The past three years have taught organisations that an expanding digital footprint brings with it evolving security challenges. For all the benefits and opportunities presented by the hybrid workplace and cloud-based digital-native business processes, these bring with them heightened risks in the form of sustained big game ransomware attacks, multiple attacks on the digital supply chain, deeply embedded vulnerabilities, and increasing attacks on identity systems.

The cumulative security challenges are exacerbated by a shortage of skilled and experienced security and professionals at all levels. Gartner advises security and risk management leaders to transform their organisation’s security practice to keep pace with business demand and a constantly evolving threat environment. Security professionals are also encouraged to find the optimal balance between their dual missions of protecting their organisation and ensuring cybersecurity proves its value as a strategic business enabler.

CXOCIETY is pleased to hold our second annual FutureCISO Conference in-person in Singapore on 25 May 2023 under the theme of “Architect Your Security and Risk Strategy”. This event is about enabling security and risk management leaders, as well as leaders within the organisation, to understand how their roles as charter members of their organisation’s transformation ambition will evolve in the years to come.

This event will gather senior information security professionals from multiple industries in Singapore to address CISO’s top security trends, pressing concerns and business priorities this year. Some topics to be addressed at this event include:

  • Key cyber security trends and risks in 2023-2024
  • Security monitoring, detection, and response
  • Managing a wide set of risks that go beyond traditional approaches
  • Enhancing the effectiveness of CISO and security team as strategic cybersecurity professionals
  • Orchestrating an IAM strategy that aligned to evolving business strategies
  • Building workable partnerships across functional departments and supplier ecosystems
  • Prioritising digital supply chain risk and encouraging security best practices
  • Aligning security modernisation to business transformation initiatives
  • Delivering security in a cloud-application-centric and hybrid work future
  • Building holistic behaviour and culture change programs to provoke more secure ways of working
  • Overcoming the cybersecurity talent shortage


CISOs, CTOs, Directors, Heads, MDs, SVPs, VPs, Leads, involved in:

  • Information Security
  • Cyber Security Architecture and Strategy
  • Security and Technology Risk
  • Cyber Security and Privacy
  • Information and Data Protection
  • Risk and Compliance
  • Cloud Governance and Security


The FutureCFO Conference aims to give CFOs, who also act as their company’s strategic business partner and catalyst, insights on ensuring corporate growth and successfully mitigating risks and challenges amidst the current economic and political uncertainties in their countries. The conference will also address strategies and best practices on how CFOs can reimagine finance functions and their organizations to survive and thrive in today’s fast-paced and digitally driven landscape.

This by-invitation only one-day event will gather over 120 senior finance leaders from multiple industries and offers the best opportunity to hear from the industry’s leading professionals, contribute questions from the floor, engage in incisive panel discussions that discuss real-life business cases, updates and strategies to meet the most pertinent challenges facing the finance function in 2020.

High-Level Industry Speakers

We gather 20+ industry speakers and experts from leading organizations for keynote presentations and incisive discussions so you can tap on their invaluable insights and best practices important to your finance function management and transformation.

Interactive Discussions

Be part of our interactive panel discussions that address the current hot topics, share ideas and experiences and get the answers to your pressing questions from prominent finance leaders on stage.

Networking Opportunities

Meet new business partners, engage and forge new connections with fellow finance and treasury leaders in the region, solution providers and many more at our event through luncheons, coffee breaks, one-to-one meetings and informal introductions.

Targeted In-Depth Sessions

8 hours of learning and networking opportunities packed into 10 in depth sessions. Listen to corporate-driven best practices and case studies sharing that are targeted to your profession through the personalized country-specific conferences we crafted for you - FutureCFO Conferences.



Chairman’s Welcome Remarks

Allan Tan, Group Editor-in-Chief, CXOCIETY


PANEL DISCUSSION I: The Evolution of Cybersecurity in 2023-2024

Cybersecurity constantly changes as evolving technologies and fast-changing world introduce new type of cyber-attacks. The seemingly never-ending increase in cyber threats coupled with higher pressure on regulatory compliance mean that today’s CISOs are faced with new complexities to keep business operations running smoothly and staying compliant.

  • Top security concerns in 2023-2024: How ASEAN and Singapore enterprises are adapting to the next normal
  • The rise of metaverse and changing threat landscape for critical infrastructure – which areas of security should CISO focus on? 
  • Evaluating, communicating and responding to evolving threats
  • Balancing security with performance, resilience and agility
  • Achieving regulatory compliance while enhancing security capabilities
  • Managing a wide set of risks beyond traditional approaches

Allan Tan, Group Editor-in-Chief, CXOCIETY


KEYNOTE I: Managing the Evolving Threat of Supply Chain Attacks

Cybercrimes hit all-time high in 2021 with business suffered 50% more cyber-attacks attempts per week in 2021. Digital acceleration, increase reliance on cloud-based solutions and as third-party services in today’s hyper-connected world have made it more difficult for security teams to manage and harden their security posture. As the surgfaces of cyber-attacks have expanded and become more sophisticated, enterprises need to have proper cyber security visibility and control framework to keep track and protect their dynamic and distributed IT environments.

  • The emerging next-generation of supply chain attacks
  • The expanded new network perimeter in the hybrid work era
  • Building a proactive and resilient supply chain security with ZTNA
  • Getting the most out of XDR: Delivering visibility, control, protection and remediation for supply chain, IoT and ransomware attacks
  • Ensuring supply chain security with governance and holistic cybersecurity management


FIRESIDE CHAT I: Managing and Securing Data that Live Everywhere

Businesses of all sizes are handling and storing more sensitive, internal and external data than ever before. With more data made available easily and more conveniently, ensuring data security has become mission critical. 

Given that greater numbers of workloads and data are now migrated to the cloud systems, protecting data has become more challenging. This session will discuss why data leakage still happens when organisations already have enhanced or strengthened their security measures.

  • Latest data and cloud security trends and challenges
  • Data as the emphasis of security governance and architecture roadmaps
  • Building collaborative approach and a data-first culture to prevent data breach in the new era
  • Protecting data, users and identities in the cloud
  • Developing advanced data protection program with adequate data governance across all on-premises and cloud environments

Allan Tan, Group Editor-in-Chief, CXOCIETY




KEYNOTE II: CISO’s Guide to Strengthening API Security

Gartner predicts that by 2023, 65% percent of global infrastructure service providers’ revenue will be generated to services enabled by APIs, up from 15% in 2018. With APIs becoming more widespread and essential to support companies’ innovative and revenue-generating digital transformation initiatives, CISOs need to make API security a top priority.

  • API security’s change in the past 12 months
  • Maximizing the value of digital and IT modernization initiatives with API security
  • Adopting ‘Shift Left’ approach to proactively secure APIs
  • API security use cases, standards and current approaches


EXECUTIVE INTERVIEW: The Rise of Web3: Securing the Future of the Internet

As the world is embracing Web 3.0 or Web3 which provides a playground for the decentralization of the Internet and the anonymity, ensuring user data and privacy stay protected has never been more important.

  • What does Web3 mean for cybersecurity?
  • Data ownership in the Web3 world
  • Maximising digital identity protection in the decentralized networks
  • Optimising the adoption of Web3 without risking security

Allan Tan, Group Editor-in-Chief, CXOCIETY


PANEL DISCUSSION II: Security Modernisation for the Cloud

Nearly half of all data breaches happen in the cloud. Ransomware, malware, phishing emails and data leakage continue to evolve with new techniques and attack vectors identified by malicious actors, probing every inch of IT protection especially in the cloud environments and cloud-based mail servers.

With more enterprises adopting a hybrid cloud approach to help drive their digital transformation initiatives, how should organisations successfully manage and secure their cloud-native applications and hybrid cloud environments holistically?

  • Metrics for measuring cyber security maturity programs
  • Adapting security for increased cloud dependency
  • Aligning security modernisation to business transformation initiatives in a cloud-application-centric and hybrid work environments
  • Building cost-efficient and predictive security strategy that supports modern applications effectively


Allan Tan, Group Editor-in-Chief, CXOCIETY




KEYNOTE III: Security 101 in Defending Your Business against Zero Day Attacks

SolarWinds, Log4Shell, Stuxnet, Colonial Pipeline and MSFT Exchange are some of the names that have become synonymous with the biggest cyber threat to emerge in years. Given the attacks’ unprecedented scale, how should IT security team step up their game to support their company’s existing security measures and protect the business against zero day exploits?

  • The next big thing in cybersecurity
  • Guarding online assets from attacks with zero warning
  • Deploying a multi-layered approach to cyber security
  • Simplifying incident response plan for zero day vulnerability protection
  • Best practices in protecting against zero day vulnerabilities


PANEL DISCUSSION III: Managing the Human Factors in Cyber Security in the New Era

The Q3 of 2022 saw a peak in insider threats. According to a report by Kroll, insider threats accounted for nearly 35% of all unauthorized access cyber incidents in the third quarter of 2022, its highest quarterly level to date. The surge is mainly due to the phenomenon of the ‘great resignation’ in the wake of the COVID-19 pandemic and the shift to remote work. As insider risk is an ongoing challenge that cannot be overlooked, how should CISO work together with the stakeholders across the enterprise to develop a comprehensive strategy to manage inside risk?

  • The evolving definition of insider risks vs. insider threat
  • Rethinking the enterprise’s security posture to guard against the threats within
  • Creating a framework to evaluate and mitigate insider risk
  • Continuous behavior monitoring to thwart the risk of insider threats
  • Deploying security policy controls in cloud-managed data repositories


FIRESIDE CHAT II: Orchestrating a Future Ready Identity Access Management (IAM) Strategy and Infrastructure

It is no secret that identity is foundational to security; however, in today’s economy, identity has moved and has to move to the center of security infrastructure. Managing and securing digital identities through people, process and technology is mission critical.

  • Preparing for the next-generation of IAM
  • Adapting IAM program to the evolving business strategies and govern IAM activities
  • Updating IAM strategy for hybrid cloud and multi-cloud environments
  • Improving Privileged Access Management (PAM) with DevOps
  • Reinforcing the use of AI/ML to predict possible areas of access vulnerability

Allan Tan, Group Editor-in-Chief, CXOCIETY




KEYNOTE IV: Getting Ahead of the Most Advanced Attacks with Cybersecurity Mesh Architecture (CSMA)

According to Gartner, by 2024, organisations adopting a CSMA will reduce the financial impact of security incidents by an average of 90%. With the rapid evolution and complexities of cyber-attacks, IT decentralization and asset migrations to hybrid/multi-cloud environments, IT leaders must now integrate their security tools into one ecosystem.

  • The future of cybersecurity mesh
  • Seamlessly integrating security tools into one composable and scalable ecosystem
  • Platform consolidation to decrease tooling duplication, high operational costs and complex integration requirements
  • Key considerations in deploying CSMA


FIRESIDE CHAT III: The New Age of Incidents Recovery Plans Amid the Shifting Threats

There is one thing in common between cyber security resources and breaches: Both cost money. However, recovering from the latter can be extremely stressful, challenging and costly for businesses. Lack of preparation in a response plan, if an incident were to occur, leaves organization at the risk of being unable to handle an attack effectively and even being vulnerable to further attacks.

  • Key factors that determine the cost of security breaches
  • Measures to respond to an incident
  • Designing effective threat management and incident response strategies
  • Implementing successful incident response plans, policies and recovery plans
  • Scaling up response plan to remain resilient and recover quickly after an attack

Allan Tan, Group Editor-in-Chief, CXOCIETY


PANEL DISCUSSION IV: Making 2023 a Cyber-Secure Year

With the intensifying scope of the enterprise’s digital business and increasing adoption of hybrid work, the work and responsibilities on CISO’s and IT security team’s plate are growing. As organisations become more complex, it is crucial for CISO and his/her team to enhance their effectiveness as strategic cybersecurity professionals within their company – to level and exceed the threat sophistication used by bad actors.

  • Demonstrating the business value of cybersecurity investments
  • Supporting the business and contributing to the new composable business model with risk-based programs
  • Building resilient IT services with agile and flexible capability
  • Bridging the gap between security and DevOps
  • Building a culture of security and workable partnerships across functional departments and supplier ecosystems
  • Up-skilling the next-generation of cybersecurity leaders


Allan Tan, Group Editor-in-Chief, CXOCIETY






Allan Tan

Group Editor-in-Chief

Justin Ong

IT General Manager

Krishna Balakrishnan

Partner, EY Global and Asia-Pacific Cybersecurity Managed Service (CMS) Leader


Leonard Ong

Senior Director | Regional Information Security Officer, APAC


Vicknaeswaran Sundararaju

Regional Security Officer

Marlon P. Sorongon



Mel Migriño

Vice President and Group CISO


Abdulla Al-Attas

Head of Cyber Security

Frankie Shuai

Director of Cyber and Technology Risk


Gaurav Miglani

Lead Cybersecurity Analyst (Director)


Antonius Ruslan

Information Security Professional


Thomas Lahey



Sourabh Chitrachar

Regional Vice President/ Director- Asia Technology Strategy & Operations


Lee Dolsen

Chief Architect, Asia Pacific & Japan


Romanus Prabhu

Global Head – Technical Support

Jonathan Jackson

Director of Sales Engineering


Steven Sim



Josiah Winston

Senior Solutions Engineer


Wai Kit Wong

Senior Solutions Engineer


Manoj Tewari

Sr. Director, Information Security & Compliance

Speaking Opportunities:


We will help you GENERATE quality business leads.
We will help you INCREASE your regional profile.
We will help you CREATE new business opportunities.

  • Get cost-effective marketing exposure and branding to your target audience, culminating in face-to-face meetings with your prospects.
  • Position and profile yourself as an industry leader.
  • Increase your brand recognition.
  • Create new partnerships and alliances.
  • Develop relationships through new virtual networking opportunities.
  • Showcase new products and services to a targeted audience of decision makers.
  • Get direct and exclusive access to Key decision-makers

Sponsorship Opportunities:


Cloud Partners

Platinum Sponsor

Diamond Sponsors

Treasury Partner

Platinum Sponsor

Gold Sponsors

Silver Sponsor

Partner Sponsor

Supporting Partner

Knowledge Partner

Travel Partner

Networking Partners

Analyst Partner

Document Management Partner

Bag Sponsor

Lucky Draw Sponsors

Supporting Organizations

Supporting Media


Share this event:
Share on facebook
Share on twitter
Share on linkedin
Share on email

This section is currently for viewing only - it includes a Gallery and Testimonial section. Once the page go live, this section will be hidden until post-event photos & reviews are available.


CXOCIETY (reads “society”) provides engagements with the C-level community in Asia through Digital Media, Custom Content, Events, and Research and Reports. The leadership team at CXOCIETY has over 50 years of experience in C-Level Engagements and truly understands the challenges faced by C-level executives in their day-to-day work.