Total Security Asia Virtual Forum 2020 has ended

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, November 17

10:00am GMT+08

Chair's Opening Remarks
Tuesday November 17, 2020 10:00am - 10:10am GMT+08

10:10am GMT+08

Securing the End: How to Protect Endpoints Effectively Outside Organization Network Perimeter?
With remote working, at-scale, expected to be the new norm, securing endpoints that connect from outside a network perimeter has become more critical than ever before.
  • How can CISOs protect endpoints that reside outside their security perimeters?
  • How to best monitor, control, maintain, and authenticate endpoints?
  • How to balance between confidentiality, availability, and business viability, from policy and access right stand points?

avatar for Manish Chawda

Manish Chawda

Co-Founder, Pragma
Manish is the co-founder of Pragma, a cybersecurity consultancy founded in Singapore with offices worldwide. Manish has over 25 years of cybersecurity experience, particularly in Technology Risk. Prior to setting up Pragma, he was with Grant Thornton and PricewaterhouseCoopers where... Read More →

avatar for Leonard Ong

Leonard Ong

Regional Information Security Officer, APAC, GE Healthcare
A board-certified security management professional with over 20 years of experience gained in investment banking, telecommunication, enterprise, pharmaceutical and healthcare industries.Leonard has been serving in several International and Singapore-based security associations.    His... Read More →
avatar for Tony Ma

Tony Ma

Chief Information Security Officer, Allianz Global Investors
Tony is the Chief Information Security Officer at Allianz Global Investors and has over 20 years of experience in information risk management, information security, business resilience, outsourcing, process reengineering, transformation programs, crisis management and cybersecurity... Read More →
avatar for Shane Read

Shane Read

Chief Information Security Officer, Noble Group

Tuesday November 17, 2020 10:10am - 10:50am GMT+08

10:50am GMT+08

Step Inside a Cloud Breach: Threat Intelligence and Best Practices
The coronavirus lockdown has forced many organizations to turn to the cloud more quickly and fully than otherwise intended. This type of frenetic rush toward purchasing different types of cloud-based services from different vendors also can easily lead to unclear ownership of security in the cloud, policy "blind spots" and potential for shadow IT to introduce vulnerabilities and misconfiguration. This makes organizations greater targets for cybercriminals. Join this session to step inside a cloud breach and see how threat actors are taking advantage of these complex and connected environments to do great harm. Then, learn best practices gleaned from IBM X-Force IRIS's robust threat intelligence and hands-on experience securing cloud-based environments.

avatar for Charles DeBeck

Charles DeBeck

Strategic Cyber Threat Analyst, X-Force IRIS Intel Services, IBM Security
Charles DeBeck is a senior cyber threat intelligence expert with IBM X-Force Incident Response and Intelligence Services (IRIS). Formerly with the NSA and a licensed attorney, he firmly believes that threat intelligence can strengthen an organization’s defenses at the tactical... Read More →

Tuesday November 17, 2020 10:50am - 11:10am GMT+08

11:10am GMT+08

Transcending Traditional Boundaries: Adopting Zero Trust Architecture (ZTA) in a Perimeter-less World
With remote working, cloud computing and Internet of Things, traditional network perimeters are no longer sufficient in establishing isolated, safe environments. Therefore, CISOs must assume the network is hostile and always verify before providing the least privilege required.  
  • How to safeguard valuable data, assets, applications and services by granular segmentation? 
  • How best to verify and authenticate trusts? 
  • How to establish access policies based on the principle of lease privilege? 
  • What architecture and infrastructure need to be changed to facilitate ZTA? 
  • How to implement ZTA without sacrificing user experiences? 

avatar for Michael Pang

Michael Pang

Managing Director, Technology Consulting and Digital Transformation Lead, Protiviti
Michael is a Managing Director of Protiviti Hong Kong. He leads the Technology Consulting practice in Greater China as well as the Security & Privacy solution for Asia Pacific. He has vast experience in advising Presidents, and CXOs of leading corporations across Asia Pacific regions... Read More →

avatar for Kawin Boonyapredee

Kawin Boonyapredee

Head of Enterprise Security, Gojek
Kawin is currently Head of Enterprise Security at Gojek, leading a global team of security architects to protect the firm’s infrastructure and applications.  He has over 20 years of experience across business management and information security roles, with expertise in building... Read More →

Tuesday November 17, 2020 11:10am - 11:40am GMT+08

11:40am GMT+08

Rethinking Cybersecurity When Your Workforce is Remote
avatar for Lee Dolsen

Lee Dolsen

Chief Architect, Asia Pacific & Japan, Zscaler
Lee Dolsen is the Chief Architect for Zscaler’s Asia Pacific business based out of Singapore.  He has over 20 years’ experience in the IT industry focusing on various aspects of Internet Security and Content Delivery. Lee has been living and working in Asia for the past 14 years... Read More →

Tuesday November 17, 2020 11:40am - 12:00pm GMT+08

12:00pm GMT+08

Presenting the Business Case by Establishing Value and Measurable Indicators
While CISOs have successfully elevated cybersecurity to the board level, creating business cases to obtain necessary investment remains a challenge. 
  • How can CISOs demonstrate the value of security and proof that investment in security is worthwhile? 
  • How can CISOs define measurable KPIs and KRIs that makes sense to the Board? 
  • Security is often likened to insurance. How can CISOs justify security investment to board members who may not have technology background? 
  • Insurance Authority has placed the responsibility of security to board level, mandating their approval of the framework. Has this ease the difficulties in securing funding for CISOs in insurance industry?  

avatar for Gerry Chng

Gerry Chng

Partner, Consulting Services & EY Asean Cybersecurity Leader, Ernst & Young Advisory Pte. Ltd.
Gerry is a Partner with EY Advisory Services, leading cybersecurity services for the ASEAN region. With 20 years of Information Security experience, he is a trusted advisor to clients on their cybersecurity concerns. His areas of experience include security and risk governance, security... Read More →

avatar for Gabriel Chan

Gabriel Chan

Head of Global IT, Gaw Capital
Gabriel has 20 years' experience in cyber security and technology risk management, specialising in the banking and financial industry. As the Head of Global IT in Gaw Capital, he is responsible for the technology development, IT operation and cyber security strategy across the international group. Prior... Read More →

Tuesday November 17, 2020 12:00pm - 12:30pm GMT+08

12:30pm GMT+08

End of Day 1
Tuesday November 17, 2020 12:30pm - 1:00pm GMT+08
Wednesday, November 18

10:00am GMT+08

Chair's Opening Remarks
Wednesday November 18, 2020 10:00am - 10:05am GMT+08

10:05am GMT+08

Establishing Multi-Layer Defence and Detection to Counter Advanced Cyber-Attacks
avatar for Jason Pun

Jason Pun

Assistant Government Chief Information Officer (Cyber Security & Digital Identity), HKSAR Government
Mr. Jason Pun is the Assistant Government Chief Information Officer of the Government of the Hong Kong Special Administrative Region. His main work focuses are cyber security and digital identity. He is responsible for, among others, participating in the formulation and management... Read More →

Wednesday November 18, 2020 10:05am - 10:20am GMT+08

10:20am GMT+08

Cybersecurity Challenges from WFH & the Solutions: MDR and Rapid Response
In this session Sophos incident response technical expert Greg is going to discuss the cybersecurity challenges arisen from the new normal – Work From Home in this COVID-19 pandemic time. He identifies use cases that a single endpoint and server protection can hardly identify advanced adversaries, and how Managed Detection and Response (MDR) and incident response solution can address these challenges.

avatar for Greg Rosenberg

Greg Rosenberg

Manager, Managed Threat Response Sales Desk, Sophos
Greg Rosenberg (Manager, Managed Threat Response Sales Desk, Sophos) currently runs the Managed Threat Response Sales Desk at Sophos where he provides partners and customers technical insight into advanced threat hunting and incident response. In his current role, he assists organizations... Read More →

Wednesday November 18, 2020 10:20am - 10:40am GMT+08

10:40am GMT+08

Evolving Cyber-Security Threat Patterns: How to Orchestrate and Automate Speedy Responses to AI-Driven Cyber-Attacks
With more sophisticated and speedier campaign-style attacks driven by machine learning, CISOs must rely on security orchestration, automation and response (SOAR) for efficient defence. 
  • How can CISOs visualize and view beyond their dashboard, the security landscape to correctly identify the real threats 
  • How to create good eco-systems with multiple defence tools from different vendors 
  • With attackers using pivot for AI engines and modifying signatures in real time, how can defence adapt and keep up 
  • How best to automate responses to decrease response time without disrupting business operations 

avatar for Chadi Hantouche

Chadi Hantouche

Partner, Head of Asia Pacific, Wavestone
Chadi is the Partner in charge of Asia-Pacific at Wavestone, a global management consulting firm.For the last 15 years, he has helped companies in Asia, Europe and America in assessing their risk and maturity levels, and design associated solutions. He focuses on prevention and reaction... Read More →

avatar for Jay P. Spreitzer

Jay P. Spreitzer

SVP, APAC Region Information Security Lead, Wells Fargo Bank, N.A.
Jay is the Senior Vice President and APAC Region Information Security Lead at Wells Fargo Bank. Jay Spreitzer has over 20 years of information security experience. Jay retired from the US Army, after 23 years of service working in various technology and information security roles.   Jay... Read More →
avatar for Lim Shih Hsien

Lim Shih Hsien

Chief Security Officer, Singapore Power Group
Shih Hsien is currently responsible for managing the cyber and physical security risks for the SP Group, which owns and operates electricity and gas transmission and distribution businesses in Singapore and Australia.Prior to joining SP in Feb 2019, Shih Hsien was heading the information... Read More →

Wednesday November 18, 2020 10:40am - 11:20am GMT+08

11:20am GMT+08

Safeguarding New Attack Frontier: Securing API from DDoS and Data Leakage
As the backbone of innovative partnerships and customer-focused applications, implementation of API has grown exponentially. In the quest for speed and agility, security is often sacrificed, providing enterprising attackers the gap to access sensitive data and essential infrastructure. 
  • How to prevent data leakage through strengthening authorization and authentication? 
  • How to detect anomalies in aggregate traffic rates to mitigate DDoS attacks? 
  • How to identify compromised users? 
  • What other vulnerabilities should security professionals explore? 

avatar for Luke Ma

Luke Ma

Partner, Risk Advisory, Deloitte China
Luke is the Partner of Cyber Risk Services of Deloitte China. Covering Southern China, he is information security and risk management professional with more than 20 years experiences in a global financial institution, telecommunications and global professional services firm. With... Read More →

avatar for Steven Fok

Steven Fok

Head of Technology Risk Management, livi bank
Steven is the Head of Technology Risk Management of livi bank, one of the Virtual Banks in Hong Kong. Before joining livi, he was the Group CISO of Emperor Group. Steven has been working in IT security industries for over 20 years and served in different companies and government department... Read More →
avatar for Fuller Yu

Fuller Yu

Chief Information Security Officer, Hospital Authority Hong Kong
Fuller has more than 20years of experience in technology risk management and information security for global financial service industry.Heis now Chief Information Security Officer (CISO)of Hospital Authority Hong Kong. Prior to joining Hospital Authority, Fuller held various management... Read More →
avatar for Parag Deodhar

Parag Deodhar

Director - Information Security, Asia Pacific, VF Corporation
Parag is the currently the Director - Information Security for Asia-Pac at VF Corporation. In his earlier role he was the Asia CISO for AXA Group. Parag is a Chartered Accountant, Certified Information Systems Auditor from ISACA, US and Certified Fraud Examiner from ACFE, US. Parag... Read More →

Wednesday November 18, 2020 11:20am - 12:00pm GMT+08

12:00pm GMT+08

Managing the Inevitable: Ensuring Cyber Resiliency for Business Continuity and Data Recovery
Since cyber-attacks can no longer be fully prevented, it is imperative for organizations to be prepared to respond to and recover from adverse cyber events to limit the severity and ensure business continuity. 
  • How well-prepared are organizations in Asia to respond and restore services? 
  • What are the best practices in creating and implementing response and recovery plans? 
  • How can attacks and relevant responses be identified efficiently? 
  • What more can we do to accelerate service restoration? 

avatar for Jason Ho

Jason Ho

Technology Risk Leader, EY
Jason is a Partner and lead the Technology Risk practice of EY’s Financial Services Consulting business based in Hong Kong.He has 14 years of professional technology risk and privacy related consulting, compliance, technical assessment and audit, governance setup, FinTech and RegTech... Read More →

avatar for David Chan

David Chan

Chief Information Security Officer, Hang Seng Bank Limited
David has over 10 years in the area of information security including risk management, penetration testing and application security in various industries such as government, private sectors, utilities and FSI and is currently the Chief Information Security Officer (CISO) of Hang Seng... Read More →
avatar for Tony Ma

Tony Ma

Chief Information Security Officer, Allianz Global Investors
Tony is the Chief Information Security Officer at Allianz Global Investors and has over 20 years of experience in information risk management, information security, business resilience, outsourcing, process reengineering, transformation programs, crisis management and cybersecurity... Read More →
avatar for Micky Lo

Micky Lo

Managing Director, Chief Information Risk Officer APAC, BNY Mellon
Micky Lo joined BNY Mellon in July 2013 as Chief Technology Risk Officer APAC. He is leading the regional team with the mission to enable business solutions while proactively protecting BNY Mellon from information risks in a balanced control environment. He oversees and govern the... Read More →

Wednesday November 18, 2020 12:00pm - 12:40pm GMT+08

12:40pm GMT+08

End of Conference
Wednesday November 18, 2020 12:40pm - 1:40pm GMT+08
Filter sessions
Apply filters to sessions.