Architect Your Security and Risk Strategies

Days
Hours
Minutes
Seconds

EVENT OVERVIEW

The past three years have taught organisations that an expanding digital footprint brings with it evolving security challenges. For all the benefits and opportunities presented by the hybrid workplace and cloud-based digital-native business processes, these bring with them heightened risks in the form of sustained big game ransomware attacks, multiple attacks on the digital supply chain, deeply embedded vulnerabilities, and increasing attacks on identity systems.

The cumulative security challenges are exacerbated by a shortage of skilled and experienced security and professionals at all levels. Gartner advises security and risk management leaders to transform their organisation’s security practice to keep pace with business demand and a constantly evolving threat environment. Security professionals are also encouraged to find the optimal balance between their dual missions of protecting their organisation and ensuring cybersecurity proves its value as a strategic business enabler.

CXOCIETY is pleased to hold our second annual FutureCISO Conference in-person in Singapore on 25 May 2023 under the theme of “Architect Your Security and Risk Strategy”. This event is about enabling security and risk management leaders, as well as leaders within the organisation, to understand how their roles as charter members of their organisation’s transformation ambition will evolve in the years to come.

This event will gather senior information security professionals from multiple industries in Singapore to address CISO’s top security trends, pressing concerns and business priorities this year. Some topics to be addressed at this event include:

  • Key cyber security trends and risks in 2023-2024
  • Security monitoring, detection, and response
  • Managing a wide set of risks that go beyond traditional approaches
  • Enhancing the effectiveness of CISO and security team as strategic cybersecurity professionals
  • Orchestrating an IAM strategy that aligned to evolving business strategies
  • Building workable partnerships across functional departments and supplier ecosystems
  • Prioritising digital supply chain risk and encouraging security best practices
  • Aligning security modernisation to business transformation initiatives
  • Delivering security in a cloud-application-centric and hybrid work future
  • Building holistic behaviour and culture change programs to provoke more secure ways of working
  • Overcoming the cybersecurity talent shortage

WHO SHOULD ATTEND?

CISOs, CTOs, Directors, Heads, MDs, SVPs, VPs, Leads, involved in:

  • Information Security
  • Cyber Security Architecture and Strategy
  • Security and Technology Risk
  • Cyber Security and Privacy
  • Information and Data Protection
  • Risk and Compliance
  • Cloud Governance and Security

WHY YOU SHOULD ATTEND

The FutureCFO Conference aims to give CFOs, who also act as their company’s strategic business partner and catalyst, insights on ensuring corporate growth and successfully mitigating risks and challenges amidst the current economic and political uncertainties in their countries. The conference will also address strategies and best practices on how CFOs can reimagine finance functions and their organizations to survive and thrive in today’s fast-paced and digitally driven landscape.

This by-invitation only one-day event will gather over 120 senior finance leaders from multiple industries and offers the best opportunity to hear from the industry’s leading professionals, contribute questions from the floor, engage in incisive panel discussions that discuss real-life business cases, updates and strategies to meet the most pertinent challenges facing the finance function in 2020.

High-Level Industry Speakers

We gather 20+ industry speakers and experts from leading organizations for keynote presentations and incisive discussions so you can tap on their invaluable insights and best practices important to your finance function management and transformation.

Interactive Discussions

Be part of our interactive panel discussions that address the current hot topics, share ideas and experiences and get the answers to your pressing questions from prominent finance leaders on stage.

Networking Opportunities

Meet new business partners, engage and forge new connections with fellow finance and treasury leaders in the region, solution providers and many more at our event through luncheons, coffee breaks, one-to-one meetings and informal introductions.

Targeted In-Depth Sessions

8 hours of learning and networking opportunities packed into 10 in depth sessions. Listen to corporate-driven best practices and case studies sharing that are targeted to your profession through the personalized country-specific conferences we crafted for you - FutureCFO Conferences.

AGENDA

09:00

Chairman’s Welcome Remarks

Alvin Rodrigues, Editorial Consultant, CXOCIETY

09:15

OPENING ADDRESS: Singapore’s Blueprint for a Cyber Secure Future

In 2022, Singapore was ranked 6th in the world for having the number of exposed databases to the internet, of which hackers could easily breach and exploit. The statistics of this finding was found to have grown steadily throughout the year in parallel with the increased digitalisation during the pandemic. This session will look at the latest cyber security landscapes in Singapore and government’s strategy in developing cyber resilience in enterprises for a cyber-safe country in the years to come.

  • Singapore’s cybersecurity landscape
  • Cybersecurity as a business risk management issue
  • Transforming mindsets – cybersecurity as a competitive advantage
  • Cybersecurity as a collective responsibility


Yum Shoen Yih, Head Special Projects, CYBER SECURITY AGENCY OF SINGAPORE (CSA)

09:40

PANEL DISCUSSION I: Improving Cyber Security Posture Amidst the Evolution of Cybersecurity Risks in 2023-2024

Cybersecurity constantly changes as evolving technologies and fast-changing world introduce new type of cyber-attacks. The seemingly never-ending increase in cyber threats coupled with higher pressure on regulatory compliance mean that today’s CISOs are faced with new complexities to keep business operations running smoothly and staying compliant.

  • The rise of metaverse and changing threat landscape for critical infrastructure – which areas of security should CISO focus on? 
  • Evaluating, communicating and responding to evolving threats
  • Balancing security with performance, resilience and agility
  • Achieving regulatory compliance while enhancing security capabilities
  • Managing a wide set of risks beyond traditional approaches

 

Moderator:
Alvin Rodrigues, Editorial Consultant, CXOCIETY

Panelists:
Marcus Tan, Head of Cybersecurity (CS), Institute for Infocomm Research (I2R), A*STAR
Danny Chan, Director, Regional Security Officer, Asia Pacific, MASTERCARD
Christopher Lek, Director, Cyber Security, NANYANG TECHNOLOGICAL UNIVERSITY
Justin Ong, APAC CISO, PANASONIC ASIA PACIFIC

10:15

KEYNOTE I: Detecting Hidden Threats in the Age of AI

With the recent rise of ChatGPT and other generative AI, it looks like AI is here to stay and shape our world. How can the field of cyber security leverage AI to make their investigation faster and detection more accurate? How can AI help the good guys predict the next big attack? This talk will explore ways we can harness the power of AI.

  • What exactly are AI and ML and how can you leverage it?
  • Machine Learning models for anomaly detection
  • The power of predictive analytics
  • Closing the skills gap with AI


Steve Faruque, Program Director, QRadar SIEM Product Management, IBM

10:40

MORNING COFFEE BREAK & NETWORKING

11:10

FIRESIDE CHAT I: Building a Successful Zero Trust Security Strategy

We are now living in a multi-cloud world, reaping the benefits of increased agility, virtually unlimited scale, and the ability to deploy applications in a matter of clicks.

From this talk, learn the obstacles to securing multi-cloud and how to accelerate multi-cloud security with a resilient, fully managed infrastructure and simple, repeatable deployments so your teams can get started in a matter of clicks. Also, this session will share the use cases in securing IT environment when transitioning to a cloud operating environment.


Ned Shawa, Senior Director of APJ Solutions Engineering, HASHICORP
George Irwin, Director of Engineering, SPH MEDIA

11:35

PANEL DISCUSSION II: Security Modernisation for the Cloud

Nearly half of all data breaches happen in the cloud. Ransomware, malware, phishing emails and data leakage continue to evolve with new techniques and attack vectors identified by malicious actors, probing every inch of IT protection especially in the cloud environments and cloud-based mail servers.

With more enterprises adopting a hybrid cloud approach to help drive their digital transformation initiatives, how should organisations successfully manage and secure their cloud-native applications and hybrid cloud environments holistically?

  • Metrics for measuring cyber security maturity programs
  • Adapting security for increased cloud dependency
  • Aligning security modernisation to business transformation initiatives in a cloud-application-centric and hybrid work environments
  • Building cost-efficient and predictive security strategy that supports modern applications effectively

 

Moderator:
Allan Tan, Group Editor-in-Chief, CXOCIETY

Panelists:
Lim Shih Hsien, Head of Technology Masterplanning, CISO and CSO, CERTIS GROUP
Boris Hajduk, Group CISO, GOTO GROUP
Raju Chellam, Chairman, Cloud & Data Standards, ITSC (IT STANDARDS COMMITTEE)
Phoram Mehta, Senior Director, APAC CISO, PAYPAL

12:10

Pulse Survey on Identity Management
  • How safe is your staff’s or client’s identity?
  • Will you pass the test or need to trigger your risk management protocol?
  • The dos and don’ts

Eric Kong, ASEAN Managing Director, SAILPOINT

12:25

FIRESIDE CHAT II: Building a Modern Enterprise Security Architecture

During the pandemic, organisations shifted their strategies from aiming to reach a defined future, to becoming more resilient and adaptive. This has led to changes to the priorities of organisations, their operating models, and how they utilise technology and secure the enterprise.

With Asia-Pacific the most attacked region in the world, according to the IBM X-Force Threat Intelligence Index report, what is needed is a unified approach to security that covers the entire IT stack, where everyone in the organisation is accountable for helping the enterprise balance risks and benefits.


Interviewer:
Allan Tan, Group Editor-in-Chief, CXOCIETY

Interviewees:
Bryce Boland, Head of Security ASEAN, AWS
Stefan Tapp, Senior Solutions Engineer, SUMO LOGIC

13:00

NETWORKING LUNCH

14:00

Chairman’s Welcome Remarks

Allan Tan, Group Editor-in-Chief, CXOCIETY

14:05

KEYNOTE II: The New Age of Incidents Recovery Plans Amid the Shifting Threats

There is one thing in common between cyber security resources and breaches: Both cost money. However, recovering from the latter can be extremely stressful, challenging and costly for businesses. Lack of preparation in a response plan, if an incident were to occur, leaves organization at the risk of being unable to handle an attack effectively and even being vulnerable to further attacks.

  • Key factors that determine the cost of security breaches
  • Measures to rensponse to an incident
  • Designing effective threat management and incident response strategies
  • Implementing successful incident response plans, policies and recovery plans
  • Scaling up response plan to remain resilient and recover quickly after an attack

 

Antoine Yang, Country Manager, SYNOLOGY

14:30

PANEL DISCUSSION III: Managing the Human Factors in Cyber Security in the New Era

The Q3 of 2022 saw a peak in insider threats. According to a report by Kroll, insider threats accounted for nearly 35% of all unauthorized access cyber incidents in the third quarter of 2022, its highest quarterly level to date. The surge is mainly due to the phenomenon of the ‘great resignation’ in the wake of the COVID-19 pandemic and the shift to remote work. As insider risk is an ongoing challenge that cannot be overlooked, how should CISO work together with the stakeholders across the enterprise to develop a comprehensive strategy to manage inside risk?

  • The evolving definition of insider risks vs. insider threat
  • Rethinking the enterprise’s security posture to guard against the threats within
  • Creating a framework to evaluate and mitigate insider risk
  • Continuous behavior monitoring to thwart the risk of insider threats
  • Deploying security policy controls in cloud-managed data repositories
  • Leveraging end-point security management in the era of hybrid work


Moderator:
Allan Tan, Group Editor-in-Chief, CXOCIETY

Panelists:
Jagathesh Rajavasagam, Risk & Cyber Security Officer, ABBOTT
Amit Gupta, Head of Security Governance, Risk and Control, BUKALAPAK
Hwee Cher Tan, Director, IT Security & Governance, CGS-CIMB SECURITIES
Francis Yeow, Head of Information Security and Country Information Security Officer, PARKWAY HOSPITALS SINGAPORE

15:05

FIRESIDE CHAT III: Building A Cyber-Ready Workforce: Can We Stop Attacks Before They Start?

At the World Economic Forum 2023, cybersecurity was named a top concern as there are acute shortages of IT security professionals who are able to tackle the cyber security issues.

On top of this, every employee of companies in today’s digital economy inherently comes with risks and security concerns. Therefore, other than the organisation’s IT and IT security personnel, they are key in keeping the organisation’s safe from digital threats.

  • Building a positive security culture
  • How to get people to care about security and risk
  • Blueprint to ensure organisation’s workforce actually mitigates risk while improving the bottom line
  • DEI approach for cybersecurity talent strategies

 

Interviewer:
Allan Tan, Group Editor-in-Chief, CXOCIETY

Interviewee:
Joey Chua, Head of IT, GULF MARINE

15:30

AFTERNOON COFFEE BREAK & NETWORKING

16:00

PANEL DISCUSSION IV: A Friend or Foe: Managing the AI-Driven Shifting Cybersecurity Landscape

2023 marks the beginning of a new era in cybersecurity, using AI technology for both good (cyber protection) and bad (cybercrimes). Enterprise IT security leaders can leverage the latest AI-based security tools to better detect threats, protect their systems and safeguard data resources. However, as result of the maturity of AI technology, cyber attackers can also benefit from the AI-powered technology to launch more sophisticated attacks such as through CHATGPT and AI-generated phising emails.

  • How AI shapes cyber security in the future
  • AI as a new tool for cyber criminals
  • Deterring cyber criminals in the age of AI
  • Use cases in cybersecurity practices using AI

 

Moderator:
Allan Tan, Group Editor-in-Chief, CXOCIETY

Panelists:
Frankie Shuai, APAC Regional Information Security Officer, DWS GROUP
Viren Mantri, CISO, SC VENTURES
Anderson Teo, Director, Group IT & Cybersecurity, YEO HIAP SENG (YEO’S) SINGAPORE
Manan Leo Qureshi, BISO/APAC Security Leader, KFC & PizzaHut, YUM! BRANDS

16:35

CLOSING KEYNOTE: A Look Ahead: Mapping Enterprise IT Security Preparedness in 2023-2024
  • Top IT and security trends impacting enterprises in 2023-2024
  • The change of cyber landscape and security management from before 2020 and between 2020-2022
  • How ASEAN and Singapore enterprises are adapting to the next normal
  • Recommendations to stay on top of emerging and enterprise risks in the coming years

 

Steven Sim, Immediate Past President, ISACA SINGAPORE CHAPTER

17:00

CHAIRMAN’S CLOSING REMARKS & END OF EVENT

SPEAKERS

Allan Tan

Group Editor-in-Chief

CXOCIETY

Alvin Rodrigues

Editorial Consultant

CXOCIETY

Amit Gupta

Head of Security Governance, Risk and Control

BUKALAPAK

Anderson Teo

Director, Group IT & Cybersecurity

YEO HIAP SENG (YEO’S) SINGAPORE

Antoine Yang

Country Manager

SYNOLOGY

Boris Hajduk

Group CISO

GOTO GROUP

Bryce Boland

Head of Security ASEAN

AWS

Christopher Lek

Director, Cyber Security

NANYANG TECHNOLOGICAL UNIVERSITY

Danny Chan

Director, Regional Security Officer, Asia Pacific

MASTERCARD

Eric Kong

ASEAN Managing Director

SAILPOINT

Francis Yeow

Head of Information Security and Country Information Security Officer

PARKWAY HOSPITALS SINGAPORE

Frankie Shuai

APAC Regional Information Security Officer

DWS GROUP

George Irwin

Director of Engineering

SPH MEDIA

Hwee Cher Tan

Director, IT Security & Governance

CGS-CIMB SECURITIES

Jagathesh Rajavasagam

Risk & Cyber Security Officer APAC

ABBOTT

Joey Chua

Head of IT

GULF MARINE

Justin Ong

APAC CISO & CPO

PANASONIC ASIA PACIFIC

Lim Shih Hsien

Head of Technology Masterplanning, CISO and CSO 

CERTIS GROUP

Manan Leo Qureshi

BISO/APAC Security Leader, KFC & PizzaHut

YUM! BRANDS

Marcus Tan

Head of Cybersecurity (CS), Institute for Infocomm Research (I2R)

A*STAR

Ned Shawa

Senior Director of APJ Solutions Engineering

HASHICORP

Phoram Mehta

Senior Director, APAC CISO

PAYPAL

Raju Chellam

Chairman, Cloud & Data Standards

ITSC (IT STANDARDS COMMITTEE)

Stefan Tapp

Senior Solutions Engineer

SUMO LOGIC

Steve Faruque

Program Director, QRadar SIEM Product Management

IBM

Steven Sim

Immediate Past President

ISACA SINGAPORE CHAPTER

Viren Mantri

CISO

SC VENTURES

Yum Shoen Yih

Head Special Projects

CYBER SECURITY AGENCY (CSA) OF SINGAPORE

Speaking Opportunities:

WHY SPONSOR

We will help you GENERATE quality business leads.
We will help you INCREASE your regional profile.
We will help you CREATE new business opportunities.

  • Get cost-effective marketing exposure and branding to your target audience, culminating in face-to-face meetings with your prospects.
  • Position and profile yourself as an industry leader.
  • Increase your brand recognition.
  • Create new partnerships and alliances.
  • Develop relationships through new virtual networking opportunities.
  • Showcase new products and services to a targeted audience of decision makers.
  • Get direct and exclusive access to Key decision-makers

Sponsorship Opportunities:

SPONSORS & PARTNERS

Cloud Partners

Platinum Sponsor

Diamond Sponsor

Breakfast Club Sponsor

Gold Sponsor

Roundtable Sponsor

Silver Sponsor

Partner Sponsor

Supporting Organisation

Diamond Sponsor

Breakfast Club Sponsor

Gold Sponsor

Roundtable Sponsor

Silver Sponsor

Partner Sponsor

Supporting Organisation

Supporting Media

Travel Partner

Networking Partners

Analyst Partner

Document Management Partner

Bag Sponsor

Lucky Draw Sponsors

Supporting Organizations

Supporting Media

VENUE

Share this event:

This section is currently for viewing only - it includes a Gallery and Testimonial section. Once the page go live, this section will be hidden until post-event photos & reviews are available.

POST-EVENT HAPPENINGS

CXOCIETY (reads “society”) provides engagements with the C-level community in Asia through Digital Media, Custom Content, Events, and Research and Reports. The leadership team at CXOCIETY has over 50 years of experience in C-Level Engagements and truly understands the challenges faced by C-level executives in their day-to-day work.

Enterprises in every industry need to navigate digital and business transformation with speed and agility. They require a technology consulting services partner that understands the stakes of this moment and will work with them to successfully drive business outcomes. IBM Consulting is IBM’s consulting and global professional services business, with marketleading capabilities in business and technology transformation. With 140,000+ skilled professionals in 150+ countries, we offer strategy, experience, technology, and operations services to many of the most innovative and valuable companies in the world, accelerating our clients’ businesses through the power of collaboration.

Find out more at https://www.ibm.com/consulting/sg-en/.

Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 75 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com.

SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time—matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.

Sumo Logic, Inc. (NASDAQ: SUMO) empowers the people who power modern, digital business. Through its SaaS analytics platform, Sumo Logic enables customers to deliver reliable and secure cloud-native applications. The Sumo Logic Continuous Intelligence Platform™ helps practitioners and developers ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures. Customers around the world rely on Sumo Logic to get powerful real-time analytics and insights across observability and security solutions for their cloud-native applications. For more information, visit www.sumologic.com.

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices.

HashiCorp’s portfolio of products includes Vagrant™, Packer™, Terraform®, Vault™, Consul®, Nomad™, Boundary™, and Waypoint™. HashiCorp offers products as open source, enterprise, and as managed cloud services.

At Synology, we believe professional business solutions should be available to companies and teams of all sizes. For more than two decades, we have helped our customers excel at what they do by creating innovative hardware and software solutions to overcome data management and security challenges. Each Synology product is crafted for maximum simplicity, compatibility, flexibility, and reliability. Engineered to last and with a best-in-class operating system, it is easy to see why millions of users rely on Synology daily. As of today, 10 million+ Synology systems are running worldwide, with 70+ exabytes of data actively stored and protected and 670,000+ organizations protecting their endpoint and SaaS data with Synology.

Welcome to the Singapore Chapter of ISACA. Formerly known as the Information Systems Audit and Control Association, ISACA is a global professional association and leader in IS/IT for over 50 years and is committed to the advancement of digital trust by empowering IS/IT professionals to grow their skills and knowledge in audit, governance, cybersecurity, emerging technologies and more. ISACA provides globally recognised and in-demand certifications in assurance (Certified Information Systems Auditor), security (Certified Information Security Manager), governance (Certified in the Governance of Enterprise IT), risk (Certified in Risk and Information Systems Control), data privacy (Certified Data Privacy Solutions Engineer) and cybersecurity operations (Certified Cybersecurity Operations Analyst). The association is one of the individual members, often the sole practitioner of information systems auditing, security, and/or governance in his or her company. The membership of the ISACA reflects a multiplicity of backgrounds and skills that make the information systems governance field challenging and dynamic.

Established on 31 January 1983, the Singapore Chapter aims to help our members advance their leadership skills and career. The Chapter sponsors local educational seminars and workshops, conducts regular chapter meetings, and helps to further promote and elevate the visibility of the IS audit, control, governance and security profession throughout the area. Today, the Singapore Chapter has over 3,600 members and is run by volunteers who are ISACA members nominated and elected through the Singapore Chapter Annual General Meeting (AGM). ISACA members’ participation in running the chapter are highly encouraged. More information may be found at https://www.isaca.org.sg.

As a global leader in enterprise applications and business AI, SAP stands at the nexus of business and technology. For over 50 years, organizations have trusted SAP to bring out their best by uniting business-critical operations spanning finance, procurement, HR, supply chain, and customer experience. For more information, visit www.sap.com