Event Summary
Discover the latest cybersecurity trends in Southeast Asia and solutions to strengthen your business against growing cyber threats. Register now for ‘Cybersecurity – The Weakest Link’!
Southeast Asia is becoming a prime target for cybercriminals, with rapidly growing digitalisation and interconnectivity in the region.
Some of the most common cyber threats causing huge monetary and reputational damages in Southeast Asia include botnets, phishing, banking malware and ransomware.
But who or what is the weakest link in your cybersecurity chain making your business vulnerable to cyber attacks? Is it the people? Your workplace culture? Or failing technology?
Businesses need to take action now to prevent the cybercriminals from winning. So what can you do to strengthen your weakest links?
Register now and tune in on Thursday 24th September to find out how you can protect your business from the growing threat of cybercriminals.
Agenda - 24th September 2020
SGT/HKT | Agenda |
---|---|
1045 | [Pre-Show] Introduction |
1050 | [Pre-Show] Interview with Ajay Kumar, Director, Solutions Engineering – APJ, BeyondTrust |
1055 | [Show-Time] Chairman Welcome Address |
1100 | [Presentation] The Weakest Link in Endpoint Security Ajay Kumar, Director, Solutions Engineering – APJ, BeyondTrust Over the past decade, the world has been devastated by new viruses, in health and in cybersecurity. EKANS ransomware is only the latest example in the long list of cyber-attack methods swarming Asia Pacific and the world. In this session, Ajay Kumar will cover why organizations still struggle to tackle the “endpoint security puzzle”, even after the recent boom of next-gen AV technology. |
1110 | [Presentation] Cyber threat landscape in Southeast Asia Leonard Ong, Region Information Security Officer, APAC, GE Healthcare |
1130 | [Panel Discussion] Cybersecurity’s Weakest Link 1.What is the weakest link for cybersecurity? 2.How do cybercriminals exploit weak links? 3.How can you strengthen your weakest links? 4. Is the Zero Trust model easily achievable? 5. How can you remove local admin rights without disrupting your operations? Raju Chellam,Hon Vice Chair of the Cloud & Data Chapter, SGTech Ajay Kumar, Director, Solutions Engineering – APJ, BeyondTrust Leonard Ong, Region Information Security Officer, APAC, GE Healthcare Moderator: Alvin Rodrigues, Business Security Strategist |
1155 | Q&A and Chairman Summary |
1200 | Session Adjourned |
Registration for qualified participants is free in support of COVID-19 Work From Home.
Qualified Audience
These events are open to any strategic or business person whose function interacts with the enterprise or service provider and that comprise the increasingly complex technology purchaser/decision-maker chain, to include:
• C-level management: CEO, CIO, CTO, CFO, COO, CSO, CISO
• Senior executives: Head of Business, Head of Finance, Head of IT, Head of Digital Transformation, Head of Human Resource, Head of Operations
• End-users
Registration Closed
Thought – Leadership or Advertise
Looking to be seen and heard by our vast network of key decision makers and technology enthusiasts? We have a variety of event sponsorship packages to suit your marketing budget.
Get in Touch
If you are a Technology Service Provider and will like to explore opportunities to get infront of our audience, do reach out to us at partner@w.media