Chief Information Security Officers (CISOs) face significant challenges in ensuring the security of their organisations while enabling digital business in a rapidly evolving landscape. To effectively navigate these challenges, CISOs need to adopt a new strategy that alights with emerging capabilities and industry best practices.

Developing a long-term cybersecurity strategy requires a proactive and adaptable mindset. By embracing emerging technologies, fostering a security-aware culture and staying informed about evolving threats, CISO can position their organisations to navigate the digital landscape securely and enable digital business success.

On 25 April 2024, our 3rd Annual FutureCISO Conference, themed “Securing the Future: Empowering CISOs to Navigate Digital Disruption”, will bring together security, compliance and technology practitioners in Singapore to discuss, debate and strategise issues most critical to the continuing security and arguably, the survivability of business and industries.

Topics to be discussed this year include:

  • Emerging threat landscape
  • Cyber security resilience
  • Risk management and governance
  • Cloud security
  • Robust incident response and cyber crisis management
  • Security operations and threat intelligence
  • Data protection and privacy
  • Security in the age of automation, AI and digital transformation
  • Inside threats and employee awareness
  • Third-party risk management
  • Zero-trust security model
  • Leadership in cyber security
  • Industry standards and regulatory compliance
  • Fostering partnership and collaboration
  • Future trends and technologies



CISOs, CTOs, Directors, Heads, MDs, SVPs, VPs, Leads, involved in:

  • Information Security
  • Cyber Security Architecture and Strategy
  • Security and Technology Risk
  • Cyber Security and Privacy
  • Information and Data Protection
  • Risk and Compliance
  • Cloud Governance and Security


The FutureCFO Conference aims to give CFOs, who also act as their company’s strategic business partner and catalyst, insights on ensuring corporate growth and successfully mitigating risks and challenges amidst the current economic and political uncertainties in their countries. The conference will also address strategies and best practices on how CFOs can reimagine finance functions and their organizations to survive and thrive in today’s fast-paced and digitally driven landscape.

This by-invitation only one-day event will gather over 120 senior finance leaders from multiple industries and offers the best opportunity to hear from the industry’s leading professionals, contribute questions from the floor, engage in incisive panel discussions that discuss real-life business cases, updates and strategies to meet the most pertinent challenges facing the finance function in 2020.

High-Level Industry Speakers

We gather 20+ industry speakers and experts from leading organizations for keynote presentations and incisive discussions so you can tap on their invaluable insights and best practices important to your finance function management and transformation.

Interactive Discussions

Be part of our interactive panel discussions that address the current hot topics, share ideas and experiences and get the answers to your pressing questions from prominent finance leaders on stage.

Networking Opportunities

Meet new business partners, engage and forge new connections with fellow finance and treasury leaders in the region, solution providers and many more at our event through luncheons, coffee breaks, one-to-one meetings and informal introductions.

Targeted In-Depth Sessions

8 hours of learning and networking opportunities packed into 10 in depth sessions. Listen to corporate-driven best practices and case studies sharing that are targeted to your profession through the personalized country-specific conferences we crafted for you - FutureCFO Conferences.



Chairman’s Welcome Remarks
Allan Tan, Group Editor-in-Chief, CXOCIETY


OPENING KEYNOTE: Updates on Cyber Security Law and Regulations in Singapore
  • The current state of cyber security in Singapore
  • Securing cyberspace through stronger policies and capacity building
  • Building trust and security in the new digital order
  • What do the new cyber security rules and guidelines mean to enterprises and CISOs?


PANEL DISCUSSION I: Securing the Future against Cyber Threats in 2024

Gartner predicts that cybercrime damage costs will grow by 15% annually over the next two years, reaching $10.5 trillion USD annually by 2025. The introduction of innovative technologies such as Generative AI, ML, 5G, IoT and quantum computing has bring forth the emergence new threat vectors and surfaces.

As hackers and scammers never sleep, creating the surge of new and more sophisticated attack trends like hacktivism, weaponised deepfakes, phising attacks, ransomware 3.0, data poisoning and more – how can CISO ensure greater maturity in their cyber security initiatives in the increasingly connected and ever-changing world?

  • Emerging threat landscape in 2024
  • Transitioning to a risk-based approach to security
  • Evaluating and updating IT security preparedness strategy
  • Enhancing third-party risk management programs to optimise security of the entire ecosystem
  • Budgeting for cyber security in 2024

Allan Tan, Group Editor-in-Chief, CXOCIETY


KEYNOTE I: Keeping up with Security while Staying Compliant

All types and sizes of organisations are vulnerable to cyberattacks. As the bad guys are using increasingly sophisticated methods to launch cyber assaults and infiltrate computers, enterprises are required to keep up with regulatory compliance pressures to make sure that the company is safeguarding its critical assets.

Non-compliance and regulatory violations can result in hefty costs and legal consequences thus IT leaders need to keep pace with changes on the demanding regulations and industry standards, that are too, getting complex as they are frequently altered to address emerging threats.

  • Meeting the challenges in the shifting compliance landscape
  • The cost of compliance failure
  • Achieving and maintaining compliance
  • Automating compliance across complex sets of industry standards and regulations in different industries and countries
  • Security and compliance automation use cases




KEYNOTE II: Mitigating Generative AI Security Risks

Gartner notes that the trend towards democratised Generative AI (GenAI) leads the way. The research firm also forecasts more than 80% of enterprises will have their own GenAI application programming interfaces and models up and running by 2026. For businesses that are either using SaaS- delivered GenAI or building GenAI applications using cloud-hosted LLMs, ensuring that their organisations are properly securing their use of GenAI is crucial.

  • The new and amplified security risks of GenAI
  • Collaborations with legal, compliance and lines of business (LoBs) to minimise unsanctioned uses of GenAI and reduce privacy risks
  • Implementing a responsible and secure AI framework
  • Ensuring a safe and secure GenAI adoption journey with AI TRisM


PANEL DISCUSSION II: From Hype to Reality: Enabling AI for Cyber Defence

The amalgamation of tightened budget, increased volumes and velocity of cyberattacks, and heightened AI-driven threats has kept CISOs awake at night. To rise above the waves of this perfect storm, CISOs will need to consider embarking on AI integration to transform and fortify their cyber security strategy.

  • Breaking down the hype and unlocking the value of AI in cyber defence
  • Assessing organisation’s readiness for AI integration journey
  • Integrating AI into security programs
  • Fighting AI with AI
  • Best practices of AI applications in cyber protection

Allan Tan, Group Editor-in-Chief, CXOCIETY


FIRESIDE CHAT I: Managing AI, Data Privacy and Governance

AI is the fastest-adopted technology in history and while the adoption of AI tools can be done fairly quickly, it is still in initial stage. As organisations navigate the AI-powered future, IT/IT Security leaders need to ensure the implementation of strong and responsible governance that comes with the widespread of AI adoption.

  • How AI governance and data privacy go hand in hand
  • How to better align data, AI, governance and business goals
  • Challenges in achieving data and AI governance
  • Ensuring compliance with relevant regulations and industry standards
  • Best practices of AI governance


Allan Tan, Group Editor-in-Chief, CXOCIETY

Tarun Samtani, DPO & Privacy Program Director, INTERNATIONAL SOS




KEYNOTE III: Effective Incident Response and Cyber Crisis Management

Security incidents and shakeup in 2024 will cover data breaches, unauthorised access, ransomware, system compromises, IoT cyberattacks and many more. In light of these, CISOs and their teams need to be prepared to handle advanced persistent threats (APTs) and zero-day vulnerabilities by constantly updating and adapting their security measures, including incident response and cyber crisis management plans.

  • The evolving concept of incident response over the years
  • Enabling real-time monitoring and incident response lifecycle capabilities
  • Designing a structured and well-defined incident response process in 2024
  • Deploying incident response technologies of the future
  • Getting the board on-board with cyber crisis management
  • Coordinating with internal and external stakeholders during security incident


FIRESIDE CHAT II: Overcoming Edge Security Risks
  • Security challenges in migrating from cloud to the edge
  • Ensuring security when transitioning to enterprise edge facilities
  • Scaling governance, risk and controls at the edge

Allan Tan, Group Editor-in-Chief, CXOCIETY

Bruce Leong, Director, Technology & Strategy, MOUNT ALVERNIA HOSPITAL


PANEL DISCUSSION III: Doing Cloud Security Right in the Age of AI

As cloud applications are versatile and can be adopted very quickly, cloud-native architectures have experienced rapid growth in the recent years. While cloud deployments are generally prone to various security risks, this risk only increases when integration of AI and ML capabilities into cloud services is involved.

  • The cloud computing landscape in 2024
  • Managing the challenges and complexity in today’s cloud security
  • The new era of cloud application security
  • Infusing AI and automation in strengthening cloud security across the entire software development lifecycle

Allan Tan, Group Editor-in-Chief, CXOCIETY




KEYNOTE IV: Defending against AI-Powered Advanced Persistent Threats

Often regarded as the most dangerous threats, if injected with AI, Advanced Persistent Threats (APTs) can be highly destructive. Analysts believe that APTs will persist as paramount cybersecurity concerns in 2024, particularly amidst global crisis and escalating geopolitical uncertainties.

  • Staying ahead of future developments of APTs
  • The use of AI in APT attacks
  • Proactive threat hunting in detecting APTs
  • Real time network detection and response NDR to mitigate APT risks
  • Fostering external collaboration for threat intelligence sharing


FIRESIDE CHAT III: Cyber Security Leadership in 2024

Gartner predicts that by 2025, lack of talent or human failure will be responsible for over half of significant cyber incidents. How should CISOs strengthen their leadership capabilities and strategy in the midst of challenges that involve human factor, the rise of AI and other emerging threats?

  • The shift in CISO’s responsibilities in 2024
  • Fostering a culture of security awareness
  • Leveraging data in developing cyber security programs
  • Factoring the human factor and insider risks into privileged access management (PAM) and other cybersecurity controls


Allan Tan, Group Editor-in-Chief, CXOCIETY



PANEL DISCUSSION IV: Accelerating Zero-Trust Maturity

Endpoints are enterprises’ first line of defence when it comes to Zero-Trust architecture. In the evolving cyber security landscape, where hackers also incorporate the latest tech innovations into their repertoire of tricks, Zero Trust is pivotal in moderinising CISO’s security practices. How can CISO supercharge their Zero-Trust security model to protect their supply chain, users, data and systems at every access point?

  • Securing the gateway
  • Embracing a ‘data-first’ Zero-Trust security
  • Strengthening security protocols in the supply chain
  • Adopting adaptive and holistic security approach in all Zero-Trust deployments
  • Revamping Zero-Trust security strategy with AI and redefined identity and access management (IAM)


Allan Tan, Group Editor-in-Chief, CXOCIETY

Poh Leng Wee, Head, Information & Cyber Security, SEATRIUM






Allan Tan

Group Editor-in-Chief


Alvin Rodrigues

Editorial Consultant


Amit Gupta

Head of Security Governance, Risk and Control


Anderson Teo

Director, Group IT & Cybersecurity


Antoine Yang

Country Manager


Boris Hajduk

Group CISO


Bryce Boland

Head of Security ASEAN


Christopher Lek

Director, Cyber Security


Danny Chan

Director Regional Security Officer, Asia Pacific


Eric Kong

ASEAN Managing Director


Francis Yeow

Head of Information Security and Country Information Security Officer


Frankie Shuai

APAC Regional Information Security Officer


George Irwin

Director of Engineering


Hwee Cher Tan

Director, IT Security & Governance


Jagathesh Rajavasagam

Risk & Cyber Security Officer APAC


Joey Chua

Head of IT


Justin Ong



Lim Shih Hsien

Head of Technology Masterplanning, CISO and CSO 


Manan Leo Qureshi

BISO/APAC Security Leader, KFC & PizzaHut


Marcus Tan

Head of Cybersecurity (CS), Institute for Infocomm Research (I2R)


Ned Shawa

Senior Director of APJ Solutions Engineering


Phoram Mehta

Senior Director, APAC CISO


Raju Chellam

Chairman, Cloud & Data Standards


Stefan Tapp

Senior Solutions Engineer


Steve Faruque

Program Director, QRadar SIEM Product Management


Steven Sim

Immediate Past President


Viren Mantri



Yum Shoen Yih

Head Special Projects


Speaking Opportunities:


We will help you GENERATE quality business leads.
We will help you INCREASE your regional profile.
We will help you CREATE new business opportunities.

  • Get cost-effective marketing exposure and branding to your target audience, culminating in face-to-face meetings with your prospects.
  • Position and profile yourself as an industry leader.
  • Increase your brand recognition.
  • Create new partnerships and alliances.
  • Develop relationships through new virtual networking opportunities.
  • Showcase new products and services to a targeted audience of decision makers.
  • Get direct and exclusive access to Key decision-makers

Sponsorship Opportunities:


Cloud Partners

Platinum Sponsor

Diamond Sponsor

Breakfast Club Sponsor

Gold Sponsor

Roundtable Sponsor

Silver Sponsor

Partner Sponsor

Supporting Organisation

Diamond Sponsor

Breakfast Club Sponsor

Gold Sponsor

Roundtable Sponsor

Silver Sponsor

Partner Sponsor

Supporting Organisation

Supporting Media

Travel Partner

Networking Partners

Analyst Partner

Document Management Partner

Bag Sponsor

Lucky Draw Sponsors

Supporting Organizations

Supporting Media


Share this event:

This section is currently for viewing only - it includes a Gallery and Testimonial section. Once the page go live, this section will be hidden until post-event photos & reviews are available.


CXOCIETY (reads “society”) provides engagements with the C-level community in Asia through Digital Media, Custom Content, Events, and Research and Reports. The leadership team at CXOCIETY has over 50 years of experience in C-Level Engagements and truly understands the challenges faced by C-level executives in their day-to-day work.

Enterprises in every industry need to navigate digital and business transformation with speed and agility. They require a technology consulting services partner that understands the stakes of this moment and will work with them to successfully drive business outcomes. IBM Consulting is IBM’s consulting and global professional services business, with marketleading capabilities in business and technology transformation. With 140,000+ skilled professionals in 150+ countries, we offer strategy, experience, technology, and operations services to many of the most innovative and valuable companies in the world, accelerating our clients’ businesses through the power of collaboration.

Find out more at

Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 75 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at

SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time—matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.

Sumo Logic, Inc. (NASDAQ: SUMO) empowers the people who power modern, digital business. Through its SaaS analytics platform, Sumo Logic enables customers to deliver reliable and secure cloud-native applications. The Sumo Logic Continuous Intelligence Platform™ helps practitioners and developers ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures. Customers around the world rely on Sumo Logic to get powerful real-time analytics and insights across observability and security solutions for their cloud-native applications. For more information, visit

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices.

HashiCorp’s portfolio of products includes Vagrant™, Packer™, Terraform®, Vault™, Consul®, Nomad™, Boundary™, and Waypoint™. HashiCorp offers products as open source, enterprise, and as managed cloud services.

At Synology, we believe professional business solutions should be available to companies and teams of all sizes. For more than two decades, we have helped our customers excel at what they do by creating innovative hardware and software solutions to overcome data management and security challenges. Each Synology product is crafted for maximum simplicity, compatibility, flexibility, and reliability. Engineered to last and with a best-in-class operating system, it is easy to see why millions of users rely on Synology daily. As of today, 10 million+ Synology systems are running worldwide, with 70+ exabytes of data actively stored and protected and 670,000+ organizations protecting their endpoint and SaaS data with Synology.

ISACA provides thought leadership in IT governance, risk, audit, cybersecurity and privacy. It serves 170,000 members in 188 countries carrying CISA, CISM, CRISC, CGEIT, CDPSE certifications and has 225 chapters.

The ISACA Singapore Chapter engages more than 3,000 members, runs two annual conferences (GTACS and SheLeadsTech) and 2 to 4 events monthly benefiting both members and the public locally and globally. It was also the best regional non-profit organisation at The Cybersecurity Awards 2019. More details may be found at

SAP is the market leader in enterprise application software, helping companies of all sizes and in all industries run at their best: SAP customers generate 87% of total global commerce. Our machine learning, Internet of Things (IoT), and advanced analytics technologies help turn customers’ businesses into intelligent enterprises. Our end-to-end suite of applications and services enables our customers to operate profitably, adapt continuously, and make a difference. At SAP, our purpose is to help the world run better and improve people’s lives. Our promise is to innovate to help our customers run at their best. SAP is committed to helping every customer become a best-run business. We engineer solutions to fuel innovation, foster equality, and spread opportunity across borders and cultures. Together, with our customers and partners, we can transform industries, grow economies, lift up societies, and sustain our environment.