2018 Conference Programmes

Conference

Advert

Earlybird Prizedraw

Loading

How to fortify your business against cyber vulnerabilities?

11 Oct 2018
The Future of Cyber Security & Compliance Theatre
Cyber Security
A third-party attack occurs when someone gains access to your internal system through an external partner or third-party service provider with access to your systems and data. This changes the attack surface as the attacker exploits the weaker controls implemented at the external partner’s or third party-service provider’s premises. The risks associated with a third-party attack are gaining more attention due to new types of attacks, growing public awareness of the threats and increased oversight from regulators. Attackers also have more resources and tools at their disposal than ever before, creating a perfect storm. Learn how to protect your assets against third-party attacks and fortify your business against cyber vulnerabilities.

Sponsors

Diamond Sponsor

Theatre Sponsors

VIP Lounge Sponsor

Platinum Sponsors

Platinum Sponsors

Platinum Sponsors

Gold Sponsors

Gold Sponsors

Silver Sponsors

Silver Sponsors

Silver Sponsors

Silver Sponsors

Silver Sponsors

Silver Sponsors

Bronze Sponsors

Bronze Sponsors

Bronze Sponsors

Bronze Sponsors

Bronze Sponsors

Bronze Sponsors

Partners

Knowledge Partner

News Distribution Partner

Associate Content Partner

Strategic SEO Partner

Event Partners

Event Partners

Event Partners

Event Partners

Event Partners

Event Partners

Media Partners

Media Partners

Media Partners

Media Partners

Media Partners

Media Partners

Media Partners

Media Partners

Media Partners

Official Partner Hotel

Testimonials

  • As cyber security is the hot topic at the moment, there are many exhibitors with new product showcase and conference speakers sharing their expertise, I find it very informative and insightful. My job scope covers a broad spectrum, having other shows like Big Data and IoT in one room is very convenient. Look forward to coming back next year too!
    Deputy Manager, Land Transport Authority
  • I’m interested in a couple of topics (i.e. Internet of Things, eCommerce and cloud & cyber security), so that’s why I’m here. We’ve just finished a conversation with NETSCOUT and are quite interested in their products – we will keep in touch with them to see how we can further collaborate.
    IT Manager, BSH Home Applications Pte Ltd
  • The event was good and informative. I've attended this event to browse for more products and solutions which we can use in our organisation to improve operations efficiency. I'll definitely be back next year.
    Team Lead, FMIS ICT Strategy, Lead and Innovation, Ministry of Economy and Finance
  • I attend this show with no particular focus but the speaker line up is good, the topics covered are wide as well. The speakers provide insightful content that are relevant to my job – cloud, cyber security, networks and the co-location of different shows help to save time too!
    Regional IT Governance Manager, TP ICAP