18 Jun 2019 #IICSG2019

CXO LUNCHEON BRIEF

A by-invitation brief event for C-suites and senior officers from both the public and private sectors.

Leaders and experts of various cybersecurity domains will come together to share and discuss cutting-edge techniques and solutions, and real-life scenarios and considerations when securing the critical information infrastructure (CII) and business cyberspace.

Join the leaders and experts in an insightful session over an exquisite lunch, and learn how to manage the next-generation risks, threats and vulnerabilities.

DATE, TIME & VENUE

Date: 18 Jun 2019

Time: 12pm — 1.30pm

Venue: Infosec in the City, Singapore 2019 (#IICSG2019) Conference 
              Marina Bay Sands, Sands Expo & Convention Centre, Level 5

                  (Registration Desk located on Level 4) 

SCHEDULE

12.00pm — ​12.30pm
REGISTRATION
Registration Desk on Level 4
12.30pm — ​12.32pm
WELCOME & OPENING ADDRESS
Adrian M. & Emil Tan, Organisers & Founders, Infosec in the City
12.32pm — ​12.35pm
RETURN TO ZERO
Dave Lewis, Cisco

The efforts to secure our networks and assets grows ever more daunting with each passing year. We must continually face attacks from external forces as well as contending with our core job requirements to keep the lights on. Data breaches have grown in scale over the last 7 years at a troubling rate. In order to better combat this here needs to be a return to focusing on the core competencies and how we can better secure the workforce, workload and workplace.

12.35pm — ​12.45pm
TALES FROM THE TRENCHES
Steven D'sa, FireEye Mandiant Consulting Services

Few observations and insights to help enterprises get a sneak peek into the workings of breaches from recent investigations undertaken in the region by Mandiant.

12.45pm — ​12.50pm
DIGITAL SHADOWS REVEALS A 50% INCREASE IN EXPOSED DATA IN ONE YEAR
Lawrence Loh, Digital Shadows

Misconfigured sharing protocols could result in multiple breaches of GDPR with 2.3 billion exposed files, including passport data, bank records and medical information, increasing risk of identity theft, ransomware attacks and more.

12.50pm — ​12.55pm
WHY ARE THE BASICS SO HARD
Quentyn Taylor, Canon

Why it's always easier to chase new infosec technology rather than fix the basic issues that surround us. If we look at some of the massive issues from botnets to cyberwar — the roots of the solution are the infosec basics.

12.55pm — ​1.00pm
ASSET DISCOVERY & MONITORING IS AN ORGANISATIONAL PROBLEM
Isaac Dawson, Linkai

Coordination between security teams and IT operations is mandatory for any successful information security program. Nowhere is that more poignant than continuously discovering and monitoring your external attack surface.

1.00pm — ​1.05pm
DRIVING SECURITY VALUE WITH THREAT MODELING
Avi Douglen, Bounce Security

How secure is secure enough? We’ve all been there – we’ve spent too much time and resources on security, but 3 months later we still get breached anyway. “But we followed all the ‘Best Practices’!” your developers cry. In this flash intro to secure software design, Avi Douglen will show why every software development process should start with Threat Modelling, and how this can get security to contribute to the bottom line.

1.05pm — ​1.10pm
WHAT'S PSIRT (PRODUCT SECURITY INCIDENT RESPONSE TEAM) & WHY IS IT IMPORTANT?
Yuki Osawa, Panasonic

The number of cyber attacks has increased dramatically, and many large scale incidents have occurred around the world. Many organizations operate an incident response team called CSIRT (Computer Security Incident Response Team) to protect their PCs and servers in their networks. In recent years, the industry has also begun to recognize the importance of another type of incident response team, PSIRT, for their products.

Panasonic has operated PSIRT for more than 10 years to protect all of its products, such as TVs, network cameras, air-conditioners, etc. This presentation will introduce how Panasonic handles incidents targeting IoT devices.

1.10pm — ​1.20pm
BRIDGING THE ATTACK-DEFENSE SKILLS GAP
Vivek Ramachandran, Pentester Academy

Enterprises are spending more than ever on cybersecurity today. However, the number of hacks happening on high profile companies is only increasing in number every year. Why, even though companies are buying the latest products and technologies, are they still getting hacked? In this short talk, we will look at the 5 common mistakes employers do when training their security staff and how one can go about bridging this skills gap! 

1.20pm — ​1.25pm
GLOBAL INTERCONNECTIVITY & WHY CYBER ECOSYSTEMS ARE VITAL
Linda Schindler, ICE71

With the increased interconnectivity between digital economies, cybersecurity ecosystems are crucial to innovation and cyber resilience. 

CXO LUNCHEON BRIEF CO-ORGANISER & SPONSORS

Co-Organiser

Infosec in the City. Copyright © 2017-2019
IIC Productions (Pte. Ltd.). All rights reserved.

  • @infoseccity
  • @infosec_city

Contact Us  |  Join Our Mailing List   |  Follow Us :