEL UP: Play to Win
Download Presentation Slides
Rik Ferguson, VP Security Research | Trend Micro

For organizations, having a competitive advantage and providing customer delight is, like an online game, a quest that's already being played in the cloud. As devices become smarter and more connected, and as user habits now dictate that faster is better, enterprises must go through their respective hero's journey to harness and master the "super powers" cloud computing can provide them. It is important, therefore, for these organizations to LEVEL UP and "win" in order to reap the rewards. This thematic keynote presentation will provide insights on the latest and upcoming trends in cloud computing, which may challenge current information security mindset and practices. It will also provide recommendations on how businesses can leverage the aforementioned cloud computing trends without compromising the security of their networks and infrastructure.



9:45 - 10:15

Realising the Full Potential of Your Workforce
Download Presentation Slides
Ong Whee Teck, CEO | Trusted Source

“The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn and relearn” (Alvin Toffler).
This is not just applicable to individuals but organisations as well.
In today’s landscape, rapid technological changes and business transformations are inevitable. Organisations and individuals need to look at innovative ways to drive efficiency and learn to face up to the challenges of a digitally transformed world.
In this session, Whee Teck will share about the concept of value management and the future of learning which act as strategic levers. These levers will not just strengthen Trusted Source’s capabilities but unleash the full potential of the workforce while overcoming the challenges faced in the cybersecurity space.



10:15 - 10:45

Inspiring Your Digital Transformation
Download Presentation Slides
Dhanya Thakkar, Managing Director and VP, Asia Pacific | Trend Micro

The CIO role is changing. Sure, it’s still important to keep the lights on but increasingly the CIO is being tasked with driving change. No longer relegated to a peripheral role, the CIO is being called on to inspire change from the centre.
- We have the technology. But who cares? How will you create the necessary energy and inspiration for change?
- How will you help balance innovation with business as usual?
- What will you need to lead necessary change and transformation?

It has never been a better time or a more challenging time to be a CIO. So many of the rising technology opportunities, like digital transformation, machine learning, artificial intelligence, IOT, and cloud offer the chance for CIOs to be in the middle of the discussion around topics of significant value to the enterprise. At the same time risks associated with security are also at the top of the agendas of many boards. Again, the CIO is one of the key drivers of risk mitigation, playing both offense and Defense. In this session Dhanya will discuss how finding faster paths to seizing opportunity and mitigating risks requires a better ecosystem. With that, organisations and enterprises must ask: what threats should they prepare for? What risks are involved? What processes and procedures should be implemented?



10:45 - 11:15

Morning Break


11:15 - 11:45

Creating Holistic Cyber Security Strategies
Download Presentation Slides
Simon Piff, Vice President IT Security Practice | IDC Asia/Pacific

The world of IT security is moving rapidly as a wealth of new technologies such as artificial intelligence, machine learning and deep analytics, to name a few, enter the markets and help to improve defenses of organizations. But even as these innovations vastly improve the technology, there still exist organizational challenges that remain as hurdles to the successful delivery of a robust IT security strategy. In this session IDC will touch on the future of IT security technologies and focus on the structural changes organizations need to make to ensure that this depth of innovation can be best leveraged to create a holistic and robust enterprise security strategy to better equip the frontlines of this cyber war that all organizations are now faced with.



11:45 - 12:15

View of Current Risks and Security Regulatory Landscapes in Singapore
Download Presentation Slides
Tammie Tham, Councillor & Cyber Security Chapter Chairman, Singapore Infocomm Technology Federation & Chief Executive Officer and Founder, Accel Systems & Technologies Pte Ltd

The alarming frequency and sophistication of cyberattacks, and the direct impact to economy and society-at-large demands that governments take decisive action to protect both their economy and the privacy of their citizens. The speaker will talk about the regulatory landscape for CyberSecurity in Singapore and the impact to businesses.



12:15 - 12:40

Panel Discussion - Redefining Security
Moderated By:
Myla Pilao, Director | TrendLabs

It has been long established that cloud computing is no longer an option or simply an inevitability for organizations; it’s now the new norm for organizations, regardless of size or type.
However, the journey to the cloud is not always a smooth ride, as dynamic real-world factors—from cybercrime and organizational preparedness to geopolitical issues—have to be considered.
In today's computing landscape, how should we define cybersecurity?
In our panel discussion, our panel of experts will talk about the impact of the aforementioned factors to an organization's cybersecurity and cloud strategies and what enterprises need to do to LEVEL UP.



12:40 - 13:40

Networking Lunch
Chaired by Chris White, Conference Director | CIO Asia


13:40 - 14:10

Keeping a Billion Cloud Users Secure
Mark Johnston, Google Cloud Security Engineer - JAPAC | Google Cloud

Google secures and protects the data and information for over a billion users across a number of its business units and offerings. With some of the largest global networks and systems, protecting our customers data (both business and consumer) requires leading-edge and scalable approaches to security that are both efficient and effective.
Security is embedded in everything that Google does with significant investments made to drive execution as well as through programs such as Project Zero for security research, Project Shield for DDoS mitigation, while taking a new approach to Enterprise Security with BeyondCorp.
Google continues to invest in testing systems for security weaknesses such as finding the first SHA-1 collision and the SSL 3.0 POODLE vulnerability, and openly promotes a Vulnerability Reward Program (paying $3 million in 2016 alone to individuals who have contributed to protect global systems).
Join this session to gain an insight into Google's approach to security, best practice in design and take the opportunity to understand how you can engage with Google to drive security in your organization.



14:10 - 14:40

Enabling & Securing the Digital Enterprise
Download Presentation Slides
Johnny Kho, Associate Director, Managed Security Services | Singtel Cyber Security

Today, many organisations are experiencing the impact of Digital Transformation. Digitalisation has caused wide-spread disruptions across various industries and multiple aspects of business, unlocking opportunities for value creation as well as cyber risks. Find out in this session how you can safeguard your enterprise data, hybrid network and digital infrastructure. Gain insights on the latest offerings in managed security services and cyber defence.



14:40 - 15:10

How do you implement a Cloud Security Strategy?
Jonathan Limbo, CEO | RightCloud Pty Ltd

Many organisations are going through a change to become more innovative driving digital transformation using the power of cloud. The challenge to this is managing security with this new found agility.
How do you enable business agility and manage risk at the same time?
From Strategy to Execution Jonathan Limbo CEO of RightCloud, Ex-Cloudera (Big Data) and Ex-Amazon Web Services (Cloud) will walk through how to manage this transformation Policy to Implementation. Walking through how to implement your cloud environment and have the right approach in tooling so that you can Govern, Manage Risk and Comply with the new norm.



15:10 - 15:40

Afternoon Break


15:40 - 16:10

Securing the Smart Nation: Moving towards Utopia with Security in Mind
Download Presentation Slides
Philippe Lin, Senior Threat Researcher, Forward-looking Threat Research | Trend Micro

Singapore wants to build a smart nation by 2025. The smart city from within is a system of heterogeneous systems with broad and complicated attack vectors. We want to review modern installed components in smart cities, including electricity management systems, air-quality sensors, solid waste management, urban transportation, exposed infrastructure, and how open government data might make them more robust. We will also provide a checklist to secure your smart city.



16:10 - 16:40

Cloud services assurance frameworks
Download Presentation Slides
Anthony Lim, Market Strategy Director, Asia Pacific | Cloud Security Alliance

Cloud services innovation, deployment and consumption are proliferating at a runaway rate today, for all the good reasons of opex cost management model, backup and storage, business continuity, scalability, flexibility et al. Then there is FinTech, IOT, mobile apps, all adding to the cloud expansion too.
Nonetheless there are security and governance concerns too, primarily regarding data and availability, given that cloud is an outsourced model, a different network architecture and the user loses visibility and control.
It is paramount to consider and comply with nationally and internationally established security and trust frameworks and certifications, such as from ISO, CSA and also some local ones from SGX-MAS-ABS and IMDA, as at least a base-line assurance and trust reference, that certain processes, policies and methodologies are in place to ensure the cyber-security of the cloud services. We also look at a sampling of statements of assurance from some big cloud providers like Microsoft, Amazon and SingTel.



16:40 - 16:55

Panel Discussion - Level up your Cloudsecurity in 2017
Moderated By:
Sri Narayanan, Executive Editor | CIO Asia

Panellists:
Francis Fan, Group Director, Technology Management | Integrated Health Information Systems (IHiS)
Anthony Lim, Market Strategy Director, Asia Pacific | Cloud Security Alliance
Paul Hidalgo, Regional Solution Architect | Trend Micro

What do you need to know about your data and how do you ensure it is compliant in the cloud? - Breaking down data compliance rules and what it means to your organisation. - How can IT security adapt to safely support digital transformation whilst also remaining compliant? - How do you monitor and secure your data as it grows and spreads across multiple cloud locations?



17:25 - 17:35

Closing Address and Prize Draw
Chaired by Richard Pain, Cybersecurity Specialist | CIO Asia


13:40 - 14:10

Threat Protection for Next Gen Data Centers with NSX
Download Presentation Slides
Arup Deb, Systems Engineer, Networking and Security, Southeast Asia and Korea | VMware

NSX builds networks in software. Data center operators can achieve levels of security, agility and economics that were previously unreachable with physical networks. Learn how to deliver granular security to every workload with micro segmentation and in addition - reduce operational overheads and enable consistent security and networking policy across multiple private sites or even across to public clouds.



14:10 - 14:40

Availability to the cloud: Best Practises to outsmart Ransomware
Download Presentation Slides
Jason Kan, System Engineer Asia | Veeam Software

After becoming one of the main cyber security threats in 2016 and recently causing an international turmoil in May 2017, ransomware is keeping everyone on their toes regarding the protection of their critical data and computer systems. As infection approaches diversify and traditional antivirus protection is surpassed, companies need to treat data protection proactively, getting the right solutions and processes in place to prepare for the inevitable attack.
- Discover the benefits of extending Availability to the cloud
- How to efficiently recover from an attack



14:40 - 15:10

Level Up - Raising the bar for cybersecurity
Download Presentation Slides
Tarun Gupta, Regional Solution Architect | Trend Micro

In a threat landscape that continues to evolve, your organization has to be better prepared to stave off threats. Attacks can go unseen for weeks because threats are increasingly difficult to detect, and there is a lack of visibility and threat intelligence to provide insight for quick remediation.
But attacks that go unnoticed are just the beginning. Your pain point could be the siloed security products you’re using that don’t work together. Risky user behavior. Or anything that endangers your data or dulls your competitive edge. In this session, Mr Tarun Gupta will share how can you partner with Trend Micro to fight against the evolving threats.



15:10 - 15:40

Afternoon Break


15:40 - 16:10

Ransomware: Bigger, Badder, Stronger
Download Presentation Slides
Myla Pilao, Director | TrendLabs

Ransomware has been a problem in the cyberspace since it was first discovered in 2005. Its emergence forever changed the way the world perceives cyber threats. Unlike the old days when worms and ordinary malware are just relatively small clout in a computer system, ransomware proved that it can have real-life damage to users, not to mention to enterprises that are subject to damage in operations and brand reputation.
As ransomware attacks continue to diversify over the years, so does its targets. Now, no business or user is too small or big for ransomware. In 2016, it cost victims over US $1 billion in losses, which is the most expensive to date. As far as impact is concerned, look no further than the outbreaks of WannaCry and Petya. Affected hospitals had to turn away patients or shut down their emergency wards. Car manufacturing plants had to stop production, and power grids were disrupted.
It will not be surprising if ransomware grows into something more dangerous in the future. In terms of potential, they can evolve into something that can disable an entire infrastructure until the ransom is paid. Cybercriminals may soon look into approaches like hitting industrial control systems (ICS) and other critical infrastructure to paralyze not just networks but ecosystems.



16:10 - 16:40

Cyber Security - Back to the future
Download Presentation Slides
Pieter Danhieux, Principal Instructor | SANS Institute

Back to 1999. Systems were connected. Security Weaknesses existed. Hackers broke into systems. In 2017, millions more systems are connected. Hackers turned into cyber soldiers, spies, criminals or entrepreneurs. The same (and many more) security weaknesses exist within the average organisation. The consequences for our economies, political landscape and people’s lives are devastating. No matter how many security products we buy, we seem to ignore basic security hygiene. The Aussie Department of Defence created the Top 4 in 2013 and the Essential 8 in 2017. Sound advice that will prevent malware from running and limit the extent of incidents.



16:40 - 16:55

Panel Discussion - Level up your Network Security
Moderated By:
Richard Pain, Cybersecurity Specialist | CIO Asia

Panellists:
Steven Sim, Lead Group IT Security Centre of Expertise | PSA International
Tarun Gupta, Regional Solution Architect | Trend Micro

Balancing network performance and security as network architecture grows in complexity. - Assessing the advantages and disadvantages of active and passive network security devices. - Is ROI the right metric to justify spending on network security, what are the alternatives? - How can you effectively communicate cyber risk to budget holders?



17:25 - 17:35

Closing Address and Prize Draw

Event Speakers

Anthony Lim

Market Strategy Director | Asia Pacific Cloud Security Alliance

Anthony is a 20-year veteran and pioneer cyber-security & governance professional in the Asia Pacific region, with vast experiences in business management, consulting, auditing, advocacy and training. He has held inaugural regional security business unit leadership roles at IBM, CA (Computer Associates), Check Point and a few other vendors. He was a 7-term ex-co office-bearer at Singapore ICT Federation Security & Governance Chapter, and charter member of ISC2.org Application Security Council. He was a pioneer qualifier for their software security certification and a co-developer of their cloud security certification. He recently received ISC2’s Senior Information Security Professional Award. Anthony is a long-time well-known speaker and content-provider for many business, industry, government and academic conferences, workshops, committees and media (print, broadcasting, internet) on matters of cyber-security and governance, and has been interviewed often on TV news, including recently on BBC. He is an ISO-27001 Auditor, guest and adjunct instructor at some tertiary institutions and life alumni member of the University of Illinois, Urbana-Champaign.

Anthony Lim
Market Strategy Director | Asia Pacific Cloud Security Alliance
Arup Deb
Systems Engineer, Networking and Security, Southeast Asia and Korea | VMware
David Siah
Country Manager | Trend Micro
Dhanya Thakkar
Vice President, APAC | Trend Micro
Francis Fan
Group Director, Technology Management | Integrated Health Information Systems (IHiS)
Jason Kan
System Engineer Asia | Veeam Software
Jonathan Limbo
CEO | RightCloud
Johnny Kho
Associate Director, Managed Security Services | Singtel Cyber Security
Mark Johnston
Google Cloud Security Engineer - JAPAC | Google Cloud
Myla Pilao
Director of TrendLabs Research | Trend Micro
Ong Whee Teck
CEO | Trusted Source
Philippe Lin
Senior Threat Researcher, Forward-looking Threat Research | Trend Micro
Pieter Danhieux
Principal Instructor | SANS
RIK FERGUSON
VP Security Research | Trend Micro
Simon Piff
Vice President of Security Practice | IDC
Steven Sim
Lead Group IT Security Centre of Expertise | PSA International
Tammie Tham
Councillor & Cyber Security Chapter Chairman, Singapore Infocomm Technology Federation & Chief Executive Officer and Founder, Accel Systems & Technologies Pte Ltd

What our attendees say

Sponsors

Host:
Platinum sponsors:
Gold sponsors:
Supported:
Official Media Partner:
Exhibitor:


Marina Bay Sands
Singapore


Contact us


22nd August
Tuesday