Loading Events

« All Events

2022 CyberAttack Singapore

May 24 - May 25

CyberAttack Week Singapore 2022 showcases what has been achieved, and more critically, explore the next steps in securing a dependable cyber ecosystem.

24 May 2022
Roundtable Sessions

REGISTER HERE

Roundtable 1
Keeping your assets safe in a digitized world without perimeter and connected supply chain ecosystem

Roundtable 2
Hybrid workforce 2.0 – Having security as an enabler for a mobile workforce

Roundtable 3
Fintech Roundtable: Secure cloud-native applications with encryption strategy and microservices architecture

Roundtable 4
The challenges of scaling security – More Threats, More Systems, More Locations, The Challenges of Scaling Security

Roundtable 5
Modern Cybersecurity Posture with self-learning AI:

  •               Trends and Concerns in the current threat landscape
  •               The adoption of AI/ML in cyber security – advantages, challenges
  •               Integrating AI with modern IT architecture and third party applications
  •               Championing emerging technologies in the board room

Roundtable 6
Digital Defence: Managing Nation-State Cyber Threats

Lunch Roundtable

Roundtable 1
Building IAM infrastructure that aligns with digital transformation

Roundtable 2
Zero Trust Approach to supply chain security : Examining the direct and indirect supply chains to protect and identify and prioritize risk among supply chain vendors

Roundtable 3
Emerging risk on IT/OT convergence networks – Zero Trust approach

Roundtable 4
Navigating the third-party risk management

Roundtable 5
Defense strategies and risk mitigation from cyberattacks in the Russia-Ukraine conflict

Roundtable 6
Defining the right priorities – As we cannot protect everything

Roundtable 7
Modern Cybersecurity Posture with self-learning AI:

  •               Trends and Concerns in the current threat landscape
  •               The adoption of AI/ML in cyber security – advantages, challenges
  •               Integrating AI with modern IT architecture and third party applications
  •               Championing emerging technologies in the board room

Drinks & Learn
The shifts in cybersecurity priorities and planning in the explosion of cloud and hybrid mode adoption

————————————————————————————————————————————————-

25 May 2022
Conference and Trainings

REGISTER HERE

Points of Discussion:

  1. Building A Secure & Trustworthy Intelligent World
  2. High-Tech Crime: Grandmothers, Gangsters, Guerrillas and Governments
  3. Ransomware and Cyber-attack tactics, preventions and measures
  4. The convergence of the identity and digital security: why identity management and access control become a core security architecture
  5. Cybersecurity mesh strategy: Redesign security architecture to meet distributed enterprise security needed
  6. Mitigate security and technology risk during new tech or solution transitioning such as from legacy systems to SaaS-based applications, ERP, CRM. HR app
  7. Shifting tasks in cybersecurity for connected technology

Details

Start:
May 24
End:
May 25
Close Menu