WELCOME & OPENING ADDRESS
BY ADRIAN M. & EMIL TAN, ORGANISERS & FOUNDERS, INFOSEC IN THE CITY (IIC)
RETURN TO ZERO
BY DAVE LEWIS, CISCO
The efforts to secure our networks and assets grows ever more daunting with each passing year. We must continually face attacks from external forces as well as contending with our core job requirements to keep the lights on. Data breaches have grown in scale over the last 7 years at a troubling rate. In order to better combat this here needs to be a return to focusing on the core competencies and how we can better secure the workforce, workload and workplace.
TALES FROM THE TRENCHES
BY STEVEN D'SA, FIREEYE MANDIANT CONSULTING SERVICES
Few observations and insights to help enterprises get a sneak peek into the workings of breaches from recent investigations undertaken in the region by Mandiant.
DIGITAL SHADOWS REVEALS A 50% INCREASE IN EXPOSED DATA IN 1 YEAR
BY LAWRENCE LOH, DIGITAL SHADOWS
Misconfigured sharing protocols could result in multiple breaches of GDPR with 2.3 billion exposed files, including passport data, bank records and medical information, increasing risk of identity theft, ransomware attacks and more.
WHY ARE THE BASICS SO HARD
BY QUENTYN TAYLOR, CANON
Why it's always easier to chase new infosec technology rather than fix the basic issues that surround us. If we look at some of the massive issues from botnets to cyberwar — the roots of the solution are the infosec basics.
ASSET DISCOVERY & MONITORING IS AN ORGANISATIONAL PROBLEM
BY ISAAC DAWSON, LINKAI
Coordination between security teams and IT operations is mandatory for any successful information security program. Nowhere is that more poignant than continuously discovering and monitoring your external attack surface.
DRIVING SECURITY VALUE WITH THREAT MODELLING
BY AVI DOUGLEN, BOUNCE SECURITY
How secure is secure enough? We’ve all been there – we’ve spent too much time and resources on security, but 3 months later we still get breached anyway. “But we followed all the ‘Best Practices’!” your developers cry. In this flash intro to secure software design, Avi Douglen will show why every software development process should start with Threat Modelling, and how this can get security to contribute to the bottom line.
WHAT'S PSIRT (PRODUCT SECURITY INCIDENT RESPONSE TEAM) & WHY IS IT IMPORTANT?
BY YUKI OSAWA, PANASONIC
The number of cyber attacks has increased dramatically, and many large scale incidents have occurred around the world. Many organizations operate an incident response team called CSIRT (Computer Security Incident Response Team) to protect their PCs and servers in their networks. In recent years, the industry has also begun to recognize the importance of another type of incident response team, PSIRT, for their products.
Panasonic has operated PSIRT for more than 10 years to protect all of its products, such as TVs, network cameras, air-conditioners, etc. This presentation will introduce how Panasonic handles incidents targeting IoT devices.
BRIDGING THE ATTACK-DEFENSE SKILLS GAP
BY VIVEK RAMACHANDRAN, PENTESTER ACADEMY
Enterprises are spending more than ever on cybersecurity today. However, the number of hacks happening on high profile companies is only increasing in number every year. Why, even though companies are buying the latest products and technologies, are they still getting hacked? In this short talk, we will look at the 5 common mistakes employers do when training their security staff and how one can go about bridging this skills gap!
GLOBAL INTERCONNECTIVITY & WHY CYBER ECOSYSTEMS ARE VITAL
BY LINDA SCHINDLER, ICE71
With the increased interconnectivity between digital economies, cybersecurity ecosystems are crucial to innovation and cyber resilience.
IICSG2019 CXO LUNCHEON BRIEF
PARTNERS & SPONSORS
IIC PRODUCTIONS (PTE. LTD.)