Home Conference Conference Agenda

CONFERENCE AGENDA

CYBER SECURITY IN THE AI & BIG DATA ERA

07:30
DELEGATE REGISTRATION
08:00
VIP TOUR & OPENING CEREMONY
08:10
OPENING REMARK

Leadership from Ministry of Information and Communications
KEYNOTES
08:20
Cyber security rankings for public agencies

Leadership from Authority of Information Security, Ministry of Information and Communications
08:45
Live Demo: How to fight back advanced cyber attacks?

Cyber security expert
09:15
A comprehensive security strategy for cloud-based digital goverment

Consulting expert
09:40
TEA BREAK
10:00




What will be the risks of tomorrow?



Mr.
Mark Lee
, Regional Business Director, RSA NetWitness Business
(South East Asia and Greater China Region)

 



 

 


Organizations have achieved efficiency gains as
they adopted digital transformation but the dependency on
technologies also made them more vulnerable to cyber threats.

During this unprecedented time, there are many high-profile threats
such as Ransomware, Phishing attacks, etc.




View more




Mr. Mark Lee
Mr. Mark Lee
Regional Business Director


10:20
Multi-layered security posture

Consulting expert from Viettel Security
10:40




Changing Cyber Landscapes: The Battle of Algorithms



Mr.
Eugene Low
, Regional Director for ASEAN and South Asia,
Darktrace

 



 


Among rapidly evolving technological advancements,
the emergence of AI-enhanced malware is making cyber-attacks
exponentially more dangerous and harder to identify. In the near
future, we will begin to see supercharged, AI-powered cyber-attacks
leveraged at scale. To protect against Offensive AI attacks,
organizations are turning to defensive cyber AI, which can identify
and neutralize emerging malicious activity, no matter when, or
where, it strikes.”




View more




Mr. Eugene Low
Mr. Eugene Low
Regional Director for ASEAN and South Asia


11:00
EXECUTIVE TALK
Moderator: Leadership from Department of Information Security,
Ministry of Information and Communications
 

Topics of discussion



  • Top technology trends to drive cybersecurity in 2020 and beyond

  • New approaches to cyber security strategies

  • Measuring the risk management of cyber security and solutions


Panelists



  • Leadership from Department of Cyber Security and High-tech Crime Prevention,
    Ministry of Public Security

  • Leadership from Cyperspace Operations Command (Command 86), Ministry of
    Defense

  • Representatives from IT Vendors

  • Consulting experts

12:00
END OF KEYNOTES SESSION
  • Hosted by: Leaders from Ministry of Information and Communications
  • Time: 07:30 – 12:00

MONITORING & PROTECTING DIGITAL GOVERMENT AND NATIONAL CRITICAL INFRASTRUCTURE

Hosted by: Leadership from Department of Information Security, Ministry of Information and Communications

13:00
DELEGATE REGISTRATION
13:30
OPENING REMARK

Leadership from Department of Information Security, Ministry of Information & Communications
13:35
How to save your IoT-based smart cities?

Consulting expert from Huawei
13:55
Protecting the integrity and continuity of CCTV Data

Consulting expertfrom HIKVISION
14:15
Hard-won lessons in monitoring and recovering from advanced persistent threats (APT) targeted at national electricity infrastructure

Representative from Enterprise (EVN)
14:35
TEA BREAK
15:05
Setting a strong digital identity system to securely develop digital public services

Consulting expert from BKAV
15:25
Data Encryption: How to secure your cloud-based data?

Consulting expert from Microsoft
15:45
Automated SOC: The key element for threat detection and response in real time

Consulting expert
16:05
PANEL DISCUSSION
Moderator (tentative): Leadership from Department of
Information Security, Ministry of Information and Communications

 

Topics of discussion


 


  • Strengthening national cyber security through cross-agency information sharing and cooperation

  • Identifying and mitigating insider threats to shield critial data & assets

  • How to overcome budget strains and get the most of security investment?

  • How to build, operate and manage a next-gen SOC?


 

Panelists

 


  • Leadership from Departments of Information and Communications of Hanoi

  • Leadership from General Department of Taxation / General Department of
    Customs

  • Representatives from enterprises

  • Representatives from IT Vendors

17:30
END OF CONFERENCE SESSION 1
  • Concurently with Conference Session 2, 3
  • Time: 13:00 – 17:30

NEXT-GEN INFORMATION SYSTEMS SECURITY

Hosted by: Leadership from Cyperspace Operations Command (Command 86), Ministry of Defense

13:00
DELEGATE REGISTRATION
13:30
OPENING REMARK

Leadership from Cyperspace Operations Command (Command 86), Ministry of Defense
13:35
Insider threats: Is your biggest enemy in your own backyard?

Consulting expert from Fortinet
13:55
Protect your network from malicious intrusions with advanced endpoint security

Consulting expert from CMC
14:15
Transform your Zero Trust journey for Digital Transformation Readiness

Mr. Philip Hung Cao, Solutions Architect, Palo Alto Networks





 



 


Philip Hung Cao (aka #tekfarmer), ZTX-S, CCISO,
CISM, CCSP, CCSK, CASP, GICSP, PCNSE is a Strategist, Advisor,
Contributor, Educator and Motivator. He has 19 years’ experience in
IT/Cybersecurity industry in various sectors & positions.




View more




Mr. Philip Hung Cao
Mr. Philip Hung Cao
Solutions Architect


14:35
TEA BREAK
14:55
Insider threats: Is your biggest enemy in your own backyard?

Ms. Jolene Lim, Technology Consultant, RSA NetWitness Business (South East Asia)





 



 


As digital initiatives evolve business operations,
the ‘weakest link’ becomes an amplified factor as any issue can
quickly escalate into a major business risk. Your employees could be
the organization’s biggest security threat.

As we all place our focus in external threat actors because they are
thrilling and following attack patterns, one that we have seen
frequently is that, organizations do overlook harmful security
threat at their own backyard, which really are: their own employees.




View more




Ms. Jolene Lim
Ms. Jolene Lim
Technology Consultant


15:15
Risk mitigation with AI-powered threat intelligence

Consulting expert from MobiFone
15:35
Data security on hybrid cloud platform

Consulting expert from HPE
15:55
PANEL DISCUSSION
Moderator (tentative): Leadership from Cyperspace Operations Command
(Command 86), Ministry of Defense



 

Topics of discussion

 


  • Building Security-of-Things

  • Measuring cyber security performance for improvement

  • How to fully leverage AI/ML, Bigdata power in cyber defense tactic?


 

Panelists

 


  • Leaders from the Department of Financial Informatics and Statistics, Ministry of Finance

  • Representatives from IT Vendors

  • Representatives from enterprises

17:30
END OF CONFERENCE SESSION 2
  • Concurently with Conference Session 1, 3
  • Time: 13:00 – 17:30

PROTECTING PERSONAL DATA

Hosted by: Leadership from Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security

13:00
DELEGATE REGISTRATION
13:30
OPENING REMARK

Leadership from Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security
13:35




Universal Privilege Management – What it is and How you can maximize
it in your organization?



Mr.
Eugene Lin
, Regional Director – APJ, BeyondTrust


 



Threat actors continue to take advantage of the lack of privilege
control in organisations across Singapore. 80% of all breaches
involve some sort of privilege credential, and nearly 90% of
critical Microsoft vulnerabilities could be mitigated just by
removing admin rights.A new era of Privilege Access Management has
arrived – The Universal Privilege Management.




View more




Mr. Eugene Lin
Mr. Eugene Lin
Regional Director – APJ


13:55
Integrated security to protect personal data on smartphones

Consulting expert from Samsung
14:15



New hope in Fraud Prevention. U.E.B.A & Real time transaction risk scoring covering all payment channels




Consulting Expert from Trend Micro



14:35
TEA BREAK
14:55
Upgrading vulnerability management capability to tackle the evergreen phishing threat

Representative from Enterprise (Vietcombank)
15:15
Unlocking the potential of Big data analytics to improve fraud prevention

Representative from Data Asia
15:35
Securing enterprises’ digital assets on cloud?

Mr. Nguyen Truong Thang, Director, Institute of Information Technology, Vietnam Academy of Science and Technology

15:55
PANEL DISCUSSION
Moderator (tentative): Leadership from Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security

 

Topics of discussion

 


  • Best pratice sharings in building high-tech-incorporated security posture

  • The security testing of mobile devices

  • Malware infections of devices


 

Panelists

 


  • Representatives from enterprises (Vietcombank, Prudential)

  • Representatives from IT Vendors

  • Consulting experts

17:30
END OF CONFERENCE SESSION 3
  • Concurently with Conference Session 1, 2
  • Time: 13:00 – 17:30