Loading…
Thursday, July 11
 

8:30am HKT

Registration and welcome coffee
Thursday July 11, 2024 8:30am - 9:00am HKT

9:00am HKT

Chairperson’s Opening remarks
Thursday July 11, 2024 9:00am - 9:10am HKT

9:10am HKT

Developing a Sustainable Roadmap for Enterprise IT Security: Optimizing on Technologies and Talent
  • Integrating automation and machine learning in threat detection and response 
  • How to recognize and address the need for agile methodologies and flexible security frameworks  
  • Optimizing security budgets to maximize ROI and to minimize risks 
  • Revisiting and examining the cybersecurity skills gap in light of new emerging threat vectors 

Thursday July 11, 2024 9:10am - 9:35am HKT

9:35am HKT

Transforming Defense into Offense: Countering Phishing Attacks Through Advanced Authentication Measures
  • Deploying new-age tools and technologies 
  • Developing a strategic approach to tackling phishing attacks by leveraging new authentication and authorization mechanisms 
  • Building a defense-in-depth security architecture for resilience against attacks using a proactive security approach 

Thursday July 11, 2024 9:35am - 10:00am HKT

10:00am HKT

Tackling Ransomware Head-On: IT Security Leader’s Playbook Against Ransomware Attacks
  • Implementing robust backup and recovery strategies to bolster data resilience post-ransomware assaults 
  • Negotiating and enforcing comprehensive service level agreements (SLAs) with external service vendors for enhanced operational reliability 
  • Blending AI and existing threat detection methodologies  
  • Enhancing incident response protocols through the integration of cutting-edge threat mitigation frameworks and technologies 

Thursday July 11, 2024 10:00am - 10:30am HKT

10:30am HKT

Fortifying Cyber Defenses with Zero-Trust Architecture and Cloud Security
  • Strengthening security through the adoption of zero-trust architecture principles. 
  • Heightened emphasis on cloud security, particularly within serverless architecture frameworks. 
  • Enhancing security data resilience by harnessing predictive analytics and GenAI technologies. 
  • Future-proofing cyber defenses through the integration of advanced security measures. 

Thursday July 11, 2024 10:30am - 10:50am HKT

10:50am HKT

Networking Coffee Break
Thursday July 11, 2024 10:50am - 11:20am HKT

11:20am HKT

Identity-First Security: Elevating Enterprise Resilience through Hygiene, Security Posture and ITDR
  • Learn how meticulous management of digital identities fortifies your organization's defenses, reducing vulnerability to cyber threats. 
  • Discover proactive strategies to optimize security posture, ensuring robust protection against evolving cyber risks. 
  • Explore the critical role of Identity Threat Detection and Response (ITDR) in swiftly mitigating identity-based breaches, bolstering your enterprise's resilience. 
  • Gain insights into integrating design principles that harmonize identity hygiene, security posture management, and ITDR, fortifying your organization against emerging threats and disruptions. 

Thursday July 11, 2024 11:20am - 11:40am HKT

11:40am HKT

Blending Human Talent with AI: How to Build a Future-Ready Enterprise Security Envelope
  • How to scan networks using AI for early detection  
  • Creating a winning team: human intuition + AI insights  
  • Managing patching, vulnerability testing and incident response int eh age of AI 
  • Knowledge sharing and training: how AI and human sources share common security requirements 

Thursday July 11, 2024 11:40am - 12:00pm HKT

12:00pm HKT

Revising and Re-engaging Enterprise IT Security Policies in the Age of AI: The Toolkit Formulation
  • Identifying security gaps and investment needs with CIOs in the new AI-era 
  • Presenting techintegration demands of anomaly detection, natural language processing for threat analysis, and automation for incident response  
  • Collaborating with internal and external partners in revising robust security governance 
  • How to systemize with leadership on intelligence sharing and regular policy reviews. 

Thursday July 11, 2024 12:00pm - 12:20pm HKT

12:20pm HKT

Technology Demonstrations at Exhibition Space
Thursday July 11, 2024 12:20pm - 12:50pm HKT

12:50pm HKT

Networking Lunch  
Thursday July 11, 2024 12:50pm - 1:50pm HKT

1:50pm HKT

Technical Deep Dives
Round 1: 1.50pm – 2.30pm
Round 2: 2.30pm – 3.10pm
Networking Tea Break: 3.10 pm – 3.40pm
Round 3: 3.40pm – 4.20pm
Round 4: 4.20pm – 5.00pm

TECHNICAL DEEP DIVES 
 
In these small working group sessions, you'll have the chance to delve deeply into a topic of interest alongside an expert facilitator and your peers. These discussions foster open and candid dialogue, allowing you to explore the challenges and opportunities presented by these innovations. You'll be engaged in four roundtable discussions throughout the post-lunch session.  
   

Navigating IAM tactics in a Zero-Trust Landscape  
  • Tackling Multifactor Authentication (MFA) Fatigue: overcoming obstacles and optimizing IAM functionality 
  • Embracing Assumed Breaches: Integrating preemptive measures into security protocols. 
  • Advancing Passwordless Authentication: Driving widespread implementation to bolster security measures. 
  • Strategic Evolution: Adapting IAM approaches to align with the demands of a zero-trust environment. 
 
Cloud Sentry: Accelerating the Efficiency of Threat Detection and Response 
  • Real-time Threat Recognition: How to detect and respond to cloud-based threats in milliseconds, mitigating risks before they escalate 
  • Zero-Day Exploit Resilience: How to fortify defenses against emerging threats, safeguarding your cloud infrastructure against unforeseen vulnerabilities 
  • Insider Threat Identification: How to proactively identify and neutralize insider threats, maintaining the integrity of sensitive data and operations 
  • Adaptive Security Enhancement: How to continuously improve cloud security protocols, staying ahead of the evolving threat landscape with agile and adaptive measures 
 
Securing APIs: Strengthening Access Control for Safe System Interactions  
  • Strategies employed by CISOs to define robust data protection measures and ensure secure API interactions 
  • Exploring innovative authentication methods to enhance API security 
  • Crafting tailored authentication and authorization setups to manage user access effectively 
  • Implementing proactive measures for detecting and mitigating API vulnerabilities 
 
The GenAI Dilemma: Balancing the Present Skepticism with Future Promise 
  • How to make AI technologies your ally: understand privacy, bias, and job displacement concerns 
  • Ethical dilemmas in AI development, including transparency, accountability, and ensuring AI systems  
  • Drawing more from your AI investment: cross-industry learning 
  • The security leaders’ scope for AI: safety, fairness, and inclusivity, while also fostering innovation and exploration of AI's potential 

Thursday July 11, 2024 1:50pm - 5:00pm HKT

5:00pm HKT

Closing Panel Discussion
Key takeaways shared by the roundtable facilitators (8 executives) - moderated by an industry expert  

Thursday July 11, 2024 5:00pm - 5:35pm HKT

5:35pm HKT

Chairperson’s Closing Remarks 
Thursday July 11, 2024 5:35pm - 5:50pm HKT
 

Filter sessions
Apply filters to sessions.