13 - 15 May, 2018
Grand West Sands Resort & Villas, Phuket, Thailand
Grand West Sands Resort & Villas, Phuket, Thailand
EXCHANGE DAY THREE: TUESDAY, 15 MAY 2018
7:30 am - 8:45 am Breakfast & Registration
8:45 am - 9:00 am Chairman’s Day Three Opening Remarks
9:00 am - 9:30 am Strengthening Controls for Mitigating Cyber Attacks
· Profile of threat actors and victims
· SWIFT customer security program
9:30 am - 10:00 am Implementing an End-to-End Cybersecurity Framework
· Building a trusted cyber ecosystem with the right governance, people, process and technology
· Developing an agile framework for risk identification, protection, detection, response and recovery
· Establishing effective cyber controls to mitigate security threats
Naeem Musa
Chief Information Security Officer, U.S. Commodity Futures Trading Commission | Adjunct Professor, American Military University | CISSP Licensed Instructor, (ISC)² ,10:00 am - 10:30 am One-to-One Business Meetings
10:35 am - 11:05 am One-to-One Business Meetings
10:35 am - 11:05 am Think-Tank 3 : Utilising Data Analytics in Cyber Risk Management
11:15 am - 11:45 am PANEL: Deploying an Agile Cyber Strategy in Asia
· Managing cyber and ensuring regulatory compliance in an evolving risk landscape
· Effective measures for advanced cyber threat prevention
· Raising cyber awareness in employees and customers
Clemence Tan
Head of IT Security, Governance & Risk, CISO – AsiaAviva
12:00 pm - 12:30 pm One-to-One Business Meetings
12:35 pm - 1:05 pm One-to-One Business Meetings
12:35 pm - 1:05 pm Think-Tank 4 : Benefits & Risks of Cybersecurity Automation
1:15 pm - 3:00 pm Networking Lunch
2:00 pm - 3:15 pm CISO TOOLKIT: Data Governance & Protection: Balancing Customer Experience, Privacy & Cyber Security
This interactive 15-minute working group discussion is the perfect practical know-how for optimising your participation at the Exchange.
2:15 pm - 3:55 pm PANEL: Minimising the Impact of Cyber Breach with an Effective Cyber Incident Response Program
· Incorporating cyber incident response as an integral part of business strategy
· Establishing effective SOPs: Determining implications, scope and timelines for incident detection, response planning, monitoring, escalation and communication
· Strengthening response capabilities: Scenarios training and automating routine incidence response management
2:55 pm - 3:40 pm WORKING GROUP DISCUSSION 2
How does this work? Look forward to a 10-minutes presentation on the subject matter. Thereafter, engage in an interactive 30-minutes discussion with your peers followed by a 5-minutes summary wrap-up.
Revolutionising Cyber with Blockchain
3:40 pm - 4:20 pm PANEL: Building Trust in Cyber to Secure the Digital Future
· Demonstrating cyber as a business partner and trusted advisor: How can we get business buy-in?
· The pursuit of outstanding cyber governance
· Ensuring cyber readiness through capacity-building, talent nurturing and awareness campaigning