7th Total Security Conference Singapore
Worldwide spending on cybersecurity is predicted to top $1 trillion for the five-year period from 2017-2021, with cybercrime costing the world $6 trillion annually from 2021, according to the Cybersecurity Market Report, published by Cybersecurity Ventures.
In Singapore, around four in 10 executives reported their organisations fell victim to phishing attacks in the past 12 months, making it the most pervasive cybersecurity and privacy threat faced, according to The Global State of Information Security Survey 2017 done by PwC.
As Singapore strives to be a Smart Nation, a lack of a comprehensive cybersecurity measures could derail the ambitious plans. Now maintaining higher security is not simply good encryption, performed by the security team, but is the responsibility of every stakeholder in the enterprise ecosystem.
NetworkWorld Asia's 7th Annual Total Security Conference running on 25 May 2017 in Singapore is the premier event, gathering policy makers, security experts and leading researchers to present strategies and best practices to deal with the challenges in a connected digital ecosystem.
The annual event, in 2017, will present practical and cost efficient case studies on at what takes to build a resilient and cyber-secure enterprise, what we can learn from the past to predict a safe and secure future, and the necessary governance that businesses need to adopt.
Key Areas of Focus
- Addressing innovation and technology developments in the information security landscape
- Aligning your security team with core business objectives
- Tackling the challenges of moving into a cloud platform while safeguarding critical infrastructure
- Training and investing in your most important resource: your security team
- Strengthening your business resilience to thwart any future cyberattacks
- Developing a vibrant cybersecurity ecosystem to combat attacks on your digital platforms
Why Attend the 7th Annual Total Security Conference
- Gain actionable insights on challenges and opportunities for cybersecurity practice and technologies from globally renowned security subject matter experts
- Learn best practice case studies on Risk Analysis and Management, Cybersecurity, Data Loss Protection, Mobile Security, Threat Intelligence, Digital Forensics, Data Analytics & IoT, and Business Resilience Strategy
- Network with 200+ cyber security practitioners from Singapore and the region
- Understand the strategies for futuristic information security and next-generation offensive and defensive technologies from major service providers
- Benchmark against best-in-class peers across the region and forge collaborative partnerships
Who Should Attend
Business and IT professionals in enterprise-wide security, risk management, BCM or critical infrastructure:
- CIOs, CISOs and CFOs, and chief security, risk, compliance, process and technology officer
- IT vice presidents and directors
- Network security executives and directors
- Governance, risk, compliance, and privacy executives
- BCM and resilience continuity managers
- Finance, audit, legal risk and compliance regulators
- Enterprise and operational risk managers
Keynote 1: Industry Update: The Digital Economy – and it’s new cyber threat landscape
Singapore is making great strides in its journey to becoming a Smart Nation. The increasingly digitalized and connected business environment, coupled with heightened ecommerce participation, signifies a fast-maturing digital economy.
- However, the highly distributed and more open nature of businesses in a digital economy is raising the security stakes and testing even the best resourced organizations. How can businesses arm themselves against a fast-moving and increasingly virulent threat environment – and in doing so, how can they protect their past and future ICT investments?
- How can business organizations ensure success in the digital economy?
Keynote 2: High-Speed Networks – a Boom or Bust for Connected Businesses?
- High-speed broadband connectivity is an increasing priority for connected businesses to deliver superior online service and user experience, with many upgrading – or looking to upgrade – to 10/40/100GbE networks
- While faster networks improve capacity, they also introduce network complexities in supporting a myriad of cloud, mobile, big data, and other bandwidth incentive apps and systems traversing the network – oftentimes, with traffic far exceeding the throughput of existing security and monitoring tools
- How can business organizations make existing, and planned, security infrastructures more effective at identifying and mitigating threats within the networks?
Security Imperatives vs. Investment Priorities
Continued increase in cyber-security incidents globally – including many recent cases right at home.
- Despite increasing threats to businesses, IT security is said to be always an under-spend area. Is IT security still as a low-priority? Should IT security budgets be increased?
- How can Businesses, especially SMBs, balance their need for security, privacy, and agility – against the realities of their IT security budgets?
- How can vendors and solution partners help?
- Emerging partnerships in cybersecurity initiatives
Morning coffee/tea break
Addressing Operational Risks in a Digital Transforming Business World
- In a world in which even sub-second delays in transactional traffic can cost heavy damages to businesses, mitigating operational risks – and focusing beyond malware and data recovery – is key
- Achieving maximum risk mitigation – and least operational disruption at minimal cost
- How network management is changing to impact many areas of IT operational risk management
- How much risk management is too much?
Panel Discussion: Best Practices in Securing Connected Businesses
Disruptive technologies such as cloud, virtualization, mobility, and related technologies continue to drive new innovations that are both changing the way businesses operate and end-users consume products and services – locally and globally – and using a connected devices. These, in turn, are impelling CIOs and senior business executives to update their companies’ digital enterprise strategies.
- Security strategies that help organizations build and sustain a trusted environment across the entire value chain – employees, partners and suppliers, as well as current and potential customers
- How does one get C-Suite execs to recognize security threats and help effect needed top management support to ensure:
- Security is embraced as a critical, high-priority business requirement, and should be a management mandate
- Maximum security awareness by all stakeholders
- Effective governance and incident response framework is in place to prevent security threats
Minimizing Risks in the Cloud
- Current and emerging cloud security issues – and their impact on cloud adoption
- How the cloud is bringing about needed security transformations
- Cloud services - and addressing an increasing range of security vulnerabilities
- What connected businesses should do to ensure security for their cloud-based architecture
Legal Rights and Regulations in Securing Connected Businesses
- Key security, privacy, digital rights and related regulations that connected businesses should know
- Stepping up threat intelligence – without crossing the lines
- Choosing the right security solutions and partners for your connected business
Afternoon Coffee / Tea Break
Current and Emerging Mobile Threats in a Connected World
- Top concerns, both by businesses and individuals, in an increasingly mobile world
- A spotlight on IoT: What are the risks and threats – perceived or real – in a world of connected devices?
- What are the key success drivers – and drawbacks - for IoT implementations across industry verticals?
- IoT and the importance of building consumer trust. But How?
- With smart devices remotely connected to networks, they create potential entry points for security. How have endpoint security management progressed to deal with this?
Panel Discussion: Keeping Security Threats at Bay; and Reputation and Customers Intact
- The security threat scenario keeps getting complicated, with security professionals battling threats from outside and within the organization. What are the most common strategies in building and maintaining a culture of trust in an organization?
- Addressing the perennial lack of security professionals in-house: Is engaging managed security providers now the rule, rather than the exception?
- Nurturing IT security talent – current initiatives in widening the pool; and what more needs to be done?
- Hot areas for growth in the security space – a close look at security analytics , threat intelligence , mobile security, and cloud security
Sponsorship opportunities are available for service providers of
- Business Intelligence / Analytics & Data Management
- IT Security & Risk Management
- Core Banking & IT Transformation
- Customer Relationship Management
- Cloud, Data Centre & Mobility
- Consultancy, BPO, Communication Systems, Recruitment Services
If you are looking to increase your market share, brand awareness or introduce a new product, this is an opportunity not to be missed.
For more information about becoming a sponsor, please contact:
+65 6394 7696