7th Total Security Conference Singapore
Worldwide spending on cybersecurity is predicted to top $1 trillion for the five-year period from 2017-2021, with cybercrime costing the world $6 trillion annually from 2021, according to the Cybersecurity Market Report, published by Cybersecurity Ventures.
In Singapore, around four in 10 executives reported their organisations fell victim to phishing attacks in the past 12 months, making it the most pervasive cybersecurity and privacy threat faced, according to The Global State of Information Security Survey 2017 done by PwC.
As Singapore strives to be a Smart Nation, a lack of a comprehensive cybersecurity measures could derail the ambitious plans. Now maintaining higher security is not simply good encryption, performed by the security team, but is the responsibility of every stakeholder in the enterprise ecosystem.
NetworkWorld Asia's 7th Annual Total Security Conference running on 25 May 2017 in Singapore is the premier event, gathering policy makers, security experts and leading researchers to present strategies and best practices to deal with the challenges in a connected digital ecosystem.
The annual event, in 2017, will present practical and cost efficient case studies on at what takes to build a resilient and cyber-secure enterprise, what we can learn from the past to predict a safe and secure future, and the necessary governance that businesses need to adopt.
Key Areas of Focus
- Addressing innovation and technology developments in the information security landscape
- Aligning your security team with core business objectives
- Tackling the challenges of moving into a cloud platform while safeguarding critical infrastructure
- Training and investing in your most important resource: your security team
- Strengthening your business resilience to thwart any future cyberattacks
- Developing a vibrant cybersecurity ecosystem to combat attacks on your digital platforms
Why Attend the 7th Annual Total Security Conference
- Gain actionable insights on challenges and opportunities for cybersecurity practice and technologies from globally renowned security subject matter experts
- Learn best practice case studies on Risk Analysis and Management, Cybersecurity, Data Loss Protection, Mobile Security, Threat Intelligence, Digital Forensics, Data Analytics & IoT, and Business Resilience Strategy
- Network with 200+ cyber security practitioners from Singapore and the region
- Understand the strategies for futuristic information security and next-generation offensive and defensive technologies from major service providers
- Benchmark against best-in-class peers across the region and forge collaborative partnerships
Who Should Attend
Business and IT professionals in enterprise-wide security, risk management, BCM or critical infrastructure:
- CIOs, CISOs and CFOs, and chief security, risk, compliance, process and technology officer
- IT vice presidents and directors
- Network security executives and directors
- Governance, risk, compliance, and privacy executives
- BCM and resilience continuity managers
- Finance, audit, legal risk and compliance regulators
- Enterprise and operational risk managers
Registration & Welcome Coffee
Opening Remarks by Chairperson
Examining the Current Security Landscape
The Cost of Not Investing in Cybersecurity – Liability Issues
• Beyond ROI: How organizations may be liable for cybersecurity breaches
• How to measure effectiveness and efficiency of IT security controls and processes
• How to motivate internal stakeholders for buy-in into implementing a holistic security strategy
Incorporating Cost Efficient Cybersecurity Systems in the Logistics Industry: A Case Study
• The road of green field setup for global organisation
• Constant balancing between security and requirements from operations and business. Developing an effective IT
• Potential future IT Security concerns and possible mitigation measures
Panel Discussion: Adopting an Inside-Out Approach to Security: Reinforcing the Culture of Security within the Wider Organisation
From presidential campaigns to corporate espionage, history has shown that the biggest source of danger could be disenfranchised employees, current and former
• How can we mitigate the threat from human resources and find ways to actively monitor activity without compromising employee privacy?
• Creating a shift in culture, awareness and training on cyber security: how to move towards a more people-focused approach
• Risk-based thinking: how can we drive digital disruption while evading the security risks in the process?
Head – Data Center,
Director – Information Technology & Projects,
Networking Coffee Break
Impact of Emerging Technologies on IT Security
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
• How new machine learning and mathematics are automating advanced cyber defense
• Why 100% network visibility allows you to detect threats as they happen, or before they happen
• How smart prioritization and visualization of threats allows for better resource allocation and lower risk
• Real-world examples of unknown threats detected by ‘immune system’ technology
How to Build an Effective Cyber Defense Portfolio Using a “Defense Matrix”
• Assessing your current capabilities
• Understanding capability needs and future state modelling
• Establishing a balanced portfolio
WannaCry Ransomware Attacks: Lessons Learnt and Taking it Forward
• Dissecting the attack episode
• Sharing the cybersecurity strategy needed to better secure the organization
• Top 3 key takeaways for security practitioners from the recent ransomware attacks
The Immediate Future of Cyber-Security Technologies
How will Security Governance and Standards Look Like in 2020?
Is Singapore’s new Cybersecurity Act a benchmark for how regulators and organizations should work together to on sharing of information and resolve incidents in a timely manner?
• Is there a consensus and systematic evolution of global cyber-regulations?
• What are the best governance practices adopted by best-in-class organizations?
• Updates from the SG framework under the Smart Nation vision and National Cyber Security Masterplan
Networking Tea Break
Creating an Agile and Secure IT Architecture: Moving from Recovery Mode towards Improved Business Resiliency
Maintaining credibility is critical for enterprises to ensure sustainable business continuance. How to prepare businesses for the unknown by anticipating enterprise risks early and how to adapt the IT architecture into a resilient framewor
• Cost efficient techniques for transiting from a recovery to resilience IT ecosystem
• How to minimise security breaches and ensure business continuity during breaches
• Understanding the business impact of security lapses and developing resilient IT architecture
The Future of Organizational Cyber Security in a Digital Economy
With the rapid advancement and faster integration of cloud, wearables, mobiles, e-payments and other technology, organizations are open to cybersecurity breaches.
• Where are the common gaps in today’s mainstream cyber security strategies?
• Are we seeing the complete picture yet?
• Would we be able to collectively develop an assurance framework?
Chairman’s Summary and Concluding Remarks
End of Conference
Sponsorship opportunities are available for service providers of
- Business Intelligence / Analytics & Data Management
- IT Security & Risk Management
- Core Banking & IT Transformation
- Customer Relationship Management
- Cloud, Data Centre & Mobility
- Consultancy, BPO, Communication Systems, Recruitment Services
If you are looking to increase your market share, brand awareness or introduce a new product, this is an opportunity not to be missed.
For more information about becoming a sponsor, please contact:
+65 6394 7696