 |
|
|
|
|
|
|
|
For printable agenda, please |
Time |
Agenda |
09.00 - 09.30 |
Registration |
09.30 - 10.30 |
Opening Keynote: Collective Defence: A Community Approach to Cyberspace
In today's dynamic environment and a connected landscape, people's data usage behaviour has changed significantly from desktop to mobile as well as moving data and information into the Cloud. The need for secure, private, and reliable services is growing from a technological concern within the industry to a societal concern for citizens around the world. The President of (ISC)² Singapore Chapter, Mr Alan Seow, will discuss how industry professionals can align the social, economic, political and technical concerns in the cyberspace towards a more secured platform.
President, CISSP, CRISC (ISC)² Singapore Chapter
|
|
10.30 - 11.00 |
Keynote One: 2013 Security Trends: Findings from our 3D Security Analysis
The Internet has dramatically changed and today, we use the Internet for almost everything ¡V personal and business. The Internet consists today of more than 700 million web sites and over 99 million types of malware. As technology evolves, so do the security challenges. This session will provide an insight into the cyber security events that occurred in organizations worldwide, shed light on the security risks organizations are exposed to on a daily basis and recommended actions to protect your network.
Security Consultant Check Point Software Technologies Ltd, South Asia
|
|
11.00 - 11.30 |
Keynote Two: New Model of Security: Before, During & After an Attack
The problem is simple: threats. On the network, in the endpoints, entering via malware, targeted attacks, BYOD, cloud-based applications and an increasing number of other new vectors. The industrialisation of hacking means that whole industries are being targeted, not just lone institutions, and it also means that the rewards are ever greater for hackers. Traditional defences are not enough and a desire to block all attacks is unrealistic. Before an attack, you should know what you are defending and have access controls in place; during an attack you must have the best threat detection and blocking capabilities; after an attack, you should be able to remediate and resume normal operations. We believe that the best approach to security is to address the entire attack continuum in a way that will create as secure an environment before, during and after an attack.
Director of Marketing Asia Pacific Sourcefire
|
11.30 - 11.50 |
Morning Networking Coffee Break |
11.50 - 12.20 |
Keynote Three: Data Protection in the Cloud with Encryption - Are There Alternatives ?
Director - Information Security, APAC Carlson Wagonlit Travel
|
|
12.20 - 13.10 |
Panel Discussion One: Big Data - Opportunity or Vulnerability?
With great power of data comes great responsibility to Security Leaders. A Big Data initiative should not only focus on the volume or variety of the data, but also on the best possible way to protect it.
Around every corner in the online world there is always threat lurking in the shadows. It is vitally important to implement security controls to managing Big Data. CISOs must keep a bird's eyes on the system using actionable intelligence to deter any malicious activities, emerging threats and vulnerabilities.
In this session, the moderator and panelists will share their strategies and tactics to combat data theft.
Session discovery topics:
- Understanding the Threat Landscape of Managing Big Data
- Balancing Enterprise Risk & Business Innovation
- Winning Strategies for Protecting your Big Data
Panel Chair:
, Executive Director, Risk Consulting, Deloitte & Touche Enterprise Risk Services
Executive Panelists:
, Global Head of Application Security, Global Information Security & Technology Risk (GISTR), Barclays Capital
, Group Chief Information Officer, Golden Agri-Resources
, CIO, Great Eastern Life Assurance
, CIO, Singapore Post Limited
13.10 - 14.15 |
Executive Networking Luncheon Roundtables (By Invitation Only)
|
14.15 - 15.00 |
Panel Discussion Two: Securely Enabling Mobility and BYOD Across the Enterprise
Welcome to the Age of Mobile Devices! Smartphones and tablets have irreversibly changed our lives in terms of communication; meanwhile, they offer boundless business capabilities. With the huge increase in mobile applications and people's desire to always do more, how do CISOs stay ahead of the consumerization of IT and maintain security across the enterprise?
In this panel discussion, the moderator and panelists will look at some sound practices to securing mobile devices. We will also look at issues about BYOD policy frameworks and the crucial importance of cultivating security awareness while implementing mobility and BYOD programs within organizations.
Session discovery topics:
- What are the Potential Risks associated with Mobility?
- Sound Practices to Securely Enabling Mobility and BYOD Across the Enterprise
- Lessons learnt and Strategies moving forward
Panel Chair:
, Executive Director, Risk Consulting, Deloitte & Touche Enterprise Risk Services
Executive Panelists:
, SVP, Group Information Security Officer, Global Product Development, Citi
, Director - Information Security, APAC, Carlson Wagonlit Travel
, CIO, Knowledge Universe
, Regional Head, IT, Supply Chain & Logistics, ZF Asia Pacific Pte Ltd
|
|
15.00 - 15.45 |
Afternoon Networking Coffee Break and Closing Remarks |
*Topic is subject to change without prior notice
|
|
|