Cyber Secure Singapore 2023
Set to take place at GovWare 2023, ISC2 Singapore Chapter once again is conducting its flagship annual conference Cyber Secure Singapore 2023 (CSS2023). Focusing on the theme "Combating Cyber Threats: Strategies and Approach", the conference programme complements GovWare’s position on delivering transformative insights that address the ever-evolving cybersecurity landscape.
This event is open to ISC2 Singapore Chapter members and invited guests only.
We hope to see you at Cyber Secure Singapore 2023!
*** Registration for CSS2023 is now CLOSED ***
You can still join us for our ISC2 SG Members Reception in the evening
Cyber Secure Singapore 2023 - Conference Programme
Date: 19th October 2023, Thursday
Time: 8.15am to 5.15pm SGT
Location: Sands Expo and Convention Centre, Singapore
Room: Level 3, SICW B, Hibiscus Room 3601
Topics of Presentation
CSS2023* Registration and Sign-in
*Cyber Secure Singapore 2023
Level 3, Hibiscus Room 3601
(GovWare+CSS2023 event registrations are done online and GovWare Pass collection can be done separately from 17 to 19 Oct 2023 at GovWare registration counters. GovWare Passes still need to be verified at CSS2023 registration counters on 19 Oct for attendance purposes.)
Garion Kong, CISSP, CCSP, SSCP
President, ISC2 Singapore Chapter
Welcome Remarks by ISC2 Singapore Chapter President
Ms. Clar Rosso
|Opening Address by Guest-of-Honour
Group CTO Lead
Topic: The Crucial Role of Asset Management in the Face of Cyberwarfare
As cyberwarfare gains momentum as a low-cost, asymmetric threat, its borderless nature sets it apart from traditional warfare. This shift significantly impacts business operations, government policy and, most notably, the security of our critical infrastructure. In this presentation, Armis will explore the escalating threat of cyberwarfare and will emphasize the pivotal importance of Cybersecurity Asset Management (CAM) in fortifying the attack surface management within critical infrastructure against these relentless threats.
Drawing from extensive threat intelligence and global research, real-world examples of how CAM is the cornerstone in safeguarding essential systems will be discussed and how the strategic approaches of CAM, including continuous monitoring, asset inventory, vulnerability assessment, and risk prioritization can be utilized. Additionally, we'll highlight the imperative collaboration between IT, OT and security teams in ensuring the robust defense of critical infrastructure.
|Tea Break (20 minutes)
Regional Cybersecurity Governance Officer (East Asia Region), Schneider Electric
Topic: Keep the Clock Ticking
The heavy digitalization of the manufacturing sector leaded to two points. A more efficient industry but also an expanded landscape regarding cyber vulnerabilities. To face these new challenges Schneider Electric Cybersecurity governance relies on several pillars such as:
Regional VP for APAC and MEA
Topic: Trust No Files - Zero Trust Content Security
For decades, we have relied on predictive analytics to detect and block malicious files. But predicting threats based on historical data is imperfect. Even 99% accuracy guarantees 100% chance of attack. Our Partner - Votiro is here to share how they can ensure your organisation to be fully protected as we can’t just improve our predictions or threat detection. We need an entirely new approach – Votiro’s Positive Selection singles out only the safe elements of each file, ensuring every file that enters your organization is 100% safe.
Join us in this invited-only session to learn how Votiro helps organisation to strengthen their security posture against fileborne attacks and prevent unknown exploits and zero-day malware from affecting daily operations.
Meng-Chow Kang, PhD, CISSP
Director, Averitus Pte Ltd
Topic: Thinking About Security Thinking
This session discusses some of the mental models or thinking tools that cybersecurity practitioners may use when analyzing (thinking about), and/or having a dialogue deliberating cybersecurity concepts, and approaches with both practitioners and non-practitioners to gain common understanding on related topics.
Appreciation for Supporting Organizations
Principal Solutions Engineer
Topic: Identity Powered Zero Trust
In this session, we are going to provide practical and actionable steps on your journey to implementing Zero Trust within your environment and realize value for your organization.
|Lunch Break and Networking (1 hour)
|GovWare Exhibition Level
SubCo Member, ISC2 Singapore Chapter
Topic: Combating Cyber Threats: Strategy and Approach
The panel will discuss about the evolving Threat Landscape specifically surrounding Edge Computing, Al, and government regulations that require a next generation strategy and approach to balancing business and security using a risk-based methodology. Securing critical infrastructure will also be a key area especially in terms of Supply Chain Attacks, IT & OT Convergence, Zero Trust Architecture and global collaboration for a safer cyberspace.
President for Cyber Research and Customer Success
Topic: Time To Choose – From Conventional CTI to Next Generation Intelligence
The landscape of cyber threats is constantly evolving, and it is imperative for us to stay ahead of the curve. This session redefines cyber threat intelligence and uncovers what it takes to gather quality and actionable intelligence, applying it across both technology and business domains, and transforming from conventional CTI to the game changing external threat landscape management.
Chea Le Xin Andrea
Manager, RSM Risk Advisory
Topic: Building a Healthy Security Culture: Safeguarding Organisations Against Cyber Threats
In today's digital landscape, cybersecurity has become a top priority for organisations worldwide. However, simply investing in cutting-edge technology and implementing security measures alone no longer guarantees protection against cyber threats.
A healthy cybersecurity culture keeps cybersecurity at the forefront of an employee's mind - a mindset where security is ingrained in every employee's daily routine, integrated into their work life rather than an afterthought discarded after a training session concludes.
CTO for APJ, Symantec by Broadcom
Topic: Balancing Your Business: Generative AI & Cybersecurity
The explosion of generative AI applications into the mainstream has magnified the challenge of business. Do you prioritize productivity over security and compliance? With Symantec, find out how you don't need to choose!.
|Tea Break (20 minutes)
Security Architect, SpeQtral
Topic: Enhancing Secure Communications with Quantum Key DistributionPublic key cryptosystems are still the widely used and more secure methodology in use to enable the secrecy of keys in digital communication today. Though it was estimated it would take decades and millions of qubits to break public key cryptography, the great progress made in the quantum world with the first quantum computer made available on cloud 7 years ago could accelerate the research and development efforts. The session aims to summarise some of the recent developments in the quantum world to combat such future cyber threats and how we should get ready.
Vice President, ISC2 Singapore Chapter
Topic: AI-Driven Deception vs. AI-Enhanced Cyber Defense: What's Next?
AI's role in shaping the cybersecurity landscape has never been more significant than it is today. Threat Detection and Anomaly Detection have become even more crucial especially when the opponent is a much faster and more powerful AI.
The panel will discuss both the positive aspects and dangers of AI, in strengthening IT security to combat deception-based security tactics, as well as the ethical and privacy implications of AI in cybersecurity.
Mr. Paolo Miranda, CISSP
Conference Chair, Vice President, ISC2 Singapore Chapter
|End of Conference
* The programme format, agenda, and timings are subject to change by the organizer as and when necessary due to planning and unforeseen changes.