IDGA

Become a Government IQ Member and receive our weekly newsletter!

Quick Links

Download the Agenda

Sponsorship Opportunity

Day 2 - Tuesday, 28th April 2016

Day 2

Expand All Sessions [+] Collapse All Sessions [-]

9:10 AM “Deserve Victory!” – Sharing plans, programs, and tactics for Cyber Resilience and Mission Assurance

Anthony Bargar , Former Policy & Strategy Advisor, USA Department of Defense, Office of the Secretary of Defense


•      Discuss effective programs for International, National, and Regional collaboration across governments and the private sector 
•      Discuss Cyber Maturity Model technique to measure an organizations resilience against next generation adversaries
•      What do we do when the screens go dark?  OR worse, when when they stay on and we don’t trust the data anymore?
•      Train as you will fight in Cyberspace, how to add realism to Cyber exercises and plan for the worst.

Anthony Bargar
Former Policy & Strategy Advisor, USA Department of Defense
Office of the Secretary of Defense

9:40 AM Cyber Security Malaysia: Smart Partnerships and Operational Continuity within Critical National Information Infrastructure

Amirudin Bin Abdul Wahab , Chief Executive Officer, CyberSecurity Malaysia

 Learn about how National Cyber Security Policy (NCSP), and the 2007-launched Cybersecurity Malaysia (CSM) aim to drive the nation’s sovereignty and economy as part of Vision 2020. Contributing approximately RM8.8 Billion revenue and highest export amongst IT sector mounting to high income jobs, Cyber-resiliency not only sustains critical industries but grows them as well:

Developments in policies to protect the Critical National Information Infrastructure (CNII),
Creating a nation that is secure and self‐reliant – promoting social well being and wealth creation
Ensuring that CNII are protected to a level that is commensurate with the risks
The Cyber-Security Information Sharing Partnership (CiSP): a joint industry government initiative to share cyber threat and vulnerability information to increase situational awareness
Promoting cyber security situational awareness for all industry, the public sector and academia

Amirudin Bin Abdul Wahab
Chief Executive Officer
CyberSecurity Malaysia
The challenge for companies is to maintain critical functions in the face of these inevitable breaches. Resilience to cyber attacks requires technical, procedural, and policy changes to the infrastructure, architecture, and enterprise operation. Find out how to prevent single points of failure through a comprehensive strategy.  Key areas to be addressed include:

Design and construction: ensuring no introduction of new or unforeseen risks while managing supply chain, monitoring design integrity, physical security and implementing systems security
Collaborating with the public sector for smart grids to undertake proactive resilience to emerging threats   
Pro-active management to prevent loss of resilience arising from changes in operational functions
Change management: vigilance in addressing any modified risks and its impact on cyber security 

Amirudin Bin Abdul Wahab
Chief Executive Officer
CyberSecurity Malaysia
 

11:40 AM PANEL: From Back Door to Boardroom and the Evolving Role of the CISO: Achieving Organizational-Wide Cyber Resilience, Change Management and Reputational Risk Protection

Anthony Lim , Director, Cloud Security Alliance

Syed Asghar , Head of Governance, Information Security, Vodafone

Parag Deodhar , Chief Operational Risk Officer and CISO, AXA Group

Anthony Bargar , Former Policy & Strategy Advisor, USA Department of Defense, Office of the Secretary of Defense

Inculcating a security mentality and vigilance: cyber security as part of an organization-wide risk management
How can CISOs engage with a loger-term cyber-security strategy that will gain traction with the C-Suite?
Equipping your employees to recognize risks, draw on the collective intelligence and take corrective action
Demonstrating the necessity to address cyber security as a service offering, not an audit function 
Examining the current liability of directors in failing to implement adequate cyber-security  initiatives
Encouraging suppliers and customers alike to develop similar levels of awareness and commitment 

Anthony Lim
Director
Cloud Security Alliance
Syed Asghar
Head of Governance, Information Security
Vodafone
Parag Deodhar
Chief Operational Risk Officer and CISO
AXA Group
Anthony Bargar
Former Policy & Strategy Advisor, USA Department of Defense
Office of the Secretary of Defense

12:20 PM Lunch


1:20 PM Cyber Security: The Move From a Technology Discipline to Risk Discipline

Sridhara Sidhu , Head - Enterprise Information Security Services Group, Wells Fargo


Cyber security requires a multi-disciplinary and multi-dimensional approach – helmed by strategic prioritization of expenditures and risk management. Join Sidhu from Wells Fargo as he shares on how cybersecurity is integral in the inception of every information system project, not a separate activity performed by specialists after a system is implemented. Coupled with restructuring your training programmes, discover how it can drive revenue, productivity and mitigate losses. 
Sridhara Sidhu
Head - Enterprise Information Security Services Group
Wells Fargo
 • Benefits of why you should have the cloud: why are you not getting the best out of i? 
Why should you and why are you not getting the best out of it: benefits in automation, sustainability, auto-scalability 
Lessons learnt in deploying cloud at Vodafone: risks to consider in data recovery and compatibility issues 
Implementing a comprehensive exit strategy: enhancing competitive advantage, reducing long-term losses and maintaining agility in migration  


Syed Asghar
Head of Governance, Information Security
Vodafone

Participants will be able to drill-down into specific areas of their interests by choosing 2 out of the 5 roundtables to participate in, which will be rotated once after 30 minutes.  

2:20 PM Table A: Tackling DDoS, Ransomware, Advanced Persistent Threats(APTs) and Insider Threats

Parag Deodhar , Chief Operational Risk Officer and CISO, AXA Group

 
Parag Deodhar
Chief Operational Risk Officer and CISO
AXA Group

2:20 PM Table B: Table B: Future-Proofing against Next-Generation Mobile Attacks: Full Life Cycle Auditing of Connected Devices

Chalee Vorakulpipat , Head of Cybersecurity Laboratory, Information and Communication Technology Office , , National Electronics and Computer Technology Center (NECTEC), Thailand

 
Chalee Vorakulpipat
Head of Cybersecurity Laboratory, Information and Communication Technology Office
, National Electronics and Computer Technology Center (NECTEC), Thailand

2:20 PM Table C: Aligning Security, Convenience, and Business Continuity whilst Staying Compliant

Rupali Goyal , Chief Information Security Officer, Deutsche Bank

 
Rupali Goyal
Chief Information Security Officer
Deutsche Bank

2:20 PM Table D: Threat Intelligence, Big Data Analytics and Provenance – How much do you need?

David Piesse , Chairman, Asia Pacific Ambassador International Insurance Societ

David Piesse
Chairman
Asia Pacific Ambassador International Insurance Societ

3:30 PM Re-imagining Security through Block Chain Technology: Leveraging on Truth-Based Systems

David Piesse , Chairman, Asia Pacific Ambassador International Insurance Societ

 
David Piesse
Chairman
Asia Pacific Ambassador International Insurance Societ

4:00 PM PANEL DISCUSSION: Global Supply Chain Ecosystems: De-Perimeterization of Security and Mitigating the Risks of Data Leaks with Industry Partners and Joint Ventures

Naeem Musa , Chief Information Security Officer, Commodity Futures Trading Commission, US

Amirudin Bin Abdul Wahab , Chief Executive Officer, CyberSecurity Malaysia

Anthony Bargar , Former Policy & Strategy Advisor, USA Department of Defense, Office of the Secretary of Defense

Chin Kiat Chim , Chief Information Security Officer, DHL Information Services Asia Pacific Sdn Bhd

 As attackers are increasingly looking to exploit gaps, weak-controls and ill-alignment, it is increasingly necessary to move beyond marginal-line defense towards a more elastic, global approach. It is now paramount for cyber-security to evolve from an afterthought to a priority in supply chains: 

Investigating the latest threats in supply chain breaches and applying lessons learnt 
Performing third-party validation on supply chain vendors – vulnerabilities in systems and technology
Proactively monitor behavior and activity across endpoints and network traffic
Establishing a competent internal review framework for assessing and limiting supply chain risks
Better coordination between functional groups and operational units across the product/service life cycle
Governance in mitigating the risks of data leaks with industry partners and joint ventures 

Naeem Musa
Chief Information Security Officer
Commodity Futures Trading Commission, US
Amirudin Bin Abdul Wahab
Chief Executive Officer
CyberSecurity Malaysia
Anthony Bargar
Former Policy & Strategy Advisor, USA Department of Defense
Office of the Secretary of Defense
Chin Kiat Chim
Chief Information Security Officer
DHL Information Services Asia Pacific Sdn Bhd