Loading...
Conference
Programme Overview
Day 1
Day 2
Day 3
Presentations
Programme Overview
Programme Overview


Day 1
Day 1


Day 2
Day 2


Day 3
Day 3


Presentations
Presentations
Keynote Speakers
Cyber as Economic Opportunity
Prof. Isaac Ben-Israel
Chairman - Israel Space Agency
Chairman - Israel National Council for R&D
Director - ICRC
Tel Aviv University
Privacy and Data Sovereignty in the Cloud
Lieutenant General Steven Boutelle - US Army (Ret)
Vice President - Global Security and Defense
Cisco Systems, Inc.
Imperatives for Cybersecurity Success in the Digital Age
John Davis
Federal Chief Security Officer
Palo Alto Networks
Cyber Security on the Front Lines - Insights from Today's Most Important Breach Investigations
Travis Reese
President
FireEye
Upcoming Cyber Security Challenges and Ways to Deal with Them
John Suffolk
Global Chief Security Officer
Huawei
Cybersecurity in an Era of Digital Transformation
Jessica Tan
Managing Director
Microsoft Singapore
Conference Speakers
Will the Internet Survive? The Need for Paradigm Change in Cybersecurity
Ammar Alkassar
Chief Executive Officer
Rohde & Schwarz Cybersecurity
Building Intelligence-driven Security - Reshaping the security blueprint
David Allott
Cyber Defense Director
Intel Security
The Next Era of Security
Sandy Bird
IBM Fellow, CTO Security Systems Division
IBM
Focusing the Cyber Security Lens
Timothy G Brown
Chief Technology Officer
Dell One Identity
Critical Security Framework and Critical Infrastructure
Dick Bussiere
Technical Director
Tenable Network Security
BUILDING WORLD CLASS SECURITY OPERATIONS - Tackling the top cybersecurity concerns of today
James Carder
CISO & VP
LogRhythm Labs
Implementation of Proactive Controls to Safeguard Access to Industrial Control Systems
Apichet Chayabejara
Solution Architect (Asia Pacific and Japan) (CISSP)
CyberArk
Greater Than the Sum of Its Parts - The Israeli Cyber Companies Consortium – A Working Model of Coopetition in Cyber Security
Alvin Cheng
Cyber Security Manager
Custodio Pte Ltd
The Digital Workplace – Security Strategy for Mobility
James Chia
Director - Software and Services (Asia Pacific and Japan)
Aruba
Indicators of Exposure: Powering Proactive Security Management
Gidi Cohen
Founder and Chief Executive Officer
Skybox Security
Data-Centric Security: Data Security for Big Data Era and Practice of Alibaba
Dr Du Yuejin
Senior Researcher and VP of Technology
Alibaba Group
Cyber Threat Information Sharing: An Industry Movement
Sean Duca
Vice President and Regional Chief Security Officer for Asia Pacific
Palo Alto Networks
Web Threats of Past, Present and Future
John Ellis
Chief Strategist (Cyber Security)
Akamai Technologies
Mitigating Risk in Application Development with Speed
Stanley Eu
Parasoft
Threats and Defenses in Mobile Security
Prof. Debin Gao
Associate Profressor (School of Information Systems)
Singapore Management University
Re-Thinking Malware Elimination with Isolation
Kowsik Guruswamy
Chief Technology Officer
Menlo Security
CSIRT Maturity in Europe
Aart Jochem
Head (Monitoring & Response)
NCSC of Netherlands
State of Security Operations Maturity and Capabilities
Stephen Kho
Managing Principal - Enterprise Consulting Services
Hewlett Packard Enterprise
The Master Decryption Key to Ransomware
Leonard Kleinman
Chief Cyber Security Advisor (APJ)
RSA
Risk Management in IT-OT Convergence
Junyu Lee
Manager
Ernst & Young
Securing the Next Frontier. From your Fingertip to the Cloud and Beyond
Keng Lee
Chief Operations Officer
Tanosecure
The Scorecard as a Tool for Improving Cybersecurity
Robert F. Lentz
President
Cyber Security Strategies
John Mills
Chief
Cyber Security Strategies
Reconciling IT and OT Security
David Meltzer
Chief Research Officer & Vice President of Corporate Development
Tripwire
Emulating APT through Red Teaming - The Lifecycle of a Breach
Anthony Paimany
Principal Security Consultant
FireEye
Artificial Intelligence for Automated Cyberthreat Discovery: How Machine Learning Evolved to Help Us Fight New and Unknown Threats
Alberto Pelliccione
CEO
ReaQta
THE SECRETS BEHIND ADVANCED CRITICAL INFRASTRUCTURES & SCADA CYBER ATTACKS - Preventing the Kill Chain in Industrial Control Systems (ICS) / SCADA
Collin Penman
Regional Director (South Asia)
Check Point Software Technologies Ltd
Cybersecurity - A Regional Perspective
Daryl Pereira
Partner - Cybersecurity
KPMG Management Consulting
State of the Art in Analysing DNS Resolution Data to Expose Malicious Activities
Rod Rasmussen
VP of Cybersecurity
Infoblox
Data Security and Compliance: Like Mixing Oil and Water / Database Security for Enterprise Security
Terry Ray
Chief Product Strategist
Imperva, Inc.
Taking Practical Steps Towards Cyber Resiliency
Alvin Rodrigues
Chief Security Strategist (APAC)
Fortinet
Adventures in Threat Intelligence: Making TI Actionable
Guy Rosefelt
Director (Web Security Product Management)
NSFOCUS
Progress and Partnerships in Cyber-Threat Detection
Prof. Abhik Roychoudhury
Professor (School of Computing)
National University of Singapore
Click here to watch video
Everything is log, log is everything
Balázs Scheidler
Inventor / Founder / CTO
Balabit
ADDRESSING DATA THEFTS THROUGH AN INSIDER THREAT PROGRAM - Viewing Everyone & Everything as Potential Insider Threats
Maheswaran Shanmugasundaram
Strategic Security Consulting for APAC Region
Forcepoint LLC
The Anatomy of a Ransomware Attack
Barry Shteiman
Director - Threat Research
Exabeam
Tipping the balance in an asymmetric war
Andy Solterbeck
Regional Director
Cylance
Building a 21st Century Security Operations Center
Jerry Stalick
Vice President (Security Operations)
F5 Networks
Convergence of Security and Digital Advertising
Mark Ryan Talabis
Senior Managing Consultant
IBM
Securing a Connected World through Partnerships: The evolution of Telcos in Securing Cyberspace
Freddy Tan
Director (Business Development)
SingTel
Implications of Blockchain for Enterprise Security
Marcus Tan
Chief Executive Officer
CloakApps
Dr. Li Qiming
Chief Technology Officer
CloakApps
Product Certifications: The Trojan Horse for an Effective SDL Program
Ashit Vora
Co-founder and Laboratory Director
Acumen Security
Cyber Essentialism: Security Discipline, Collective Defense and the Pursuit of Less
Daniel Wachdorf
Technical Director of Threat Detection and Response
Carbon Black
Implications of Blockchain for Enterprise Security
Chester Wisniewski
Senior Security Advisor
Sophos
Accelerating the Path to Breach Detection & Response Through Automated Investigations
Dr Benson Wu
General Manager
Verint Systems
The Storms Within the Cloud
Matthias Yeo
Chief Technology Officer (Asia Pacific)
Blue Coat
The Evolution of Cyber Defence - Securing Your Achilles' heel
Prof. Yu Chien Siang
Chief Innovation Officer
Quann
Click here for Smart Nation IoT Security Conference presentations.