7th Total Security Conference Singapore
With the cloud and mobility firmly in place as part of our enterprise infrastructure, the digital economy promises both great opportunities and threats.
The cyber-attack surface has broadened beyond what we imagined, and its growth will continue to accelerate with increasing interconnectivity, Internet of things (IoT), advanced analytics and artificial intelligence.
Apps are at the center of this digital economy, with data becoming its new currency. The demands on infrastructure resources are ever-growing, while it gets more difficult and more resource-consuming to monitor, detect, prevent or mitigate the lurking threats to the vast fast-moving traffic traversing our networks and the Internet via our corporate infrastructure, user devices, office and home equipment, billions of apps and communication tools in our interconnected world.
Anything and anyone can be the weakest link, as long as it's connected.
Anything and anyone can be a vulnerability, with profit-motivated cybercriminals phishing and pharming every possibility, using new tools and techniques to prey on the unsuspecting.
C-level executives have awakened to these facts, with high-profile security breaches of well-known enterprises publicized through global media. Boardroom leaders are highly concerned by these developments, especially since they may have to take responsibility for failure to defend against such business threats.
We need a 360-degree perspective to protect ourselves. We need security strategies that provide total all-round protection of all aspects of our organizations. We need to share, cooperate, collaborate and unite against cybercrime, ransomware, ephemeral infections, bespoke hacking tools, identity theft and data leakage – among other cyber threats.
And here's where we can start. Over the years, NetworkWorld Asia's Total Security Conference gathers security experts, practitioners, C-level executives and leading researchers to discuss and formulate strategies, as well as share best practices and techniques to deal with the security issues that keep us so busy in the day – and awake at night.
- Gathering of cyber security users and practitioners from the local market and the region
- Get a mix of policy, strategic and technical expertise in one strategic venue
- Opportunity to network with decision-makers who can share best practises and solutions to protect your organization from cyber attacks
- Analyze the latest security challenges and issues globally, regionally and locally
- Interact with globally renowned security professionals and experts who share their experience and expertise in areas ranging from Risk analysis and Management, Cyber Security, Malware, Data Loss Protection, Mobile Security, Threat Intelligence, Digital Forensics and Data Recovery
- Understand the future of Information Security and the next-generation of offensive and defensive security technologie
Who Should Attend
Business and IT professionals in enterprise-wide security, risk management, BCM or critical infrastructure:
- CIOs, CISOs and CFOs, and chief security, risk, compliance, process and technology officer
- IT vice presidents and directors
- Network security executives and directors
- Governance, risk, compliance, and privacy executives
- BCM and resilience continuity managers
- Finance, audit, legal risk and compliance regulators
- Enterprise and operational risk managers
Keynote 1: Industry Update: The Digital Economy – and it’s new cyber threat landscape
Singapore is making great strides in its journey to becoming a Smart Nation. The increasingly digitalized and connected business environment, coupled with heightened ecommerce participation, signifies a fast-maturing digital economy.
- However, the highly distributed and more open nature of businesses in a digital economy is raising the security stakes and testing even the best resourced organizations. How can businesses arm themselves against a fast-moving and increasingly virulent threat environment – and in doing so, how can they protect their past and future ICT investments?
- How can business organizations ensure success in the digital economy?
Keynote 2: High-Speed Networks – a Boom or Bust for Connected Businesses?
- High-speed broadband connectivity is an increasing priority for connected businesses to deliver superior online service and user experience, with many upgrading – or looking to upgrade – to 10/40/100GbE networks
- While faster networks improve capacity, they also introduce network complexities in supporting a myriad of cloud, mobile, big data, and other bandwidth incentive apps and systems traversing the network – oftentimes, with traffic far exceeding the throughput of existing security and monitoring tools
- How can business organizations make existing, and planned, security infrastructures more effective at identifying and mitigating threats within the networks?
Security Imperatives vs. Investment Priorities
Continued increase in cyber-security incidents globally – including many recent cases right at home.
- Despite increasing threats to businesses, IT security is said to be always an under-spend area. Is IT security still as a low-priority? Should IT security budgets be increased?
- How can Businesses, especially SMBs, balance their need for security, privacy, and agility – against the realities of their IT security budgets?
- How can vendors and solution partners help?
- Emerging partnerships in cybersecurity initiatives
Morning coffee/tea break
Addressing Operational Risks in a Digital Transforming Business World
- In a world in which even sub-second delays in transactional traffic can cost heavy damages to businesses, mitigating operational risks – and focusing beyond malware and data recovery – is key
- Achieving maximum risk mitigation – and least operational disruption at minimal cost
- How network management is changing to impact many areas of IT operational risk management
- How much risk management is too much?
Panel Discussion: Best Practices in Securing Connected Businesses
Disruptive technologies such as cloud, virtualization, mobility, and related technologies continue to drive new innovations that are both changing the way businesses operate and end-users consume products and services – locally and globally – and using a connected devices. These, in turn, are impelling CIOs and senior business executives to update their companies’ digital enterprise strategies.
- Security strategies that help organizations build and sustain a trusted environment across the entire value chain – employees, partners and suppliers, as well as current and potential customers
- How does one get C-Suite execs to recognize security threats and help effect needed top management support to ensure:
- Security is embraced as a critical, high-priority business requirement, and should be a management mandate
- Maximum security awareness by all stakeholders
- Effective governance and incident response framework is in place to prevent security threats
Minimizing Risks in the Cloud
- Current and emerging cloud security issues – and their impact on cloud adoption
- How the cloud is bringing about needed security transformations
- Cloud services - and addressing an increasing range of security vulnerabilities
- What connected businesses should do to ensure security for their cloud-based architecture
Legal Rights and Regulations in Securing Connected Businesses
- Key security, privacy, digital rights and related regulations that connected businesses should know
- Stepping up threat intelligence – without crossing the lines
- Choosing the right security solutions and partners for your connected business
Afternoon Coffee / Tea Break
Current and Emerging Mobile Threats in a Connected World
- Top concerns, both by businesses and individuals, in an increasingly mobile world
- A spotlight on IoT: What are the risks and threats – perceived or real – in a world of connected devices?
- What are the key success drivers – and drawbacks - for IoT implementations across industry verticals?
- IoT and the importance of building consumer trust. But How?
- With smart devices remotely connected to networks, they create potential entry points for security. How have endpoint security management progressed to deal with this?
Panel Discussion: Keeping Security Threats at Bay; and Reputation and Customers Intact
- The security threat scenario keeps getting complicated, with security professionals battling threats from outside and within the organization. What are the most common strategies in building and maintaining a culture of trust in an organization?
- Addressing the perennial lack of security professionals in-house: Is engaging managed security providers now the rule, rather than the exception?
- Nurturing IT security talent – current initiatives in widening the pool; and what more needs to be done?
- Hot areas for growth in the security space – a close look at security analytics , threat intelligence , mobile security, and cloud security
Sponsorship opportunities are available for service providers of
- Business Intelligence / Analytics & Data Management
- IT Security & Risk Management
- Core Banking & IT Transformation
- Customer Relationship Management
- Cloud, Data Centre & Mobility
- Consultancy, BPO, Communication Systems, Recruitment Services
If you are looking to increase your market share, brand awareness or introduce a new product, this is an opportunity not to be missed.
For more information about becoming a sponsor, please contact:
+65 6394 7696