www.idc.com Open in urlscan Pro
34.234.26.208  Public Scan

Submitted URL: https://bit.ly/3qXUFzw
Effective URL: https://www.idc.com/ap/events/70697-security-masterminds-2023
Submission: On July 03 via manual from SG — Scanned from SG

Form analysis 1 forms found in the DOM

POST

<form data-widgethash="-19148486391916340996" method="post" id="form-ajax-2" data-abide="" novalidate="" data-formlabel="Security Masterminds 2023 - Request a password" data-e="gxn2c9-e">
  <div class="message">
    <div class="row">
      <div class="column text-center">
        <div class="message-content">
          <p>Thank you for submitting the form.<br>We will be in touch.</p>
          <br>
          <a class="button bg-blue" onclick="parent.closeModals();">
                                Back Home
                            </a>
        </div>
      </div>
    </div>
  </div>
  <div class="fields">
    <p style="margin-bottom: 20px;">If you do not have a password, please contact us using the form below.</p>
    <div class="field-box">
      <input required="" name="Name" type="text" id="Name">
      <label for="Name">Name</label>
      <span class="form-error">This field is required.</span>
    </div>
    <div class="field-box">
      <input required="" name="Surname" type="text" id="Surname">
      <label for="Surname">Surname</label>
      <span class="form-error">This field is required.</span>
    </div>
    <div class="field-box">
      <input required="" name="Company" type="text" id="Company">
      <label for="Company">Company</label>
      <span class="form-error">This field is required.</span>
    </div>
    <div class="field-box">
      <input required="" name="Phone" type="tel" id="Phone">
      <label for="Phone">Phone</label>
    </div>
    <div class="field-box">
      <input required="" name="Email" type="email" id="Email">
      <label for="Email">Email</label>
      <span class="form-error">Please enter a valid email address.</span>
    </div>
    <div class="captcha" data-troll="">
      <script src="https://www.recaptcha.net/recaptcha/api.js" async="" defer=""></script>
      <div class="g-recaptcha" data-sitekey="6Lez8wgUAAAAAI_hxk4hCsRq3u13kOWRZUiRB5aS" data-callback="captchaCallbackWrapper" style="overflow: hidden; width: 100%;">
        <div style="width: 100%; height: 78px;">
          <div><iframe title="reCAPTCHA"
              src="https://www.recaptcha.net/recaptcha/api2/anchor?ar=1&amp;k=6Lez8wgUAAAAAI_hxk4hCsRq3u13kOWRZUiRB5aS&amp;co=aHR0cHM6Ly93d3cuaWRjLmNvbTo0NDM.&amp;hl=zh-CN&amp;v=khH7Ei3klcvfRI74FvDcfuOo&amp;size=normal&amp;cb=c0nhuurn86os"
              width="304" height="78" role="presentation" name="a-52d8bndi83jt" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
              style=""></iframe></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
            style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
        </div><iframe style="display: none;"></iframe>
      </div>
      <script>
        function captchaCallbackWrapper() {
          if (typeof captchaCallback !== "undefined") {
            captchaCallback();
          }
        }
      </script>
      <span class="form-error">Please verify the reCAPTCHA field</span><br>
    </div>
    <div class="row column">
      <p>All fields not labeled "optional" are required.</p>
    </div>
    <br>
    <div class="row column text-right">
      <div class="submit-box">
        <div class="submit-box__spinner">
          <div class="idc-loader circle"></div>
        </div><input type="submit" class="button is-large bg-blue" value="Submit">
      </div>
    </div>
  </div>
  <input type="hidden" name="widgethash" value="-19148486391916340996">
  <input type="text" name="userNameField" value="" style="display: none;">
</form>

Text Content

Explore other IDC events
Home
 * Overview
 * Agenda
 * Speakers
 * Partners
 * Partner with Us
 * More...
   * Articles
   * Venue
 * Register Now
 * 
 * * 
   * 
   * 
 * MENU

 * Register Now
 * Overview
 * Agenda
 * Speakers
 * Partners
 * Partner with Us
 * Articles
 * Venue


SECURITY MASTERMINDS 2023

Security is a Strategy | Security is Beyond IT

3 August 2023 Singapore
Register Now


SECURITY IS A STRATEGY, SECURITY IS BEYOND IT

Cyber attacks are becoming more sophisticated and frequent. According to an IDC
survey of around 500 enterprises, over 70% experienced at least one major
security breach of their on-premises data centers with the majority experiencing
two or more major breaches.

Today, cyber security is no longer limited to the IT department. To enhance and
upgrade security protection and prevention, effort from the entire enterprise is
required, especially strategy making and actions starting from the C-suites and
board level executives.

Security is a business strategy, not an option.
Security success does not only depend on technology. Security is a team effort.
C-suite and board-level roles in security are becoming more essential.



WHY ATTEND?


FIRST SECURITY CONFERENCE IN ASIA FOCUSING ON STRATEGY PERSPECTIVES.


GAIN ACCESS TO CONTENT BY IDC (IIAR ANALYST FIRM OF THE YEAR 2022) AND INSIGHTS
BACKED BY END-USER SURVEYS.


MEET AND NETWORK WITH C-SUITES, BOARD-LEVEL AND SENIOR EXECUTIVES FROM ALL
BUSINESS UNITS.


STEP IN THE SHOES OF A HACKER! WITNESS A HACKER IN ACTION LIVE ON STAGE.


WHO SHOULD ATTEND?

C-suite / SVP / VP / Head / Director / Senior Manager of:

Technology, Cyber Security, Information Security, IoT Security, Information
Risk, IT Forensics, Computer Security Incident Responders, Disaster Recovery,
Network & Infrastructure Management, Penetration Testers
---
Systems Design, Software Developers, Software Engineering, Research & Product
Development, Analysts, Architects, Web Developers, UX/UI Design, Data Analytics
& Engineering
---
Operations, DevOps, Ethics & Compliance, Legal, Human Resource, Finance,
Marketing, Digital Marketing, Digital Transformation, Innovation, Cloud
Strategy, Change Management
Register Now


AGENDA


FILTER TOPICS


Download Complete Agenda
Thursday August 3, 2023

9:30


REGISTRATION | EXHIBITION HALL OPENS

9:50


THE UPCOMING STORM: ECONOMIC OUTLOOK FOR 2023 AND ITS IMPACT ON SUPPLY CHAIN AND
SECURITY RESILIENCY

Linus Lai

Vice President, Software and Services, IDC Asia/Pacific
10:10


DEVELOPING A SAFER CYBERSPACE FOR A TRUSTED DIGITAL ECONOMY

This keynote presentation highlights the evolving cyber threat landscape as
Singapore transits towards a Digital Economy and Digital Society. It will delve
into why cybersecurity is not just a technical issue, but also a business issue,
and how organizations should build a culture of cybersecurity awareness. The
presentation will explore:



 * Identifying emerging trends and challenges in the cybersecurity landscape
 * Leveraging technologies to adapt to the evolving cyber threats
 * Involving key stakeholders and working with partners to build digital trust

 

Veronica Tan

Director, Safer Cyberspace, Cyber Security Agency of Singapore (CSA)
10:30


INTEGRATING INTELLIGENCE FOR TIMELY DETECTION AND RESPONSE TO MODERN ATTACKS

Cyber threats are becoming more advanced, sophisticated, and persistent.
Attackers employ various techniques, making it challenging for traditional
security solutions to detect and respond effectively. This session discusses the
ways to combat the increasing frequency and sophistication of cyberattacks.

 * Key security challenges: increasingly sophisticated and stealthy ways to
   bypass traditional controls and lack of cyber security skills short in threat
   hunting and investigative work
 * Having a holistic view of IT environment, including endpoints, networks,
   cloud infrastructure and applications, for contextual insights to enhance
   threat hunting
 * Integrating and scaling new technologies while maintaining cyber resiliency

Linus Lai

Vice President, Software and Services, IDC Asia/Pacific

Vivek Chudgar

Head of APJ, Mandiant Consulting
10:50


FUTURE OF PROACTIVE SECURITY: AUTOMATION AND AI TOOLS TO COMBAT THREAT

Simon Piff

Vice President, Security & Trust Research, IDC Asia/Pacific, IDC Asia/Pacific

Haran Kumar

Senior Security Specialist, Elastic

Dennis Chung

Chief Security Officer, Microsoft Singapore
11:10


COFFEE BREAK

11:40


FACILITATING SECURED MOVEMENT OF DATA WITH HYPERCONNECTED DIGITAL FABRIC

12:00


ALIGNING INTERNAL SECURITY INVESTMENT WITH BUSINESS OBJECTIVES: STRATEGIES FOR
SUCCESS

Over the years, many organizations have shifted their approach to security,
considering it as an integral part of their overall business strategy from the
start. They understand that investing in security technologies and practices
early on can help prevent costly security breaches, protect sensitive data, and
maintain customers. This panel will explore:



 * Why cybersecurity should be part of your business strategy
 * Where to start, when to start and who to involve?
 * How do you measure the success of security investments to your business?

 

Danny Han Seng Foong

Vice President & Head of Asia Strategy, Telenor Asia

Shao Fei Huang

Group Chief Information Security Officer, SMRT Corporation Ltd
12:20


DEVELOPING A COMMON LANGUAGE OF CYBERSECURITY RISKS AND BEST PRACTICES

12:40


SECURING THE INTERCONNECTED DIGITAL ECOSYSTEM WITH A COLLABORATIVE APPROACH

13:00


NETWORKING LUNCH

14:00


THE NEW AGE ROBBER

Jayson E. Street

The Bank Robber
14:40


CONSUMERS’ ATTITUDE TOWARDS DATA PRIVACY

15:00


PREPARING THE BOARD FOR NEW CYBERSECURITY REGULATIONS

As part of their fiduciary and oversight role, the board is critical to ensuring
effective governance, risk management, and oversight of an organization's
cybersecurity practices. Thus, board members need to understand the evolving
cybersecurity landscape and the potential risks and threats facing the
organization. This presentation will touch on:

 * Emerging and new cybersecurity regulations
 * Necessary appropriate controls, policies, and procedures to mitigate cyber
   risks and comply with relevant regulations
 * Communication with key stakeholders, including shareholders, regulators, and
   customers, about the organization's cybersecurity posture and efforts

Charmian Aw

Partner, Squire Patton Boggs
15:20


THE PROMISES AND CHALLENGES OF NEW TECHNOLOGIES TO SECURITY

Frankie Shuai

APAC Regional Information Security Officer, DWS Group

Ajay Kumar

Chair – Cyber Security SIG, ISACA SG Chapter
15:40


COFFEE BREAK

16:00 17:45


FOCUS GROUP DISCUSSIONS (PARALLEL SESSIONS)

The Focus Group Discussions will require pre-registration and limited seats are
available for each Theme.

Theme 1: Data Protection & Privacy (Pre-registration required.)
16:00 - 17:45
Securing Intellectual Property while working with Generative AI

What exactly is Generative AI, and why is it everywhere? This discussion will
dive into the key areas that Generative AI could make the most impact in the
coming months. This session will:

 * Delve into identifying the use of generative AI technology in organizations
   and discuss the risks involved in sanctioned and unsanctioned use.
 * Explore the roles and responsibilities of individuals in protecting
   organizations from the risks presented by generative AI
 * Uncover how to ensure compliance with regulatory and data privacy
   requirements

Deepika Giri

Associate Vice President, Data & Analytics

Karl Vogel

Symantec Solutions Engineering Director, APJ, Broadcom
16:00 - 17:45
Data Security: Cyber Vaulting to Protect Mission-Critical Data

Theme 2: Secured Digital Infrastructure & Network (Pre-registration required.)
16:00 - 17:45
Endpoint Security: Protecting Endpoint to Network

16:00 - 17:45
Infrastructure Security: Protecting Your Multi-cloud Environment

Theme 3: Security Risk Management (Pre-registration required.)
16:00 - 17:45
Cybersecurity Incident Response Planning

16:00 - 17:45
Managing Third-Party Cyber Risks

18:00


END OF EVENT


ADVISORY BOARD

Linus Lai Show full profile

Linus Lai

Vice President, Software and Services, IDC Asia/Pacific

Christian Fam Show full profile

Christian Fam

Research Manager, Cybersecurity Service, IDC Asia/Pacific

James Sivalingam Show full profile

James Sivalingam

Senior Program Manager, Research, IDC Asia/Pacific

Sakshi Grover Show full profile

Sakshi Grover

Research Manager, Future of Trust & Work, IDC India


SPEAKERS

Want to become a speaker? Join Now!

Linus Lai Show full profile

Linus Lai

Vice President, Software and Services, IDC Asia/Pacific

Veronica Tan Show full profile

Veronica Tan

Director, Safer Cyberspace, Cyber Security Agency of Singapore (CSA)

Vivek Chudgar Show full profile

Vivek Chudgar

Head of APJ, Mandiant Consulting

Simon Piff Show full profile

Simon Piff

Vice President, Security & Trust Research, IDC Asia/Pacific, IDC Asia/Pacific

Haran Kumar Show full profile

Haran Kumar

Senior Security Specialist, Elastic

Dennis Chung Show full profile

Dennis Chung

Chief Security Officer, Microsoft Singapore

Danny Han Seng Foong Show full profile

Danny Han Seng Foong

Vice President & Head of Asia Strategy, Telenor Asia

Shao Fei Huang Show full profile

Shao Fei Huang

Group Chief Information Security Officer, SMRT Corporation Ltd

Jayson E. Street Show full profile

Jayson E. Street

The Bank Robber

Charmian Aw Show full profile

Charmian Aw

Partner, Squire Patton Boggs

Frankie Shuai Show full profile linkedin

Frankie Shuai

APAC Regional Information Security Officer, DWS Group

Ajay Kumar Show full profile

Ajay Kumar

Chair – Cyber Security SIG, ISACA SG Chapter

Deepika Giri Show full profile

Deepika Giri

Associate Vice President, Data & Analytics

Karl Vogel Show full profile

Karl Vogel

Symantec Solutions Engineering Director, APJ, Broadcom


PARTNERS

Want to become a partner? Contact Us!

Main Series & Executive Lunch Roundtable Sponsor
Main Series Sponsor
Main Series Sponsor
Main Series Sponsor
Focus Group Discussion Sponsor
Focus Group Discussion Sponsor
Focus Group Discussion Sponsor
Focus Group Discussion Sponsor
Exhibitor
Exhibitor
Media Partner


PARTNERSHIP OPPORTUNITIES

Partner with us in the first Security Conference in Asia focusing on strategy
perspectives.
Learn More


NO ONE'S COMPLETELY SAFE FROM CYBER ATTACKS

Defend your organization against rising cyber-attacks with Christian Fam as he
enumerates recent breaches in the region, incidents of data compromise, and what
you can learn from them.

Learn More


VENUE

Pasir Panjang Power Station


27 Pasir Panjang Rd, Singapore 117537

Show on map
View Venue Details


CONTACT US

Stella Yeo

Events Executive

Email


ABOUT IDC

59 Years
1300 Analysts
110 Countries

International Data Corporation (IDC) is the premier global provider of market
intelligence, advisory services, and events for the information technology,
telecommunications, and consumer technology markets. With more than 1,300
analysts worldwide, IDC offers global, regional, and local expertise on
technology and industry opportunities and trends in over 110 countries. IDC's
analysis and insight helps IT professionals, business executives, and the
investment community to make fact-based technology decisions and to achieve
their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary
of International Data Group (IDG), the world's leading media, data and marketing
services company. To learn more about IDC, please visit www.idc.com.

Copyright 2023 IDC. All rights reserved.





PASSWORD REQUEST

Thank you for submitting the form.
We will be in touch.


Back Home

If you do not have a password, please contact us using the form below.

Name This field is required.
Surname This field is required.
Company This field is required.
Phone
Email Please enter a valid email address.

Please verify the reCAPTCHA field


All fields not labeled "optional" are required.







Tenable

Tenable® is the Exposure Management company. Approximately 43,000 organizations
around the globe rely on Tenable to understand and reduce cyber risk. As the
creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver
the world’s first platform to see and secure any digital asset on any computing
platform. Tenable customers include approximately 60 percent of the Fortune 500,
approximately 40 percent of the Global 2000, and large government agencies.
Learn more at tenable.com.

Recorded Future

Recorded Future is the world’s largest intelligence company. Recorded Future’s
Intelligence Cloud provides complete coverage across adversaries,
infrastructure, and targets. By combining persistent and pervasive automated
data collection and analytics with human analysis, Recorded Future provides
real-time visibility into the digital landscape and empowers clients to take
proactive action to disrupt adversaries and keep their people, systems, and
infrastructure safe. Headquartered in Boston with offices and employees around
the world, Recorded Future works with over 1,600 businesses and government
organizations across more than 70 countries. Learn more at recordedfuture.com.

Symantec

Symantec® Enterprise Cloud, a Broadcom cybersecurity solution, delivers
data-centric hybrid security for the largest and most complex organizations in
the world. It enables enterprises to meet legal, regulatory, and corporate data
compliance requirements. It also empowers today’s modern workforce to securely
access sensitive company assets from anywhere. Symantec Enterprise Cloud unifies
intelligence across control points, enabling organizations to detect, block, and
remediate the newest generation of threats throughout their infrastructure. From
remote devices to on-premises data centers to cloud-deployed applications,
Symantec Enterprise Cloud solves the critical cybersecurity challenges facing
the world’s biggest multinational corporations.

https://symantec.broadcom.com/emea-info-sec

ManageEngine

ManageEngine is the enterprise IT management division of Zoho Corporation.
Established and emerging enterprises—including 9 of every 10 Fortune 100
organizations—rely on ManageEngine's real-time IT management tools to ensure
optimal performance of their IT infrastructure, including networks, servers,
applications, endpoints and more. ManageEngine has offices worldwide, including
the United States, the United Arab Emirates, the Netherlands, India, Colombia,
Mexico, Brazil, Singapore, Japan, China and Australia, as well as 200+ global
partners to help organizations tightly align their business and IT. For more
information, please visit the company site.

 

Mandiant

Mandiant is a recognized leader in dynamic cyber defense, threat intelligence
and incident response services.

By scaling decades of frontline experience, Mandiant helps organizations to be
confident in their readiness to defend against and respond to cyber threats.
Mandiant is now part of Google Cloud.

Elastic

Elastic delivers enterprise search, observability, and security solutions that
enhance customer and employee search experiences, keep mission-critical
applications running smoothly, and protect against cyber threats across one
cloud, many clouds or on-prem. Adobe, BMW, Microsoft, Zurich Insurance and
thousands of other organizations tap into the power of Elastic to accelerate
results that matter.

https://www.elastic.co/partners/microsoft-azure

Cloudflare

Cloudflare, Inc. is on a mission to help build a better Internet. Cloudflare’s
platform protects and accelerates any Internet application online without adding
hardware, installing software, or changing a line of code. Internet properties
powered by Cloudflare have all web traffic routed through its intelligent global
network, which gets smarter with every request. As a result, they see
significant improvement in performance and a decrease in spam and other attacks.
Cloudflare was named to Entrepreneur Magazine’s Top Company Cultures 2018 list
and ranked among the World’s Most Innovative Companies by Fast Company in 2019.
Headquartered in San Francisco, CA, Cloudflare has offices in Austin, TX,
Champaign, IL, Kirkland, WA, New York, NY, San Jose, CA, Washington, D.C.,
Lisbon, London, Munich, Beijing, Singapore, and Sydney.

For more information, please visit https://www.cloudflare.com/case-studies/.

 





Loading...