• Barny Sanchez
    Chief Technology Officer Threat Intelligence & Cognitive Security
    Date: 20 September 2017
    Time: 1100 – 1140 hrs
    Venue: MR 324, Level 3

    Barny Sanchez (JNCIE FW/VPN #1, JNCIE-SEC #2, JNCI, CISSP, CCIE x 2) holds a BS of Science in Information Systems Security from Westwood College, has advanced studies in Electronics Engineering from the "Instituto Tecnológico de Costa Rica" in Mathematics and Business from the "Universidad de Costa Rica", Cybersecurity from the Massachusetts Institute of Technology, and a Master's degree in Information Assurance and Security from Capella University. He joined IBM’s Security Division early in 2015 as the Chief Technology Officer for Threat Protection & Cognitive Security to help leading the innovation vision and strategy for security. Before joining IBM he worked at Juniper Networks for 10 years in several positions including Sr. Director of Security for the Cloud Builders Centre of Excellence and WW Chief Security Architect. Barny also occupied management positions at different technical support organizations for Intel Corporation and Cisco Systems, as well as spent several years designing and implementing multi-vendor networks for customers around the globe. His combined experience in the information security space is of almost 20 years, supporting customers in the most visible industries and in all geographies.


    Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights to qualify incidents and investigate risks quickly and accurately.

  • Michael Sentonas
    Vice President, Technology Strategy
    Date: 19 September 2017
    Time: 1330 – 1400 hrs
    Venue: MR 310 - 311, Level 3

    As Vice President, Technology Strategy, Michael Sentonas is focused on driving the company’s regional go-to-market efforts and oversees the company’s growing customer and partner network. In line with CrowdStrike’s APAC expansion, Michael has been closely involved in driving innovation, adapting to the technology challenges facing customers and staying ahead of competitors. With over 20 years’ experience in cybersecurity, Michael’s most recent roles prior to joining CrowdStrike included both technology and strategy development as the Chief Technology and Strategy Officer, Asia Pacific at Intel Security and Vice President and World Wide Chief Technology Officer of Security Connected at Intel Security.


    Throughout 2016, CrowdStrike exposed unprecedented efforts by adversaries hacking and leaking information from sensitive government and corporate networks and the individuals that work in them. Hacking, data manipulation and the security of the information we use largely remains at risk and unprotected against potentially destructive attacks. This session will discuss the considerable evidence that CrowdStrike has collected from a variety of investigations into various attack campaigns along with a look at the real-world tactics, techniques and procedures (TTPs) used and the important lessons learned.

  • Ken Soh
    Chief Information Officer
    BH Global
    Date: 19 September 2017
    Time: 1610 - 1650 hrs
    Venue: MR 308 - 309, Level 3

    Ken Soh holds concurrent appoints as Group CIO of mainboard listed BH Global Corporation Limited since 3 Mar 2014 and as the founding CEO of the group subsidiary cyber security company Athena Dynamics Pte Ltd.

    Ken has more than 25 years of working experience in the ICT industry. Prior to joining BH Global, Ken held various senior positions in public and private sectors at CxO and business leader levels with Master Planning and P&L responsibilities.

    Ken has been an avid industry speaker and writer. He holds a Master of Science in Computer Studies from the University of Essex; and a Master of Business Administration (eMBA) from the Nanyang Business School (a Nanyang Technological University and University of California, Berkeley joint programme).


    As Group CIO of BH Global, Ken Soh has his fair share of challenges and close brushes with the menace of the "dark side". As the sophistication of advanced threats rise rapidly in its depth and breadth, the never-ending race for effective protection strategies against them intensifies. In this conference, Ken will share with the audience first-hand a self-discovery journey into cyber protection in a highly operation-centric, practitioner's approach.

    Ken aims to share and bring forth the following take-aways to the audience:

    1. Emerging New Strategies and Perspectives in Cyber Protection in both IT and OT
    2. The Common Missing Gaps in Today's Cyber Protection Strategies
    3. An Operational-Centric Assurance Framework to Strengthen and Improve the Cyber Security Posture for Enterprises
  • Paul Steen
    Vice President, Global Product Strategy
    Date: 20 September 2017
    Time: 1400 - 1440 hrs
    Venue: MR 324, Level 3

    Paul Steen is the Vice President for Global Product Strategy at Imperva, Inc., a provider of cyber security solutions. In this role, Paul connects with Imperva’s largest customers around the globe, and helps them understand the cyber security industry trends and how to secure their most critical assets. He is instrumental in ensuring Imperva’s product development strategy is forward looking and matches customer requirements and needs. Paul has been with Imperva for more than ten years including management of the engineering teams across US, Europe and Asia Pacific. Paul is a frequent speaker at key IT security events such as RSA Conference, AusCert, OWASP, AISA. He has also trained professional security related certifications in over 35 countries and lectured on IT security subjects at established schools and university around the world.

    Prior to joining Imperva, Paul worked in a variety of technical roles at Check Point Software Technology Ltd., including security engineering and, partner and end-user instruction.


    This session will explore how Data Masking technology and best practice implementation process can help organizations de-identify and otherwise “anonymize” database records while keeping the original characteristics of the data place; so developers can continue working with data that is realistic, consistent, and fully functioning, but not real or identifiable in any way.