18 Jun 2019 #IICSG2019
CXO LUNCHEON BRIEF
A by-invitation brief event for C-suites and senior officers from both the public and private sectors.
Leaders and experts of various cybersecurity domains will come together to share and discuss cutting-edge techniques and solutions, and real-life scenarios and considerations when securing the critical information infrastructure (CII) and business cyberspace.
Join the leaders and experts in an insightful session over an exquisite lunch, and learn how to manage the next-generation risks, threats and vulnerabilities.
DATE, TIME & VENUE
Date: 18 Jun 2019
Time: 12pm — 1.30pm
Venue: Infosec in the City, Singapore 2019 (#IICSG2019) Conference
Marina Bay Sands, Sands Expo & Convention Centre, Level 5
(Registration Desk located on Level 4)
12.00pm — 12.30pm
Registration Desk on Level 4
12.30pm — 12.32pm
WELCOME & OPENING ADDRESS
Adrian M. & Emil Tan, Organisers & Founders, Infosec in the City
12.32pm — 12.35pm
RETURN TO ZERO
Dave Lewis, Cisco
The efforts to secure our networks and assets grows ever more daunting with each passing year. We must continually face attacks from external forces as well as contending with our core job requirements to keep the lights on. Data breaches have grown in scale over the last 7 years at a troubling rate. In order to better combat this here needs to be a return to focusing on the core competencies and how we can better secure the workforce, workload and workplace.
12.35pm — 12.45pm
TALES FROM THE TRENCHES
Steven D'sa, FireEye Mandiant Consulting Services
Few observations and insights to help enterprises get a sneak peek into the workings of breaches from recent investigations undertaken in the region by Mandiant.
12.45pm — 12.50pm
DIGITAL SHADOWS REVEALS A 50% INCREASE IN EXPOSED DATA IN ONE YEAR
Lawrence Loh, Digital Shadows
Misconfigured sharing protocols could result in multiple breaches of GDPR with 2.3 billion exposed files, including passport data, bank records and medical information, increasing risk of identity theft, ransomware attacks and more.
12.50pm — 12.55pm
WHY ARE THE BASICS SO HARD
Quentyn Taylor, Canon
Why it's always easier to chase new infosec technology rather than fix the basic issues that surround us. If we look at some of the massive issues from botnets to cyberwar — the roots of the solution are the infosec basics.
12.55pm — 1.00pm
ASSET DISCOVERY & MONITORING IS AN ORGANISATIONAL PROBLEM
Isaac Dawson, Linkai
Coordination between security teams and IT operations is mandatory for any successful information security program. Nowhere is that more poignant than continuously discovering and monitoring your external attack surface.
1.00pm — 1.05pm
DRIVING SECURITY VALUE WITH THREAT MODELING
Avi Douglen, Bounce Security
How secure is secure enough? We’ve all been there – we’ve spent too much time and resources on security, but 3 months later we still get breached anyway. “But we followed all the ‘Best Practices’!” your developers cry. In this flash intro to secure software design, Avi Douglen will show why every software development process should start with Threat Modelling, and how this can get security to contribute to the bottom line.
1.05pm — 1.10pm
WHAT'S PSIRT (PRODUCT SECURITY INCIDENT RESPONSE TEAM) & WHY IS IT IMPORTANT?
Yuki Osawa, Panasonic
The number of cyber attacks has increased dramatically, and many large scale incidents have occurred around the world. Many organizations operate an incident response team called CSIRT (Computer Security Incident Response Team) to protect their PCs and servers in their networks. In recent years, the industry has also begun to recognize the importance of another type of incident response team, PSIRT, for their products.
Panasonic has operated PSIRT for more than 10 years to protect all of its products, such as TVs, network cameras, air-conditioners, etc. This presentation will introduce how Panasonic handles incidents targeting IoT devices.
1.10pm — 1.20pm
BRIDGING THE ATTACK-DEFENSE SKILLS GAP
Vivek Ramachandran, Pentester Academy
Enterprises are spending more than ever on cybersecurity today. However, the number of hacks happening on high profile companies is only increasing in number every year. Why, even though companies are buying the latest products and technologies, are they still getting hacked? In this short talk, we will look at the 5 common mistakes employers do when training their security staff and how one can go about bridging this skills gap!
1.20pm — 1.25pm
GLOBAL INTERCONNECTIVITY & WHY CYBER ECOSYSTEMS ARE VITAL
Linda Schindler, ICE71
With the increased interconnectivity between digital economies, cybersecurity ecosystems are crucial to innovation and cyber resilience.
CXO LUNCHEON BRIEF CO-ORGANISER & SPONSORS