The past three years have taught organisations that an expanding digital footprint brings with it evolving security challenges. For all the benefits and opportunities presented by the hybrid workplace and cloud-based digital-native business processes, these bring with them heightened risks in the form of sustained big game ransomware attacks, multiple attacks on the digital supply chain, deeply embedded vulnerabilities, and increasing attacks on identity systems.

The cumulative security challenges are exacerbated by a shortage of skilled and experienced security and professionals at all levels. Gartner advises security and risk management leaders to transform their organisation’s security practice to keep pace with business demand and a constantly evolving threat environment. Security professionals are also encouraged to find the optimal balance between their dual missions of protecting their organisation and ensuring cybersecurity proves its value as a strategic business enabler.

CXOCIETY is pleased to hold our second annual FutureCISO Conference in-person in Singapore on 25 May 2023 under the theme of “Architect Your Security and Risk Strategy”. This event is about enabling security and risk management leaders, as well as leaders within the organisation, to understand how their roles as charter members of their organisation’s transformation ambition will evolve in the years to come.

This event will gather senior information security professionals from multiple industries in Singapore to address CISO’s top security trends, pressing concerns and business priorities this year. Some topics to be addressed at this event include:

  • Key cyber security trends and risks in 2023-2024
  • Security monitoring, detection, and response
  • Managing a wide set of risks that go beyond traditional approaches
  • Enhancing the effectiveness of CISO and security team as strategic cybersecurity professionals
  • Orchestrating an IAM strategy that aligned to evolving business strategies
  • Building workable partnerships across functional departments and supplier ecosystems
  • Prioritising digital supply chain risk and encouraging security best practices
  • Aligning security modernisation to business transformation initiatives
  • Delivering security in a cloud-application-centric and hybrid work future
  • Building holistic behaviour and culture change programs to provoke more secure ways of working
  • Overcoming the cybersecurity talent shortage


CISOs, CTOs, Directors, Heads, MDs, SVPs, VPs, Leads, involved in:

  • Information Security
  • Cyber Security Architecture and Strategy
  • Security and Technology Risk
  • Cyber Security and Privacy
  • Information and Data Protection
  • Risk and Compliance
  • Cloud Governance and Security


The FutureCFO Conference aims to give CFOs, who also act as their company’s strategic business partner and catalyst, insights on ensuring corporate growth and successfully mitigating risks and challenges amidst the current economic and political uncertainties in their countries. The conference will also address strategies and best practices on how CFOs can reimagine finance functions and their organizations to survive and thrive in today’s fast-paced and digitally driven landscape.

This by-invitation only one-day event will gather over 120 senior finance leaders from multiple industries and offers the best opportunity to hear from the industry’s leading professionals, contribute questions from the floor, engage in incisive panel discussions that discuss real-life business cases, updates and strategies to meet the most pertinent challenges facing the finance function in 2020.

High-Level Industry Speakers

We gather 20+ industry speakers and experts from leading organizations for keynote presentations and incisive discussions so you can tap on their invaluable insights and best practices important to your finance function management and transformation.

Interactive Discussions

Be part of our interactive panel discussions that address the current hot topics, share ideas and experiences and get the answers to your pressing questions from prominent finance leaders on stage.

Networking Opportunities

Meet new business partners, engage and forge new connections with fellow finance and treasury leaders in the region, solution providers and many more at our event through luncheons, coffee breaks, one-to-one meetings and informal introductions.

Targeted In-Depth Sessions

8 hours of learning and networking opportunities packed into 10 in depth sessions. Listen to corporate-driven best practices and case studies sharing that are targeted to your profession through the personalized country-specific conferences we crafted for you - FutureCFO Conferences.



Chairman’s Welcome Remarks

Allan Tan, Group Editor-in-Chief, CXOCIETY


OPENING ADDRESS: Singapore’s Blueprint for a Cyber Secure Future

In 2022, Singapore was ranked 6th in the world for having the number of exposed databases to the internet, of which hackers could easily breach and exploit. The statistics of this finding was found to have grown steadily throughout the year in parallel with the increased digitalisation during the pandemic. This session will look at the latest cyber security landscapes in Singapore and government’s strategy in developing cyber resilience in enterprises for a cyber-safe country in the years to come.

  • Singapore’s cybersecurity landscape
  • Cybersecurity as a business risk management issue
  • Transforming mindsets – cybersecurity as a competitive advantage
  • Cybersecurity as a collective responsibility

Veronica Tan, Director, Safer Cyberspace Division, CYBER SECURITY AGENCY OF SINGAPORE (CSA)


PANEL DISCUSSION I: Improving Cyber Security Posture Amidst the Evolution of Cybersecurity Risks in 2023-2024

Cybersecurity constantly changes as evolving technologies and fast-changing world introduce new type of cyber-attacks. The seemingly never-ending increase in cyber threats coupled with higher pressure on regulatory compliance mean that today’s CISOs are faced with new complexities to keep business operations running smoothly and staying compliant.

  • The rise of metaverse and changing threat landscape for critical infrastructure – which areas of security should CISO focus on? 
  • Evaluating, communicating and responding to evolving threats
  • Balancing security with performance, resilience and agility
  • Achieving regulatory compliance while enhancing security capabilities
  • Managing a wide set of risks beyond traditional approaches

Allan Tan, Group Editor-in-Chief, CXOCIETY

Marcus Tan, Head of Cybersecurity (CS), Institute for Infocomm Research (I2R), A*STAR
Jagathesh Rajavasagam, Risk & Cyber Security Officer, ABBOTT
Christopher Lek, Director, Cyber Security, NANYANG TECHNOLOGICAL UNIVERSITY


KEYNOTE I: Managing the Evolving Threat of Supply Chain Attacks

Cybercrimes hit all-time high in 2021 with business suffered 50% more cyber-attacks attempts per week in 2021. Digital acceleration, increase reliance on cloud-based solutions and as third-party services in today’s hyper-connected world have made it more difficult for security teams to manage and harden their security posture. As the surgfaces of cyber-attacks have expanded and become more sophisticated, enterprises need to have proper cyber security visibility and control framework to keep track and protect their dynamic and distributed IT environments.

  • The emerging next-generation of supply chain attacks
  • The expanded new network perimeter in the hybrid work era
  • Building a proactive and resilient supply chain security with ZTNA
  • Getting the most out of XDR: Delivering visibility, control, protection and remediation for supply chain, IoT and ransomware attacks
  • Ensuring supply chain security with governance and holistic cybersecurity management




FIRESIDE CHAT I: Securing Data that Live Everywhere

Businesses of all sizes are handling and storing more sensitive, internal and external data than ever before. With more data made available easily and more conveniently, ensuring data security has become mission critical. 

Given that greater numbers of workloads and data are now migrated to the cloud systems, protecting data has become more challenging. This session will discuss why data leakage still happens when organisations already have enhanced or strengthened their security measures.

  • Latest data security trends and challenges
  • Data as the emphasis of security governance and architecture roadmaps
  • Building collaborative approach and a data-first culture to prevent data breach in the new era
  • Protecting data, users and identities in the cloud
  • Developing advanced data protection program with adequate data governance across all on-premises and cloud environments


PANEL DISCUSSION II: Security Modernisation for the Cloud

Nearly half of all data breaches happen in the cloud. Ransomware, malware, phishing emails and data leakage continue to evolve with new techniques and attack vectors identified by malicious actors, probing every inch of IT protection especially in the cloud environments and cloud-based mail servers.

With more enterprises adopting a hybrid cloud approach to help drive their digital transformation initiatives, how should organisations successfully manage and secure their cloud-native applications and hybrid cloud environments holistically?

  • Metrics for measuring cyber security maturity programs
  • Adapting security for increased cloud dependency
  • Aligning security modernisation to business transformation initiatives in a cloud-application-centric and hybrid work environments
  • Building cost-efficient and predictive security strategy that supports modern applications effectively

Allan Tan, Group Editor-in-Chief, CXOCIETY

Lim Shih Hsien, Head of Technology Masterplanning, CISO and CSO, CERTIS GROUP
Phoram Mehta, Senior Director, APAC CISO, PAYPAL


FIRESIDE CHAT II: Security 101 in Defending Your Business against Zero Day Attacks

SolarWinds, Log4Shell, Stuxnet, Colonial Pipeline and MSFT Exchange are some of the names that have become synonymous with the biggest cyber threat to emerge in years. Given the attacks’ unprecedented scale, how should IT security team step up their game to support their company’s existing security measures and protect the business against zero day exploits?

  • The next big thing in cybersecurity
  • Guarding online assets from attacks with zero warning
  • Advancing a multi-layered approach to cyber security
  • Simplifying incident response plan for zero day vulnerability protection
  • Best practices in protecting against zero day vulnerabilities

Allan Tan, Group Editor-in-Chief, CXOCIETY

Senior representative, SUMO LOGIC


KEYNOTE II: The New Age of Incidents Recovery Plans Amid the Shifting Threats

There is one thing in common between cyber security resources and breaches: Both cost money. However, recovering from the latter can be extremely stressful, challenging and costly for businesses. Lack of preparation in a response plan, if an incident were to occur, leaves organization at the risk of being unable to handle an attack effectively and even being vulnerable to further attacks.

  • Key factors that determine the cost of security breaches
  • Measures to rensponse to an incident
  • Designing effective threat management and incident response strategies
  • Implementing successful incident response plans, policies and recovery plans
  • Scaling up response plan to remain resilient and recover quickly after an attack




KEYNOTE III: Dealing with CyberSecurity’s Industrial Revolution

The last ten years have seen sweeping changes move through our industry. Infrastructure has been transformed, teams have split and reformed before splitting again, while autonomy has become paramount for organisational transformation. This has created a perfect storm for the cyber security industry, with traditional practices being stretched to breaking point, and often beyond.

This talk will explore these trends in greater detail, detailing ways in which our cyber paradigms and strategies need to shift in order to support these changes, and share some customer stories that highlight successful navigation of these challenges.

Senior representative, HASHICORP


PANEL DISCUSSION III: Managing the Human Factors in Cyber Security in the New Era

The Q3 of 2022 saw a peak in insider threats. According to a report by Kroll, insider threats accounted for nearly 35% of all unauthorized access cyber incidents in the third quarter of 2022, its highest quarterly level to date. The surge is mainly due to the phenomenon of the ‘great resignation’ in the wake of the COVID-19 pandemic and the shift to remote work. As insider risk is an ongoing challenge that cannot be overlooked, how should CISO work together with the stakeholders across the enterprise to develop a comprehensive strategy to manage inside risk?

  • The evolving definition of insider risks vs. insider threat
  • Rethinking the enterprise’s security posture to guard against the threats within
  • Creating a framework to evaluate and mitigate insider risk
  • Continuous behavior monitoring to thwart the risk of insider threats
  • Deploying security policy controls in cloud-managed data repositories
  • Leveraging end-point security management in the era of hybrid work

Allan Tan, Group Editor-in-Chief, CXOCIETY

Hwee Cher Tan, Director, IT Security & Governance, CGS-CIMB SECURITIES
Leonard Ong, Senior Director | Regional Information Security Officer, Intercontinental & China, GE HEALTHCARE
Francis Yeow, Head of Information Security and Country Information Security Officer, PARKWAY HOSPITALS SINGAPORE


FIRESIDE CHAT III: Orchestrating a Future Ready Identity Access Management (IAM) Strategy and Infrastructure

It is no secret that identity is foundational to security; however, in today’s economy, identity has moved and has to move to the center of security infrastructure. Managing and securing digital identities through people, process and technology is mission critical.

  • Preparing for the next-generation of IAM
  • Adapting IAM program to the evolving business strategies and govern IAM activities
  • Updating IAM strategy for hybrid cloud and multi-cloud environments
  • Improving Privileged Access Management (PAM) with DevOps
  • Reinforcing the use of AI/ML to predict possible areas of access vulnerability

Allan Tan, Group Editor-in-Chief, CXOCIETY




KEYNOTE IV: Getting Ahead of the Most Advanced Attacks with Cybersecurity Mesh Architecture (CSMA)

According to Gartner, by 2024, organisations adopting a CSMA will reduce the financial impact of security incidents by an average of 90%. With the rapid evolution and complexities of cyber-attacks, IT decentralization and asset migrations to hybrid/multi-cloud environments, IT leaders must now integrate their security tools into one ecosystem.

  • The future of cybersecurity mesh
  • Seamlessly integrating security tools into one composable and scalable ecosystem
  • Platform consolidation to decrease tooling duplication, high operational costs and complex integration requirements
  • Key considerations in deploying CSMA


PANEL DISCUSSION IV: A Friend or Foe: Managing the AI-Driven Shifting Cybersecurity Landscape

2023 marks the beginning of a new era in cybersecurity, using AI technology for both good (cyber protection) and bad (cybercrimes). Enterprise IT security leaders can leverage the latest AI-based security tools to better detect threats, protect their systems and safeguard data resources. However, as result of the maturity of AI technology, cyber attackers can also benefit from the AI-powered technology to launch more sophisticated attacks such as through CHATGPT and AI-generated phising emails.

  • How AI shapes cyber security in the future
  • AI as a new tool for cyber criminals
  • Deterring cyber criminals in the age of AI
  • Closing the cybersecurity skill gaps with AI
  • Use cases in cybersecurity practices using AI


Allan Tan, Group Editor-in-Chief, CXOCIETY

Frankie Shuai, APAC Regional Information Security Officer, DWS GROUP
Anderson Teo, Director, Group IT & Cybersecurity, YEO HIAP SENG (YEO’S) SINGAPORE


ANALYST KEYNOTE: A Look Ahead: Mapping Enterprise IT Security Preparedness in 2023-2024
  • Top IT and security trends impacting enterprises in 2023-2024
  • The change of cyber landscape and security management from before 2020 and between 2020-2022
  • How ASEAN and Singapore enterprises are adapting to the next normal
  • Recommendations to stay on top of emerging and enterprise risks in the coming years




Allan Tan

Group Editor-in-Chief

Anderson Teo

Director, Group IT & Cybersecurity

Boris Hadjuk


Christopher Lek

Director, Cyber Security

Francis Yeow

Head of Information Security and Country Information Security Officer

Frankie Shuai

APAC Regional Information Security Officer


Hwee Cher Tan

Director, IT Security & Governance

Jagathesh Rajavasagam

Risk & Cyber Security Officer APAC

Justin Ong

IT General Manager

Leonard Ong

Regional Information Security Officer, Intercontinental & China,

Lim Shih Hsien

Head of Technology Masterplanning, CISO and CSO 

Marcus Tan

Head of Cybersecurity (CS), Institute for Infocomm Research (I2R)

Phoram Mehta

Senior Director, APAC CISO

Veronica Tan

Director, Safer Cyberspace Division

Viren Mantri


Speaking Opportunities:


We will help you GENERATE quality business leads.
We will help you INCREASE your regional profile.
We will help you CREATE new business opportunities.

  • Get cost-effective marketing exposure and branding to your target audience, culminating in face-to-face meetings with your prospects.
  • Position and profile yourself as an industry leader.
  • Increase your brand recognition.
  • Create new partnerships and alliances.
  • Develop relationships through new virtual networking opportunities.
  • Showcase new products and services to a targeted audience of decision makers.
  • Get direct and exclusive access to Key decision-makers

Sponsorship Opportunities:


Cloud Partners

Platinum Sponsor

Diamond Sponsors

Treasury Partner

Platinum Sponsor

Gold Sponsors

Silver Sponsor

Partner Sponsor

Supporting Partner

Knowledge Partner

Travel Partner

Networking Partners

Analyst Partner

Document Management Partner

Bag Sponsor

Lucky Draw Sponsors

Supporting Organizations

Supporting Media


Share this event:
Share on facebook
Share on twitter
Share on linkedin
Share on email

This section is currently for viewing only - it includes a Gallery and Testimonial section. Once the page go live, this section will be hidden until post-event photos & reviews are available.


CXOCIETY (reads “society”) provides engagements with the C-level community in Asia through Digital Media, Custom Content, Events, and Research and Reports. The leadership team at CXOCIETY has over 50 years of experience in C-Level Engagements and truly understands the challenges faced by C-level executives in their day-to-day work.