Architect Your Security and Risk Strategies



The past three years have taught organisations that an expanding digital footprint brings with it evolving security challenges. For all the benefits and opportunities presented by the hybrid workplace and cloud-based digital-native business processes, these bring with them heightened risks in the form of sustained big game ransomware attacks, multiple attacks on the digital supply chain, deeply embedded vulnerabilities, and increasing attacks on identity systems.

The cumulative security challenges are exacerbated by a shortage of skilled and experienced security and professionals at all levels. Gartner advises security and risk management leaders to transform their organisation’s security practice to keep pace with business demand and a constantly evolving threat environment. Security professionals are also encouraged to find the optimal balance between their dual missions of protecting their organisation and ensuring cybersecurity proves its value as a strategic business enabler.

CXOCIETY is pleased to hold our second annual FutureCISO Conference in-person in Singapore on 25 May 2023 under the theme of “Architect Your Security and Risk Strategy”. This event is about enabling security and risk management leaders, as well as leaders within the organisation, to understand how their roles as charter members of their organisation’s transformation ambition will evolve in the years to come.

This event will gather senior information security professionals from multiple industries in Singapore to address CISO’s top security trends, pressing concerns and business priorities this year. Some topics to be addressed at this event include:

  • Key cyber security trends and risks in 2023-2024
  • Security monitoring, detection, and response
  • Managing a wide set of risks that go beyond traditional approaches
  • Enhancing the effectiveness of CISO and security team as strategic cybersecurity professionals
  • Orchestrating an IAM strategy that aligned to evolving business strategies
  • Building workable partnerships across functional departments and supplier ecosystems
  • Prioritising digital supply chain risk and encouraging security best practices
  • Aligning security modernisation to business transformation initiatives
  • Delivering security in a cloud-application-centric and hybrid work future
  • Building holistic behaviour and culture change programs to provoke more secure ways of working
  • Overcoming the cybersecurity talent shortage


CISOs, CTOs, Directors, Heads, MDs, SVPs, VPs, Leads, involved in:

  • Information Security
  • Cyber Security Architecture and Strategy
  • Security and Technology Risk
  • Cyber Security and Privacy
  • Information and Data Protection
  • Risk and Compliance
  • Cloud Governance and Security


The FutureCFO Conference aims to give CFOs, who also act as their company’s strategic business partner and catalyst, insights on ensuring corporate growth and successfully mitigating risks and challenges amidst the current economic and political uncertainties in their countries. The conference will also address strategies and best practices on how CFOs can reimagine finance functions and their organizations to survive and thrive in today’s fast-paced and digitally driven landscape.

This by-invitation only one-day event will gather over 120 senior finance leaders from multiple industries and offers the best opportunity to hear from the industry’s leading professionals, contribute questions from the floor, engage in incisive panel discussions that discuss real-life business cases, updates and strategies to meet the most pertinent challenges facing the finance function in 2020.

High-Level Industry Speakers

We gather 20+ industry speakers and experts from leading organizations for keynote presentations and incisive discussions so you can tap on their invaluable insights and best practices important to your finance function management and transformation.

Interactive Discussions

Be part of our interactive panel discussions that address the current hot topics, share ideas and experiences and get the answers to your pressing questions from prominent finance leaders on stage.

Networking Opportunities

Meet new business partners, engage and forge new connections with fellow finance and treasury leaders in the region, solution providers and many more at our event through luncheons, coffee breaks, one-to-one meetings and informal introductions.

Targeted In-Depth Sessions

8 hours of learning and networking opportunities packed into 10 in depth sessions. Listen to corporate-driven best practices and case studies sharing that are targeted to your profession through the personalized country-specific conferences we crafted for you - FutureCFO Conferences.



Chairman’s Welcome Remarks

Alvin Rodrigues, Editorial Consultant, CXOCIETY


OPENING ADDRESS: Singapore’s Blueprint for a Cyber Secure Future

In 2022, Singapore was ranked 6th in the world for having the number of exposed databases to the internet, of which hackers could easily breach and exploit. The statistics of this finding was found to have grown steadily throughout the year in parallel with the increased digitalisation during the pandemic. This session will look at the latest cyber security landscapes in Singapore and government’s strategy in developing cyber resilience in enterprises for a cyber-safe country in the years to come.

  • Singapore’s cybersecurity landscape
  • Cybersecurity as a business risk management issue
  • Transforming mindsets – cybersecurity as a competitive advantage
  • Cybersecurity as a collective responsibility

Yum Shoen Yih, Head Special Projects, CYBER SECURITY AGENCY OF SINGAPORE (CSA)


PANEL DISCUSSION I: Improving Cyber Security Posture Amidst the Evolution of Cybersecurity Risks in 2023-2024

Cybersecurity constantly changes as evolving technologies and fast-changing world introduce new type of cyber-attacks. The seemingly never-ending increase in cyber threats coupled with higher pressure on regulatory compliance mean that today’s CISOs are faced with new complexities to keep business operations running smoothly and staying compliant.

  • The rise of metaverse and changing threat landscape for critical infrastructure – which areas of security should CISO focus on? 
  • Evaluating, communicating and responding to evolving threats
  • Balancing security with performance, resilience and agility
  • Achieving regulatory compliance while enhancing security capabilities
  • Managing a wide set of risks beyond traditional approaches


Alvin Rodrigues, Editorial Consultant, CXOCIETY

Marcus Tan, Head of Cybersecurity (CS), Institute for Infocomm Research (I2R), A*STAR
Danny Chan, Director, Regional Security Officer, Asia Pacific, MASTERCARD
Christopher Lek, Director, Cyber Security, NANYANG TECHNOLOGICAL UNIVERSITY


KEYNOTE I: Detecting Hidden Threats in the Age of AI

With the recent rise of ChatGPT and other generative AI, it looks like AI is here to stay and shape our world. How can the field of cyber security leverage AI to make their investigation faster and detection more accurate? How can AI help the good guys predict the next big attack? This talk will explore ways we can harness the power of AI.

  • What exactly are AI and ML and how can you leverage it?
  • Machine Learning models for anomaly detection
  • The power of predictive analytics
  • Closing the skills gap with AI

Steve Faruque, Program Director, QRadar SIEM Product Management, IBM




FIRESIDE CHAT I: Building a Successful Zero Trust Security Strategy

We are now living in a multi-cloud world, reaping the benefits of increased agility, virtually unlimited scale, and the ability to deploy applications in a matter of clicks.

From this talk, learn the obstacles to securing multi-cloud and how to accelerate multi-cloud security with a resilient, fully managed infrastructure and simple, repeatable deployments so your teams can get started in a matter of clicks. Also, this session will share the use cases in securing IT environment when transitioning to a cloud operating environment.

Ned Shawa, Senior Director of APJ Solutions Engineering, HASHICORP
George Irwin, Director of Engineering, SPH MEDIA


PANEL DISCUSSION II: Security Modernisation for the Cloud

Nearly half of all data breaches happen in the cloud. Ransomware, malware, phishing emails and data leakage continue to evolve with new techniques and attack vectors identified by malicious actors, probing every inch of IT protection especially in the cloud environments and cloud-based mail servers.

With more enterprises adopting a hybrid cloud approach to help drive their digital transformation initiatives, how should organisations successfully manage and secure their cloud-native applications and hybrid cloud environments holistically?

  • Metrics for measuring cyber security maturity programs
  • Adapting security for increased cloud dependency
  • Aligning security modernisation to business transformation initiatives in a cloud-application-centric and hybrid work environments
  • Building cost-efficient and predictive security strategy that supports modern applications effectively


Allan Tan, Group Editor-in-Chief, CXOCIETY

Lim Shih Hsien, Head of Technology Masterplanning, CISO and CSO, CERTIS GROUP
Boris Hajduk, Group CISO, GOTO GROUP
Raju Chellam, Chairman, Cloud & Data Standards, ITSC (IT STANDARDS COMMITTEE)
Phoram Mehta, Senior Director, APAC CISO, PAYPAL


Pulse Survey on Identity Management
  • How safe is your staff’s or client’s identity?
  • Will you pass the test or need to trigger your risk management protocol?
  • The dos and don’ts

Eric Kong, ASEAN Managing Director, SAILPOINT


FIRESIDE CHAT II: Building a Modern Enterprise Security Architecture

During the pandemic, organisations shifted their strategies from aiming to reach a defined future, to becoming more resilient and adaptive. This has led to changes to the priorities of organisations, their operating models, and how they utilise technology and secure the enterprise.

With Asia-Pacific the most attacked region in the world, according to the IBM X-Force Threat Intelligence Index report, what is needed is a unified approach to security that covers the entire IT stack, where everyone in the organisation is accountable for helping the enterprise balance risks and benefits.

Allan Tan, Group Editor-in-Chief, CXOCIETY

Bryce Boland, Head of Security ASEAN, AWS
Stefan Tapp, Senior Solutions Engineer, SUMO LOGIC




Chairman’s Welcome Remarks

Allan Tan, Group Editor-in-Chief, CXOCIETY


KEYNOTE II: The New Age of Incidents Recovery Plans Amid the Shifting Threats

There is one thing in common between cyber security resources and breaches: Both cost money. However, recovering from the latter can be extremely stressful, challenging and costly for businesses. Lack of preparation in a response plan, if an incident were to occur, leaves organization at the risk of being unable to handle an attack effectively and even being vulnerable to further attacks.

  • Key factors that determine the cost of security breaches
  • Measures to rensponse to an incident
  • Designing effective threat management and incident response strategies
  • Implementing successful incident response plans, policies and recovery plans
  • Scaling up response plan to remain resilient and recover quickly after an attack


Antoine Yang, Country Manager, SYNOLOGY


PANEL DISCUSSION III: Managing the Human Factors in Cyber Security in the New Era

The Q3 of 2022 saw a peak in insider threats. According to a report by Kroll, insider threats accounted for nearly 35% of all unauthorized access cyber incidents in the third quarter of 2022, its highest quarterly level to date. The surge is mainly due to the phenomenon of the ‘great resignation’ in the wake of the COVID-19 pandemic and the shift to remote work. As insider risk is an ongoing challenge that cannot be overlooked, how should CISO work together with the stakeholders across the enterprise to develop a comprehensive strategy to manage inside risk?

  • The evolving definition of insider risks vs. insider threat
  • Rethinking the enterprise’s security posture to guard against the threats within
  • Creating a framework to evaluate and mitigate insider risk
  • Continuous behavior monitoring to thwart the risk of insider threats
  • Deploying security policy controls in cloud-managed data repositories
  • Leveraging end-point security management in the era of hybrid work

Allan Tan, Group Editor-in-Chief, CXOCIETY

Jagathesh Rajavasagam, Risk & Cyber Security Officer, ABBOTT
Amit Gupta, Head of Security Governance, Risk and Control, BUKALAPAK
Hwee Cher Tan, Director, IT Security & Governance, CGS-CIMB SECURITIES
Francis Yeow, Head of Information Security and Country Information Security Officer, PARKWAY HOSPITALS SINGAPORE


FIRESIDE CHAT III: Building A Cyber-Ready Workforce: Can We Stop Attacks Before They Start?

At the World Economic Forum 2023, cybersecurity was named a top concern as there are acute shortages of IT security professionals who are able to tackle the cyber security issues.

On top of this, every employee of companies in today’s digital economy inherently comes with risks and security concerns. Therefore, other than the organisation’s IT and IT security personnel, they are key in keeping the organisation’s safe from digital threats.

  • Building a positive security culture
  • How to get people to care about security and risk
  • Blueprint to ensure organisation’s workforce actually mitigates risk while improving the bottom line
  • DEI approach for cybersecurity talent strategies


Allan Tan, Group Editor-in-Chief, CXOCIETY

Joey Chua, Head of IT, GULF MARINE




PANEL DISCUSSION IV: A Friend or Foe: Managing the AI-Driven Shifting Cybersecurity Landscape

2023 marks the beginning of a new era in cybersecurity, using AI technology for both good (cyber protection) and bad (cybercrimes). Enterprise IT security leaders can leverage the latest AI-based security tools to better detect threats, protect their systems and safeguard data resources. However, as result of the maturity of AI technology, cyber attackers can also benefit from the AI-powered technology to launch more sophisticated attacks such as through CHATGPT and AI-generated phising emails.

  • How AI shapes cyber security in the future
  • AI as a new tool for cyber criminals
  • Deterring cyber criminals in the age of AI
  • Use cases in cybersecurity practices using AI


Allan Tan, Group Editor-in-Chief, CXOCIETY

Frankie Shuai, APAC Regional Information Security Officer, DWS GROUP
Anderson Teo, Director, Group IT & Cybersecurity, YEO HIAP SENG (YEO’S) SINGAPORE
Manan Leo Qureshi, BISO/APAC Security Leader, KFC & PizzaHut, YUM! BRANDS


CLOSING KEYNOTE: A Look Ahead: Mapping Enterprise IT Security Preparedness in 2023-2024
  • Top IT and security trends impacting enterprises in 2023-2024
  • The change of cyber landscape and security management from before 2020 and between 2020-2022
  • How ASEAN and Singapore enterprises are adapting to the next normal
  • Recommendations to stay on top of emerging and enterprise risks in the coming years


Steven Sim, Immediate Past President, ISACA SINGAPORE CHAPTER




Allan Tan

Group Editor-in-Chief


Alvin Rodrigues

Editorial Consultant


Amit Gupta

Head of Security Governance, Risk and Control


Anderson Teo

Director, Group IT & Cybersecurity


Antoine Yang

Country Manager


Boris Hajduk

Group CISO


Bryce Boland

Head of Security ASEAN


Christopher Lek

Director, Cyber Security


Danny Chan

Director, Regional Security Officer, Asia Pacific


Eric Kong

ASEAN Managing Director


Francis Yeow

Head of Information Security and Country Information Security Officer


Frankie Shuai

APAC Regional Information Security Officer


George Irwin

Director of Engineering


Hwee Cher Tan

Director, IT Security & Governance


Jagathesh Rajavasagam

Risk & Cyber Security Officer APAC


Joey Chua

Head of IT


Justin Ong



Lim Shih Hsien

Head of Technology Masterplanning, CISO and CSO 


Manan Leo Qureshi

BISO/APAC Security Leader, KFC & PizzaHut


Marcus Tan

Head of Cybersecurity (CS), Institute for Infocomm Research (I2R)


Ned Shawa

Senior Director of APJ Solutions Engineering


Phoram Mehta

Senior Director, APAC CISO


Raju Chellam

Chairman, Cloud & Data Standards


Stefan Tapp

Senior Solutions Engineer


Steve Faruque

Program Director, QRadar SIEM Product Management


Steven Sim

Immediate Past President


Viren Mantri



Yum Shoen Yih

Head Special Projects


Speaking Opportunities:


We will help you GENERATE quality business leads.
We will help you INCREASE your regional profile.
We will help you CREATE new business opportunities.

  • Get cost-effective marketing exposure and branding to your target audience, culminating in face-to-face meetings with your prospects.
  • Position and profile yourself as an industry leader.
  • Increase your brand recognition.
  • Create new partnerships and alliances.
  • Develop relationships through new virtual networking opportunities.
  • Showcase new products and services to a targeted audience of decision makers.
  • Get direct and exclusive access to Key decision-makers

Sponsorship Opportunities:


Cloud Partners

Platinum Sponsor

Diamond Sponsor

Breakfast Club Sponsor

Gold Sponsor

Roundtable Sponsor

Silver Sponsor

Partner Sponsor

Supporting Organisation

Diamond Sponsor

Breakfast Club Sponsor

Gold Sponsor

Roundtable Sponsor

Silver Sponsor

Partner Sponsor

Supporting Organisation

Supporting Media

Travel Partner

Networking Partners

Analyst Partner

Document Management Partner

Bag Sponsor

Lucky Draw Sponsors

Supporting Organizations

Supporting Media


Share this event:

This section is currently for viewing only - it includes a Gallery and Testimonial section. Once the page go live, this section will be hidden until post-event photos & reviews are available.


CXOCIETY (reads “society”) provides engagements with the C-level community in Asia through Digital Media, Custom Content, Events, and Research and Reports. The leadership team at CXOCIETY has over 50 years of experience in C-Level Engagements and truly understands the challenges faced by C-level executives in their day-to-day work.

Enterprises in every industry need to navigate digital and business transformation with speed and agility. They require a technology consulting services partner that understands the stakes of this moment and will work with them to successfully drive business outcomes. IBM Consulting is IBM’s consulting and global professional services business, with marketleading capabilities in business and technology transformation. With 140,000+ skilled professionals in 150+ countries, we offer strategy, experience, technology, and operations services to many of the most innovative and valuable companies in the world, accelerating our clients’ businesses through the power of collaboration.

Find out more at

Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 75 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at

SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time—matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.

Sumo Logic, Inc. (NASDAQ: SUMO) empowers the people who power modern, digital business. Through its SaaS analytics platform, Sumo Logic enables customers to deliver reliable and secure cloud-native applications. The Sumo Logic Continuous Intelligence Platform™ helps practitioners and developers ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures. Customers around the world rely on Sumo Logic to get powerful real-time analytics and insights across observability and security solutions for their cloud-native applications. For more information, visit

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices.

HashiCorp’s portfolio of products includes Vagrant™, Packer™, Terraform®, Vault™, Consul®, Nomad™, Boundary™, and Waypoint™. HashiCorp offers products as open source, enterprise, and as managed cloud services.

At Synology, we believe professional business solutions should be available to companies and teams of all sizes. For more than two decades, we have helped our customers excel at what they do by creating innovative hardware and software solutions to overcome data management and security challenges. Each Synology product is crafted for maximum simplicity, compatibility, flexibility, and reliability. Engineered to last and with a best-in-class operating system, it is easy to see why millions of users rely on Synology daily. As of today, 10 million+ Synology systems are running worldwide, with 70+ exabytes of data actively stored and protected and 670,000+ organizations protecting their endpoint and SaaS data with Synology.

ISACA provides thought leadership in IT governance, risk, audit, cybersecurity and privacy. It serves 170,000 members in 188 countries carrying CISA, CISM, CRISC, CGEIT, CDPSE certifications and has 225 chapters.

The ISACA Singapore Chapter engages more than 3,000 members, runs two annual conferences (GTACS and SheLeadsTech) and 2 to 4 events monthly benefiting both members and the public locally and globally. It was also the best regional non-profit organisation at The Cybersecurity Awards 2019. More details may be found at

SAP is the market leader in enterprise application software, helping companies of all sizes and in all industries run at their best: SAP customers generate 87% of total global commerce. Our machine learning, Internet of Things (IoT), and advanced analytics technologies help turn customers’ businesses into intelligent enterprises. Our end-to-end suite of applications and services enables our customers to operate profitably, adapt continuously, and make a difference. At SAP, our purpose is to help the world run better and improve people’s lives. Our promise is to innovate to help our customers run at their best. SAP is committed to helping every customer become a best-run business. We engineer solutions to fuel innovation, foster equality, and spread opportunity across borders and cultures. Together, with our customers and partners, we can transform industries, grow economies, lift up societies, and sustain our environment.