ismg.events Open in urlscan Pro
151.101.2.159  Public Scan

Submitted URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGTHf6wKAMKyTGEf5bD-r__EoRI4_GujKJYiMGlKyGmGOXY4iFxXQKbkt1Nm5U4h5vSe2-McH8=
Effective URL: https://ismg.events/summit/southeast-asia-2024/?mkt_tok=MDUxLVpYSS0yMzcAAAGTHf6wKAQV24amZtZMZDxinv7T4v_U1GSZGbdX-ia7...
Submission: On May 19 via manual from IN — Scanned from DE

Form analysis 1 forms found in the DOM

Name: Subscribe-FooterPOST

<form class="elementor-form" method="post" name="Subscribe-Footer">
  <input type="hidden" name="post_id" value="5731">
  <input type="hidden" name="form_id" value="21b9e35">
  <input type="hidden" name="referer_title" value="Cybersecurity &amp; Business Transformation Summit: Singapore 2024">
  <input type="hidden" name="queried_id" value="25097">
  <div class="elementor-form-fields-wrapper elementor-labels-above">
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-75 elementor-field-required">
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-xs  elementor-field-textual" placeholder="Email" required="required" aria-required="true">
    </div>
    <div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
      <div class="elementor-field" id="form-field-field_4cf4815">
        <div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-3d12mzagx9b3" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&amp;co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&amp;hl=de&amp;type=v3&amp;v=8k85QBI-qzxmenDv318AZH30&amp;size=invisible&amp;badge=bottomright&amp;sa=Form&amp;cb=eiysbc426dpm"></iframe>
            </div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </div>
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-40 e-form__buttons">
      <button type="submit" class="elementor-button elementor-size-sm">
        <span>
          <span class=" elementor-button-icon">
          </span>
          <span class="elementor-button-text">Send</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

Skip to content
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About

Menu
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About


JUNE 6-7, 2024


SOUTHEAST ASIA SUMMIT (VIRTUAL)


8:00 AM SGT - 5:00 PM SGT

Day 1: ISMG Cybersecurity Conference
Day 2: CIO.inc Business Transformation Conference

Overview
Advisors
Speakers
Topics
Agenda
CPE Credits
Register

Overview
Topics
Agenda
Speakers
ADVISORS
CPE Credits
Register



EVENT OVERVIEW

South East Asia’s prominence as a global and regional hub for finance, commerce
and other business services is fueled by technology innovations across domains
that influence the other regions of Asia-Pacific. This has made it equally
vulnerable to cyberattacks.

According to a survey report, 84% of organizations in South East Asia were
victims of ransomware attacks between March 2022 and March 2023. The country had
the highest ransomware attack rates worldwide during this period.

In 2024, we anticipate the prevalence of cloud technologies, DevOps, big data,
adaptive AI, 5G, API, SaaS, blockchain, and environmental, social and governance
technology, which will have a cascading effect on cybersecurity.

ISMG’s Cybersecurity and Business Transformation Summit centered around the
theme, “Leadership, Strategic Innovation and Cybersecurity Defense,” addresses
the key challenges that IT and security leaders face. The event aims to explore
the implications of these challenges and offer strategic and tactical approaches
to implement technologies and employ robust defenses to protect critical systems
from cyberattacks.

As enterprises increasingly adopt artificial intelligence to drive technological
advancement, the associated risks have also risen exponentially, challenging
them to evaluate the level of risk they are willing to accept to accomplish
their business goals.

A successful business transformation will largely depend on the organization’s
ability to balance customer convenience, innovation, offense and defense with
the use of the right tools, technologies and best practices.

Join ISMG’s Cybersecurity and Business Transformation Summit to gain insights
into how leaders are spearheading excellence across technology implementations,
crafting unique user experiences and establishing a cyber-resilient enterprise
that leverages innovation for business growth. The summit will cover topics,
including managing risk and preparing for the generative AI era, the impact of
APIs on the future of business governance, building custom-built IT
architectures, unlocking innovation through CIO leadership, responding to
ransomware attacks, developing risk mitigation plans against new forms of
attacks, implementing effective authentication mechanisms, and more.

The summit will also delve into the diverse trends and opportunities in the
ever-evolving landscape of cybersecurity and business transformation.

You can also earn CPE credits by attending the summit.

ISMG’s agendas provide actionable education and exclusive networking
opportunities with your peers and our subject matter experts.





SANTOSH NAIR (CONFERENCE CHAIR)

Regional Head of Innovation and Process Consulting, APAC IT, Siemens
Healthineers


CHRISTOPHE BAREL (CONFERENCE CO-CHAIR)

Managing Director-APAC, FS-ISAC Singapore Chapter


RISHI GANISWARAN

Head of Legal (Technology) and Group Chief Privacy Officer, Yinson


SOURABH CHITRACHAR

Regional Vice President/Head- Asia Technology Strategy & Operations Liberty,
Mutual Insurance


JENNY TAN

President, ISACA-Singapore Chapter


REUBEN ATHAIDE

Head, Cyber Security Advisory and DevSecOps, Standard Chartered Bank


STEVEN SIM KOK LEONG

Chair, Executive Committee, OT-ISAC


ADVISORS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

Our Summit Advisory Committee comprises industry visionaries who guide the
conference’s content, ensuring that it remains relevant, cutting-edge, and
aligned with the most pressing cybersecurity challenges and opportunities.




SPEAKERS


THOUGHT LEADERS LEADING DEEP-DIVE DISCUSSIONS ON STAGE

Industry leaders from various sectors in the technology domain share their
experience on how the role of chief technology officers (CTOs) has become
indispensable across organizations. They discuss unique strategies and
techniques applied in businesses, making technology an intrinsic part of their
organizational DNA. Additionally, these thought leaders delve into how they have
redefined leadership to enhance the organization’s resilience and share their
insights on artificial intelligence, sustainability, and the future of internet.




RUWANTHI FERNANDO

Chief Information and Process Officer, Hela Clothing


CAROLYN BIGG

Partner and Global Co-Chair of the Data, Privacy and Cyber Group, DLA Piper,
Hongkong


JUSTIN ONG

APAC CISO and Chief Privacy Officer, Panasonic Asia Pacific Pte.Ltd


GUY SHEPPARD

Chief Commercial Officer, Aboitiz Data Innovation


SIFAT J N

Chief Information Officer, Bashundhara Group.


ALI ABDULLA AL SADADI

Chief of Information Technology, Ministry of Oil & Environment, Kingdom of
Bahrain


ATIF NAJAM

Chief Information Officer, Gatron (Industries) Ltd. (Gatro-nova Group)


ABID ADAM

Group Chief Risk & Compliance Officer, Axiata


FAKHRUL ISLAM

Head of Data & Analytics/BIS2, Crédit Agricole CIB



HIGHLIGHT TOPICS

 * Complying with the DPDP Act
 * Dark Web Challenges and Response
 * Third Party Risk
 * Deepfakes, Deception and AI
 * Quantum Agility
 * Zero Trust in the AI Era

Register

Day 1: ISMG Cybersecurity Conference
Day 2: CIO.inc Business Transformation Conference



AGENDA - DAY 1

Day 1: ISMG Cybersecurity Conference




WELCOME AND OPENING REMARKS

8:45 am - 9:00 AM SGT

9:00 am - 9:20 AM SGT


ABID ADAM

Group Chief Risk & Compliance Officer, Axiata


PLENARY: AI'S INFLUENCE ON CYBERSECURITY LEADERSHIP, INNOVATION AND DEFENSE

Artificial intelligence plays a pivotal role in cybersecurity by proactively
detecting potential cyberthreats, identifying new attack vectors and
safeguarding sensitive company data.

This dynamic interaction between AI and cybersecurity underscores how leveraging
AI in cybersecurity defense mechanisms is not just a strategic imperative but a
necessity in today’s digitally driven environment.

Security practitioners must take a practical approach to integrate AI into
cybersecurity frameworks. This will enable organizations to build a proactive
defense mechanism along with the rapid response process. Although AI presents
numerous opportunities, it poses challenges in fostering innovation and
collaboration within the cybersecurity ecosystem. This requires continuous
learning, adaptation and strategic leadership informed by AI-driven insights.

The session will cover: 

 * The evolving landscape of cybersecurity threats in a global context, spanning
   Southeast Asia; 
 * Use cases related to deploying AI-focused programs for enterprise security,
   innovation and defense; 
 * The intersection of AI, data privacy and ethics in establishing cybersecurity
   governance. 

Abid Adam, Group Chief Risk & Compliance Officer, Axiata

Watch brief video on this topic

9:20 am - 9:40 aM SGT


ESTI PESHIN

VP, General Manager, Cyber Division, IAI - Israel Aerospace Industries


KEYNOTE: INNOVATING AND THRIVING IN A DIGITAL ECONOMY: DO SECURITY LEADERS HAVE
THE RIGHT DEFENSES AND STRATEGIES?

In today's rapidly evolving digital landscape, organizations are continuously
embracing innovative technologies to drive growth, efficiency and
competitiveness.

However, this digital transformation comes with a heightened risk of
cyberthreats that can disrupt operations, compromise sensitive data and damage
reputation. The keynote address aims to explore the crucial intersection between
innovation, business success and cybersecurity preparedness.

The keynote will:  

 * Highlight the digital transformation landscape;   
 * Examine cybersecurity challenges in the AI era;
 * Evaluate security leaders’ role;   
 * Explore adaptive defense strategies.

Esti Peshin, VP, General Manager, Cyber Division, IAI – Israel Aerospace
Industries

Watch brief video on this topic

9:40 am - 10:10 am SGT


JAGATHESH RAGAVASAGAM

Risk and Cybersecurity Officer, Abbott


SOURABH CHITRACHAR

Regional Vice President/Head- Asia Technology Strategy & Operations, Liberty
Mutual Insurance


JUSTIN ONG

APAC CISO and Chief Privacy Officer, Panasonic Asia Pacific Pte.Ltd



LEADERSHIP TRAITS OF A CISO: A STRATEGIC ROAD MAP

The industry expects CISOs to emerge as leaders and endeavor to build a
cyber-resilient enterprise capable of enduring and containing attacks, along
with innovating and thriving in a digital economy.

To accomplish this, CISOs must align their strategies with business priorities,
move from a defense to an offense mindset, and collaborate to ensure that their
organization’s cybersecurity approach delivers business value.

Building a resilient enterprise depends on the leadership traits of a CISO and
the strategic road map to achieve the goal. Most security practitioners argue
that CISOs need to embody all leadership traits, take ownership and wear
multiple caps to build resiliency and demonstrate their inclusive leadership
skills.

The session will cover: 

 * How to become a strategic thinker and imbibe the qualities of a knight; 
 * How to make “security” a part of the corporate strategy and DNA; 
 * How to demonstrate leadership in countering information warfare and
   establishing organizational resilience.

Jagathesh Ragavasagam, Risk and Cybersecurity Officer, Abbott
Sourabh Chitrachar, Regional Vice President/Head- Asia Technology Strategy &
Operations, Liberty Mutual Insurance
Justin Ong, APAC CISO and Chief Privacy Officer, Panasonic Asia Pacific Pte.Ltd

Watch brief video on this topic

10:10 AM - 10.30 AM SGT


CAROLYN BIGG,

Partner and Global Co-Chair of the Data, Privacy and Cyber Group, DLA Piper,
Singapore


SUNARI DANDENIYA

Chief Information Security Officer, Commercial Bank of Ceylon PLC


FIRESIDE CHAT - IS PRIVACY A CISO’S PROBLEM? HOW TO OPERATIONALIZE IT?

Most security leaders believe that they are not protecting technology but
people. However, can fraud, breach and privacy be viewed together?

The fundamental question that arises is, “should privacy be considered a CISO’s
problem, and how privacy can be operationalized in the context of security and
data protection issues?”

How much security is required in an environment where openly shared data and
research results fuel business? Is a CISO more than just another corporate
policy developer and technology evangelist in terms of privacy and security
matters?  

What role does a CISO play in operationalizing data protection and privacy
regulations? 

The session will cover:

 * The intersection between security and privacy;   
 * How much is a CISO accountable for privacy;   
 * Data protection versus security controls

Carolyn Bigg, Partner and Global Co-Chair of the Data, Privacy and Cyber Group,
DLA Piper, Singapore
Sunari Dandeniya, Chief Information Security Officer, Commercial Bank of Ceylon
PL

Watch brief video on this topic



NETWORKING & EXHIBITION BREAK

10:30 AM - 10:45 AM SGT


10:45 AM - 11:15 AM SGT


JENNY TAN

President, ISACA-Singapore Chapter


JOHN LEE

Managing Director-Asia Pacific, GRF


STEVEN SIM KOK LEONG

Chair, Executive Committee, OT-ISAC



PANEL: IOT RISKS: TACTICS, TECHNIQUES AND PROCEDURES TO REMEDIATE

Security leaders agree that IoT and OT devices, including network-attached
storage devices, hold valuable data that ransomware groups seek to compromise.

These devices lack robust security measures such as those found in other
endpoints.

Some security leaders believe that implementing endpoint detection and response
on IoT and OT devices is challenging due to lack of agent support and specific
security features. While IoT risks are an enterprise-wide challenge, having
right remediation tactics, techniques and measures to counter the risks is
critical.

It is crucial to have these to ascertain the behavior of a threat actor and
assess the structured framework for executing a cyberattack.

The session will cover:

 * What should the TTPs constitute in remediating IoT risks; 
 * Defending the devices while maintaining privacy; 
 * CISOs’ consideration on the right investments and accountability.

Jenny Tan, President, ISACA-Singapore Chapter
John Lee, Managing Director-Asia Pacific, GRF
Steven Sim Kok Leong, Chair, Executive Committee, OT-ISAC


11:15 AM - 11:35 AM SGT


REUBEN ATHAIDE

Head, Cyber Security Advisory and DevSecOps, Standard Chartered Bank


SPOTLIGHT - CONQUERING SOFTWARE SUPPLY CHAIN INSECURITIES: THE SECURITY PROMISE

The industry is witnessing new attacks against the open-source software supply
chain, which becomes an intrusion point for attackers to gain control over an
organization's critical assets.

This is possible because the modern digital business increasingly relies on
technology partnerships, leveraging third-party applications and data to deliver
new functionality and optimized user experiences to market, often resulting in
mishaps. 

Security leaders have the daunting task of establishing accountability for
checking the malicious code in their supply chain. It is imperative to establish
a methodology for a secure and transparent coding process. They are grappling
with the challenge of assessing and managing risks and vulnerabilities at the
source code level and responding to software supply chain threats. Are there the
right kinds of tools and applications to remediate these risks in this AI era? 

The session will discuss: 

 * How to establish a secure coding process without malicious intent and
   compromised source control system 
 * How to adopt a “shift left” strategy in taking a security-by-design approach
   through automation 
 * Building a cybersecurity framework for faster detection and remediation of
   supply chain attacks 
 * Streamlining the software bill of materials process with continuous
   monitoring and visibility into the overall system 

Reuben Athaide, Head, Cyber Security Advisory and DevSecOps, Standard Chartered
Bank


11:35 AM - 11:55 AM SGT


RAINA VERMA

Advisory Council Member, Association of Certified Fraud Examiners (ACFE)


SUJIT CHRISTY

Secretary/Immediate past president, ISC2- Colombo Chapter, Sri Lanka,
President, Circulo de CISO


THIRD-PARTY SUPPLIERS: RISKS AND RESPONSE

With third-party-sourced breaches regularly making the headlines, most companies
have become aware of the risks created by this extended attack surface — often
because they have been victims themselves.

By following the right path, security and risk leaders can feel confident in
their approach to managing the cyber risk posed by third parties. 

This session will discuss: 

 * How third-party risk environment has evolved; 
 * Building an effective risk management program with right processes and
   tools; 
 * Right prescription to third party SLAs; 
 * The challenges of implementing third-party risk program; 
 * How do you respond to third party risks. 

Raina Verma, Advisory Council Member, Association of Certified Fraud Examiners
(ACFE)
Sujit Christy, Secretary/Immediate past president, ISC2- Colombo Chapter, Sri
Lanka, President, Circulo de CISO

11:55 AM - 12:15 pm SGT


DR. JASSIM HAJI

Executive Advisor for AI & Data Science, NAIRDC


SIVAN UMAPATHY

Group Chief Digital Officer, Nityo Infotech


MAHESH CHANDRAN

Director AI, Fujitsu Research



FIRESIDE CHAT: AI-POWERED SHADOW DATA MONITORING: RAPID THREAT DETECTION AND
REMEDIATION

AI solutions are transforming data security by addressing the often-overlooked
issue of shadow data.

hese solutions can help in adeptly identifying and monitoring potential data
access abnormalities, swiftly alerting cybersecurity professionals to potential
threats. Therefore, they significantly reduce the time it takes to detect and
remediate security issues in real time, ultimately bolstering data protection
and safeguarding against unauthorized access or data breaches. This innovative
approach not only enhances data security but also enables organizations to
respond proactively to emerging threats, consequently fortifying their
cybersecurity posture.

The session will cover: 

 * The concept of shadow data and its relevance in the context of data
   security; 
 * The capabilities of AI solutions in identifying and monitoring potential data
   access abnormalities; 
 * Proactive response to emerging threats. 

Dr. Jassim Haji, Executive Advisor for AI & Data Science, NAIRDC
Sivan Umapathy, Group Chief Digital Officer, Nityo Infotech
Mahesh Chandran, Director AI, Fujitsu Research




CLOSING REMARKS

12:15 PM - 12:30 PM SGT




AGENDA - DAY 2



Day 2: CIO.inc Business Transformation Conference


WELCOME AND OPENING REMARKS - ISMG

8:45 am - 9:00 AM SGT

9:00 am - 9:20 am SGT


ARLENE ROMASANTA

Director IV, Department of Environment and Natural Resources (DENR), Singapore


PLENARY: THE UPCOMING AGE: AI’S INFLUENCE ON THE TECHNOLOGY INNOVATION

This session delves into the intricate relationship between organizations and
artificial intelligence, exploring the seamless integration of AI into the
business.

It also examines the collaborative co-evolution of humans and AI systems,
shedding light on the extensive societal impact in Singapore, spanning
industries, workforce dynamics, and the broader societal framework. The session
elaborates on the profound influence of AI in businesses and the technologies
adopted. It delves in the transformative power of AI to revolutionize the way
businesses innovate and operate.

The session will cover:

 * Exploring approaches to evaluate return on investment in business AI
   initiatives; 
 * Navigating complexities in implementing AI-driven optimization solutions; 
 * Identifying and discussing common challenges faced by businesses in adopting
   AI technologies. 

Arlene Romasanta, Director IV, Department of Environment and Natural Resources
(DENR), Singapore


9:20 am - 9:40 am SGT


ZAVED AKHTAR

Chairman & Managing Director, Unilever Bangladesh 


CEO KEYNOTE: CEO PRIORITIES IN 2024: IMPACT AND STRATEGIES FOR CIOS 

In this session, CEOs will share their top priorities and strategic perspectives
for 2024, shedding light on their vision for their organizations.

CIOs will gain valuable insights into aligning their technology and digital
strategies with the broader corporate objectives. This collaborative discussion
will provide a platform for the exchange of ideas and the formulation of
strategies. The goal is to ensure that CIOs are well-prepared to contribute to
realizing CEOs’ priorities and driving impactful technological transformations.

The session will cover: 

 * The need to foster innovation and technology partnership to achieve business
   goals; 
 * Harnessing Data-driven decision-making and nurturing talent development; 
 * The importance of aligning strategic priorities.

Zaved Akhtar, Chairman & Managing Director, Unilever Bangladesh 


9:40 am - 10:10 Am SGT


GUY SHEPPARD

Chief Commercial Officer, Aboitiz Data Innovation


FIRESIDE CHAT: BUILDING A DATA-DRIVEN TO DATA-FIRST ENTERPRISE IN THE DIGITAL
ERA

Organizations are undergoing a strategic evolution in their approach to data -
transitioning from data-driven to data-first.

Both the terms are often used interchangeably but have distinct connotations.
While both emphasize the utilization of data for decision-making, data-first
involves inga comprehensive data-centric approach across the organization,
placing data at the core of the operations – as opposed to specific projects –
to inform decision-making.

The session will delve into what it takes for organizations to scale from a
data-driven to data-first enterprise.

The session will cover: 

 * Playbook for data-first enterprise;  
 * Extensive cross-functional data integration;  
 * New technology tools and opportunities for innovation. 

Guy Sheppard, Chief Commercial Officer, Aboitiz Data Innovation




NETWORKING BREAK

10:10 AM - 10:30 AM SGT


10:30 am - 11:00 am SGT


RUWANTHI FERNANDO

Chief Information and Process Officer, Hela Clothing


ATIF NAJAM

Former Chief Information Officer, Gatron (Industries) Ltd. (Gatro-nova Group)


PANEL: MAKING OF A RESILIENT ENTERPRISE: HOW WILL CIOS RAISE THE BAR?

In the face of constant disruptions and a changing business landscape,
enterprises must be resilient to overcome challenges, embrace change and sustain
growth.

The panel will highlight the crucial role of CIOs in building and leading
resilient organizations. 

The session will cover: 

 * A CIO checklist for driving resilience within organizations; 
 * Emerging technologies that enhance agility, adaptability and robustness; 
 * Building resilience through collaborative partnerships with vendors and
   suppliers; 
 * Leveraging an agile and adaptive IT infrastructure, including cloud,
   microservices and containerization, to swiftly respond to changing business
   needs. 

Ruwanthi Fernando, Chief Information and Process Officer, Hela Clothing
Atif Najam, Former Chief Information Officer, Gatron (Industries) Ltd.
(Gatro-nova Group)



11:00 am - 11:30 am SGT


BILAL JAVERI

CIO, Lucky Motor Corp


GEMMA ROSE DUBLAN

CEO, GreyWolf Technologies Philippines


TS. IZUDDIN ABDULLAH

Head of IT, TNB Integrated Learning Solution Sdn Bhd



PANEL: MACROECONOMIC UNCERTAINTY: ESTABLISHING DIGITAL INNOVATION AND RESILIENCE
GUIDED BY AI

As organizations embrace AI-driven transformations, CIOs confront challenges
influenced by macroeconomic factors such as economic uncertainties, constrained
IT budgets, talent acquisition struggles, skill shortages and geopolitical
instability.

The session will explore the current macroeconomic landscape through the lens of
AI-driven transformation, offering CIOs insights, recommendations and best
practices to navigate digital evolution amid uncertainty. 

The session will  cover: 

 * Market shifts and emerging trends in AI-driven transformation; 
 * Analysis of challenges experienced by enterprises; 
 * Agile methodologies organizations need to implement to adapt to the market
   dynamics; 
 * Strategies for achieving excellence and innovation in turbulent economic
   times. 

Bilal Javeri, CIO, Lucky Motor Corp
Gemma Rose Dublan, CEO, GreyWolf Technologies Philippines
Ts. Izuddin Abdullah, Head of IT, TNB Integrated Learning Solution Sdn Bhd



11:30 am - 12:00 pm SGT


HUSSEIN HASSANALI

Head of IT Advisory Internal Audit, HBL - Habib Bank Limited


JAMES THANG

Group Chief Information Officer, UCSI Group Holdings Sdn. Bhd.


PANEL - APIS: IMPACTING THE FUTURE OF IT AND BUSINESS

In today's rapidly evolving digital landscape, the role of application
programming interfaces (APIs) cannot be overstated.

APIs are no longer just tools for developers, they are becoming the backbone of
modern business strategies. As CIOs, understanding the pivotal role of APIs in
your digital strategy is essential for staying ahead in the ever-evolving
business landscape. Embracing APIs as the future of business can unlock new
opportunities, streamline operations and drive growth.

The session will cover: 

 * Security and governance; 
 * Monetizing opportunity; 
 * Enhancing innovation and customer experience. 

Hussein Hassanali, Head of IT Advisory Internal Audit, HBL – Habib Bank Limited
James Thang, Group Chief Information Officer, UCSI Group Holdings Sdn. Bhd.

12:00 pm - 12:20 pm SGT


ALI ABDULLA AL SADADI

Chief of Information Technology, Ministry of Oil & Environment, Kingdom of
Bahrain


CHARTER FOR CIOS AND TECHNOLOGY EXECUTIVES IN 2024: THE WAY FORWARD IN EXPANDING
DIGITAL DELIVERY

The session delves into the evolving digital landscape in the realm of business
transformation, where technology pioneers are leading the way to expand digital
delivery.

CIOs and technology leaders will gain valuable insights into harnessing the
potential of cutting-edge technologies to elevate customer experiences,
streamline business operations and maintain a competitive edge. The session
provides a platform to exchange knowledge and ideas as technology advances,
shaping strategies for a future where innovative solutions and digital growth
are central to business operations.

The session will cover: 

 * Leveraging modern technologies; 
 * Reshaping digital landscapes and revolutionizing business practices in 2024; 
 * Personalizing customer experiences with advanced technologies and empowering
   CIOs and technology executives to enhance customer interactions; 
 * Optimizing internal processes and decision-making through technology,
   enhancing efficiency and effectiveness across diverse industries. 

Ali Abdulla Al Sadadi, Chief of Information Technology, Ministry of Oil &
Environment, Kingdom of Bahrain




CLOSING REMARKS

12:20 PM - 12:30 PM SGT




DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT

Register

#ISMGSummit



@ISMG_News





THE SUMMIT EXPERIENCE

Previous
Next
Previous
Next


CPE CREDITS

Engage offers Continuing Education Credits. Learn informative and engaging
content created specifically for security professionals.


Claim Credits


REGISTER

RSVP here to attend our events. You can select for multiple or individual
tickets. 





PAST SPEAKERS


ALI ABDULLA ALSADADI

Chief of Information Technology, Ministry of Oil and Environment


JENNY TAN

President, ISACA Singapore Chapter


ANIL KUMAR SAHA

Senior Vice President, DBS Bank


JOEY FONTIVEROS

Acting Regiment Commander, Philippines Army


THURAYA AL-HARTHI

Acting Director - Government Digital Services Unified Portal, Ministry of
Transport, Communications and Information Technology - Oman


DATO' DR AMIRUDIN ABDUL WAHAB

CEO, Cybersecurity Malaysia


IVAN IRAWAN

Director Of Information Technology, Credit Bureau Indonesia


PHORAM MEHTA

Senior Director, APAC CISO, PayPal


Upcoming ISMG Events


MAY 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your
Organization's Resilience
See Event


APRIL 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit
See Event


APRIL 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration
See Event


JUNE 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru
See Event


APRIL 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and
Healthcare
See Event

Upcoming ISMG Events


MAY 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your
Organization's Resilience
See Event


APRIL 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit
See Event


APRIL 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration
See Event


EVENT

 * Summits
 * Engage
 * Roundtables
 * Custom Events

 * Summits
 * Engage
 * Roundtables
 * Custom Events


ABOUT

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy



@ISMG_News #ISMGEngage




SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS

Send