27 - 30 May, 2019
Novotel Singapore on Stevens, Singapore, Singapore
Novotel Singapore on Stevens, Singapore, Singapore
Conference Day Two - Wednesday, 29 May 2019
8:30 am - 9:00 am Registration & Coffee & Tea
9:00 am - 9:10 am Chairman’s Welcome Remarks
9:10 am - 9:50 am Achieving Comprehensive Data Security: Mitigating Risk from Data Breaches & Controlling Data Exposure
- Enabling high data breach response agility via enhanced visibility and sharing of threat intelligence across endpoints, data centres and cloud
- Assessing the critical infrastructure required in readying security architecture and ensuring system readiness
- Implementing periodic reviews of all systems and networks and assigning a dedicated security team to contain threats and breaches
9:50 am - 10:30 am Panel: Developing Information Assurance Standards to Protect and Manage Data Confidentiality, Integrity and Availability
Speakers:
Tithirat Siripattanalert Chief Information Security Officer True Digital Group
Mac Esmilla Director of Info Sec & Data Protection Services World Vision
Satyam Das APAC Regional Head – Operational Resilience, Crisis Management & Third Party Technology Risk BNP PARIBAS
Moderator:
Parag Deodhar Director, Information Security - Asia Pacific VF Corporation
Tithirat Siripattanalert Chief Information Security Officer True Digital Group
Mac Esmilla Director of Info Sec & Data Protection Services World Vision
Satyam Das APAC Regional Head – Operational Resilience, Crisis Management & Third Party Technology Risk BNP PARIBAS
Moderator:
Parag Deodhar Director, Information Security - Asia Pacific VF Corporation
- Building a proactive and holistic information security strategy that addresses the protection and use of data
- Exploring the common and less common data security vulnerabilities
- Building a comprehensive data governance program to mitigate and minimise risks
Satyam Das
APAC Regional Head – Operational Resilience, Crisis Management & Third Party Technology RiskBNP PARIBAS
10:30 am - 11:10 am Speed Networking & Morning Refreshments Break
11:10 am - 11:50 am Developing an Enterprise-Wide Secure Cloud Strategy for the Business of Tomorrow
- Implementing and enforcing policies on cloud ownership, responsibility and risk acceptance
- Understanding which users, networks, risky third party applications, and devices are accessing an organization’s cloud data
- Assessing the different cloud models to evaluate its different risk and control ramifications
- Defining and implementing the right security strategy, models and tools to secure the data on the cloud
11:50 am - 12:30 pm Facilitating Cross Border Data Flows in the Digital Economy
- Developing a data privacy framework that enhances the efficiency of cross-border dataflow
- Discussing opportunities and challenges present for organisations, in cross border data transfer and in the broader data landscape today
- IMDA and PDPC’s role as a regulator and enabler in facilitating data flows across borders
Valeriane Toon
Senior Assistant Director (Data Innovation and Protection Group)Info-communications Media Development Authority
12:30 pm - 1:30 pm Lunch
2:50 pm - 3:30 pm Ensuring Data Compliance with an Effective Governance Framework
- Conducting an organizational risk assessment to identify and address talent and skill gaps
- Assigning clearly defined responsibilities to the right talent who can comprehensively address cybersecurity, privacy & data ethics challenges
- Managing risks for the whole data lifecycle, including creation, storage, using, sharing, archiving, and destruction of data
2:10 pm - 2:50 pm Upholding Data Integrity through the Alignment of People, Process & Technology
3:30 pm - 4:00 pm Afternoon Refreshment Break
3:30 pm - 4:10 pm Mitigating Insider Threats & Data Loss Prevention
- Ensuring information is securely encrypted with the right level of access to reduce insider threat
- Using analytics and behavior profiling for insider threat and monitoring
- Conducting employee due diligence and screenings to prevent misconduct and organising internal trainings to promote responsible data use and management
4:10 pm - 4:50 pm Harnessing the Advantages of Automation in Data Breach Monitoring
- Harnessing the benefits of automation in your data protection program
- Developing a robust framework for automated incident monitoring, detection and alert
- Formulating an immediate and proactive response strategy