CyberAttack Singapore 2020
Cyber Security Webinar & Livestream

PRESENTED BY
The Teh Group

March 31-April 1, 2020

Singapore

Amidst the widespread Covid-19, our partners are already seeing evidence that the cyber criminals are using the fear around the coronavirus to step up their own cyber attacks around the globe.
And while traditional cyber security events and conferences are a bit limited during this hard times, we at Cyber Attack are committed to ensure your first line of cyber defense and cyber security will always be ready to face the cyber security threats and attacks.
We understand that business must go on for you and we are pleased to introduce you to our virtual platform for Online Conferences and series of Cyber Security Webinars covering the latest cybersecurity and IT defense best practices.

Request sponsorship information

Introduction

As one of Asia Pacific region’s key technology hubs, highly-networked Singapore is vulnerable to cyber-attack attempts. Add in the widespread use of digital banking, eCommerce and mobile devices, and it becomes a low hanging fruit for hackers, just illustrates the recent Singapore’s health system cyber-attack.

To respond to the ever-growing diversity and virulence of cyber threats, Singapore has undertaken, in past years, several key actions to create a dependable cyber ecosystem and strengthen their own line of Cyber Defense and Cyber Security measure to ensure the safety of their users from any attempt of cyber attacks adn threats.

CyberAttack Singapore Webinar and Livestream will provide you with the comprehensive Cyber Security Webinars Series and the opportunity to discuss and share any IT Security issues as well as challenges with cybersecurity experts in the series of interactive Cyber Security Webinars and livestream. Apart from reviewing and discussing Cyber Security best practices and approach the Webinar Session will also give you the chance to ask the experts questions during the Livestream Online Q&A session.

Who Will Attend?

  • Administrators
  • Chief Information Security Officers (CISO)
  • Chief Information Officers (CIO)
  • Chief Technology Officers (CTO)
  • IT Directors
  • Cyber Security Heads
  • Senior Executives in Security Network and Information Profiles
Livestream Webinar Programme

March 31, 2020

09:00 AM – 09:15 AM (UTC+8 Kuala Lumpur, Singapore)
Welcome & Opening Remarks by the TEH Group
-
09:15 AM – 09:55 AM (UTC+8 Kuala Lumpur, Singapore)
Business Continuity Planning for Cybersecurity
Today’s global health emergency means every company is doing their best to prioritize the safety of their employees - our company included. If you typically use on-site security testing, how are you keeping your cybersecurity cadence going through these challenging times.

Discover how HackerOne’s 600,000+ community of remote researchers is positioned to help from hacker-powered pentests, to hosted VDPs, to continuous bug bounty programs.
  • Addressing the world today with the situation we're in, the increase in cyber attacks of different kinds.
  • Who are the Hackers? Why they are uniquely positioned to help you and eager to make a difference?
  • The different ways to work with ethical hackers (BBPs, VDPs, Private, Public, even Clear) and how to know what's right for you?

Jon Bottarini, Senior Security Solutions Engineer, HackerOne

10:10 AM – 10:40 AM (UTC+8 Kuala Lumpur, Singapore)
Securing Your Remote Access - Keeping your Business Safe While Supporting Your Expanded Remote Workforce
In times of crisis, good security practices are often the first thing to go. As employees across Asia Pacific and ANZ are being asked to work from home due to the recent COVID-19 outbreak, companies, universities and organisations are being forced to implement remote working or study policies. However, an expanding remote workforce can increase your security risk, especially if IT and Support employees use non-secure remote access tools as temporary measures.

The number of privileged accounts and extensive use of remote access attract hackers who will use compromised credentials to breach your network or install malware. Improperly managed access, accounts and endpoints create a major security risk, rendering you vulnerable.

Join this session to discover:
  • Three service desk risk factors you must consider
  • A step-by-step overview of a typical cyberattack
  • Steps to quickly address company and industry compliance mandates
  • How Privileged Access Management (PAM) solutions can help
Ajay Kumar, Director of Solutions Engineering – APJ, BeyondTrust

10:55 AM – 11:35 AM (UTC+8 Kuala Lumpur, Singapore)
Top 10 Cyber Security Tips – Working from Home
Cybercriminals always capitalise on world wide events, and the current situation is no different. In this session we will review some of the current attacks that use COVID-19 fears – from phishing attacks to malware to online scams. In addition we will review best practices for people who are now working from home as well as discuss and demo the importance of actionable threat intelligence.

Etay Maor, Chief Security Officer at IntSights Cyber Intelligence, IntSights & Adam Shor, Sales Engineering Director | APJ, IntSights

11:55 AM – 12:35 PM (UTC+8 Kuala Lumpur, Singapore)
Smarter Security That’s Human Nature-Proof
With the number of endpoints and sophistication of threats growing exponentially, relying on humans to push security policies down to devices is no longer the right solution. To keep up with an evolving threat landscape, as well as the complexity and scale introduced by hyper-connectivity, enterprises increasingly require more automated approaches to threat detection, prevention and response. This is core to the Zero Trust model. Learn how Machine Learning (ML) and predictive AI is used to dynamically adapt a security policy based on behavioral and location patterns, network trust, device and other factors.

Jonathan Jackson, Director of Sales Engineering, APJ, BlackBerry

02:00 PM – 02:40 PM (UTC+8 Kuala Lumpur, Singapore)
Keep Your Mobile Workforce & Digital Initiatives Secure
Our way of working and learning is evolving fast. Tools and capabilities are available today to support this massive trend. However, there are a number of risks which fraud actors leverage as entry points to access the critical data, sensitive information and financial assets of organisations of all sizes. We will share ways to mitigate these risks and secure your mobile workforce. We will also discuss why IT leaders and MSP’s must embed these capabilities and good practices in their IT and digital initiatives.

Sylvain Lejeune, Vice President Sales APJ, WatchGuard Technologies

April 1, 2020

09:00 AM – 09:20 AM (UTC+8 Kuala Lumpur, Singapore)
Welcome & Opening Remarks by the TEH Group
-
09:30 AM – 10:10 AM (UTC+8 Kuala Lumpur, Singapore)
Data Security for the Multi-Everything Environment with Thales
Today’s enterprises depend on the cloud and data in order to make decisive decisions. That’s why the most respected brands and largest organisations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Whether it’s securing the blockchain, protecting digital payments, or delivering software to power the Internet of Things, organisations around the world rely on Thales to accelerate their digital transformation.

Join us to learn how you can protect and manage your sensitive data and software in the cloud – through advanced data encryption and access management from a combined portfolios of Gemalto and Thales eSecurity.

Kenny Seah, Senior Consultant, Thales

10:30 AM – 11:10 AM (UTC+8 Kuala Lumpur, Singapore)
Measuring Security Performance at Scale
Being able to effectively measure, quantify and understand cyber risks of any organisation is no longer an option. Whether it’s for your own organisation or your third party ecosystem, we take a step towards providing clarity by objectively computing a scale of measurement that effectively conveys the security performance of an organisation.

Adopting an outside-in approach, we look at how a diversified set of telemetry, based on external observations, can help to manage cybersecurity risks of your organisation or that third party you have been working with. We look at how potentially a well-designed and comprehensive set of risk vectors effectively elevates the oversight into your business. From developing a sound perimeter defence strategy to adopting best practices for configuration/hygiene vectors, let’s dive deeper to understand how we can better cut through the “noise” and convey the right message to your stakeholders.

In this session, Serene will discuss the benefits of adopting an outside-in monitoring servcie will value-add to your current security practices or enhance your risk approach for your vendor ecosystem.

Serene Siow, Regional Sales Director (ASEAN & Japan), BitSight

11:30 AM – 12:10 PM (UTC+8 Kuala Lumpur, Singapore)
Changing Cyber Landscapes: The Battle of Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:
  • Paradigm shifts in the cyber landscape
  • Advancements in offensive AI attack techniques
  • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
  • Real-world examples of emerging threats that were stopped with Cyber AI
Eugene Low, Regional Director, ASEAN and South Asia, Darktrace

2:00 PM- 2:40 PM (UTC+8 Kuala Lumpur, Singapore)
Analysis of the Common Causes for PDPC Enforcement Actions
In this presentation, Onn Chee will walk through the types of organisations and causes for all PDPC enforcement actions. Insights will be shared on which sectors and causes are most frequently subjected to PDPC enforcement actions. In addition, recommended security controls against the common causes of PDPC enforcement actions will be shared so that the audience can consider adopting these controls for their organisations to prevent, detect and respond to personal data leakages

Wong Onn Chee, Technical Director, Rajah & Tann Technologies Pte Ltd

Featured Speakers

For speaking opportunity, please contact us at hello@thetehgroup.com

CyberAttack Singapore 2020 Livestream
March 31, 2020
Singapore-CyberAttack2020-Event-Speaker- 

Jon Bottarini

Senior Security Solutions Engineer

HackerOne

Singapore-CyberAttack2020-Event-Speaker-Etay Maor

Etay Maor

Chief Security Officer at IntSights Cyber Intelligence

IntSights

Singapore-CyberAttack2020-Event-Speaker-Adam Shor

Adam Shor

Director of Engineering

IntSights

Singapore-CyberAttack2020-Event-Speaker-Jonathan Jackson

Jonathan Jackson

Director of Sales Engineering

BlackBerry

Singapore-CyberAttack2020-Event-Speaker-Ajay Kumar

Ajay Kumar

Director of Solutions Engineering – APJ

BeyondTrust

Singapore-CyberAttack2020-Event-Speaker-Sylvain Lejeune

Sylvain Lejeune

Vice President Sales APJ

WatchGuard Technologies

CyberAttack Singapore 2020 Livestream
April 1, 2020
Singapore-CyberAttack2020-Event-Speaker-Kenny Seah

Kenny Seah

Senior Consultant

Thales

Singapore-CyberAttack2020-Event-Speaker-Serene Siow

Serene Siow

Regional Sales Director (ASEAN & Japan)

BitSight

Singapore-CyberAttack2020-Event-Speaker-Eugene Low

Eugene Low

Regional Director, ASEAN and South Asia

Darktrace

Singapore-CyberAttack2020-Event-Speaker-Wong Onn Chee

Wong Onn Chee

Technical Director

Rajah & Tann Technologies Pte Ltd