Home Conference Conference Agenda

CONFERENCE AGENDA

CYBER SECURITY IN THE AI & BIG DATA ERA

07:30
DELEGATE REGISTRATION
08:00
VIP TOUR & OPENING CEREMONY
08:10
OPENING REMARK

Leadership from Ministry of Information and Communications
KEYNOTES
08:20
Cyber security rankings for public agencies

Leadership from Authority of Information Security, Ministry of Information and Communications
08:45
Live Demo: How to fight back advanced cyber attacks?

Cyber security expert
09:15
A comprehensive security strategy for cloud-based digital goverment

Consulting expert
09:40
TEA BREAK
10:00
Cyber Security in 202x: What will be the risks of tomorrow?

Consulting expert
10:20
Multi-layered security posture

Consulting expert
10:40
The role of AI in proactive self-defense in cyberspace

Consulting expert
11:00
EXECUTIVE TALK
Moderator: Leadership from Department of Information Security,
Ministry of Information and Communications
 

Topics of discussion



  • Top technology trends to drive cybersecurity in 2020 and beyond

  • New approaches to cyber security strategies

  • Measuring the risk management of cyber security and solutions


Panelists



  • Leadership from Department of Cyber Security and High-tech Crime Prevention,
    Ministry of Public Security

  • Leadership from Cyperspace Operations Command (Command 86), Ministry of
    Defense

  • Representatives from IT Vendors

  • Consulting experts

12:00
END OF KEYNOTES SESSION
  • Hosted by: Leaders from Ministry of Information and Communications
  • Time: 07:30 – 12:00

MONITORING & PROTECTING DIGITAL GOVERMENT AND NATIONAL CRITICAL INFRASTRUCTURE

Hosted by: Leadership from Department of Information Security, Ministry of Information and Communications

13:00
DELEGATE REGISTRATION
13:30
OPENING REMARK

Leadership from Department of Information Security, Ministry of Information & Communications
13:35
Unlocking the potential of Big data analytics to improve state agencies’s operational effciency

Mr. Nguyen Truong Thang, Director, Institute of Information Technology, Vietnam Academy of Science and Technology
13:55
How to save your IoT-based smart cities?

Consulting expert
14:15
Protecting the integrity and continuity of CCTV Data

Consulting expert
14:35
Hard-won lessons in monitoring and recovering from advanced persistent threats (APT) targeted at national electricity infrastructure

Representative from Enterprise
14:55
TEA BREAK
15:05
Setting a strong digital identity system to securely develop digital public services

Consulting expert
15:25
Data Encryption: How to secure your cloud-based data?

Consulting expert
15:55
Automated SOC: The key element for threat detection and response in real time

Consulting expert
16:15
PANEL DISCUSSION
Moderator (tentative): Leadership from Department of
Information Security, Ministry of Information and Communications

 

Topics of discussion


 


  • Strengthening national cyber security through cross-agency information sharing and cooperation

  • Identifying and mitigating insider threats to shield critial data & assets

  • How to overcome budget strains and get the most of security investment?

  • How to build, operate and manage a next-gen SOC?


 

Panelists

 


  • Leadership from Departments of Information and Communications of Hanoi

  • Leadership from General Department of Taxation / General Department of
    Customs

  • Representatives from enterprises

  • Representatives from IT Vendors

17:30
END OF CONFERENCE SESSION 1
  • Concurently with Conference Session 2, 3
  • Time: 13:00 – 17:30

NEXT-GEN INFORMATION SYSTEMS SECURITY

Hosted by: Leadership from Cyperspace Operations Command (Command 86), Ministry of Defense

13:00
DELEGATE REGISTRATION
13:30
OPENING REMARK

Leadership from Cyperspace Operations Command (Command 86), Ministry of Defense
13:35
Insider threats: Is your biggest enemy in your own backyard?

Consulting expert
13:55
Protect your network from malicious intrusions with advanced endpoint security

Consulting expert
14:15
Adopting Zero Trust to build a trusted architecture

Consulting expert
14:35
TEA BREAK
14:55
Risk mitigation with AI-powered threat intelligence

Consulting expert
15:15
Data security on hybrid cloud platform

Consulting expert
15:35
Solutions for automated network detection and response

Consulting expert
15:55
PANEL DISCUSSION
Moderator (tentative): Leadership from Cyperspace Operations Command
(Command 86), Ministry of Defense



 

Topics of discussion

 


  • Building Security-of-Things

  • Measuring cyber security performance for improvement

  • How to fully leverage AI/ML, Bigdata power in cyber defense tactic?


 

Panelists

 


  • Leaders from the Department of Financial Informatics and Statistics, Ministry of Finance

  • Representatives from IT Vendors

  • Representatives from enterprises

17:30
END OF CONFERENCE SESSION 2
  • Concurently with Conference Session 1, 3
  • Time: 13:00 – 17:30

PROTECTING PERSONAL DATA

Hosted by: Leadership from Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security

13:00
DELEGATE REGISTRATION
13:30
OPENING REMARK

Leadership from Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security
13:35




Universal Privilege Management – What it is and How you can maximize
it in your organization?



Mr.
Eugene Lin
, Regional Director – APJ, BeyondTrust


 



Threat actors continue to take advantage of the lack of privilege
control in organisations across Singapore. 80% of all breaches
involve some sort of privilege credential, and nearly 90% of
critical Microsoft vulnerabilities could be mitigated just by
removing admin rights.A new era of Privilege Access Management has
arrived – The Universal Privilege Management.




View more




Mr. Eugene Lin
Mr. Eugene Lin
Regional Director – APJ


13:55
Integrated security to protect personal data on smartphones

Consulting expert
14:15



New hope in Fraud Prevention. U.E.B.A & Real time transaction risk scoring covering all payment channels



Mr. Kulakov Kirill, Technical Consultant, BI.ZONE



 


This
is a short story about what we have in fighting against fraud in all
banking channels. We will have a look to most important challenges,
will analyze most relevant attacks on bank customers and will answer
to main question “How effectively defend bank customers from various
fraud and what technologies we can use for it?”




View more




Mr. Kulakov Kirill
Mr. Kulakov Kirill
Technical Consultant


14:35
TEA BREAK
14:55
Upgrading vulnerability management capability to tackle the evergreen phishing threat

Representative from Enterprise
15:15
Empowering Identity & access management with AI-powered authentications

Consulting expert
15:35
Securing enterprises’ digital assets on cloud?

Consulting expert
15:55
PANEL DISCUSSION
Moderator (tentative): Leadership from Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security

 

Topics of discussion

 


  • Best pratice sharings in building high-tech-incorporated security posture

  • The security testing of mobile devices

  • Malware infections of devices


 

Panelists

 


  • Representatives from enterprises

  • Representatives from IT Vendors

  • Consulting experts

17:30
END OF CONFERENCE SESSION 3
  • Concurently with Conference Session 1, 2
  • Time: 13:00 – 17:30