With the increased global awareness on the data privacy, especially with the GDPR coming into force, Compliance and Regulation provide unique challenges and opportunities to organisations using cloud services and other disruptive technologies. This theatre will highlight the latest issues like GDPR and Cybersecurity Bill, and practical methods to improve your security in the cloud, protecting and managing user data in a mobile workplace to governance compliance and regulatory policy in the region.
2017 saw many impactful malware and ransomware attacks, such as WannaCry and NotPetya. This session provides real-world case studies of organizations that successfully foiled these attacks and further ...
As datacenters have evolved from physical to virtual, enterprise to cloud, the security challenges they face have evolved as well. Some of the trends that have changed the nature of datacenter securit ...
As the IT landscape changes, enterprises are migrating workloads to various cloud environments in pursuit of greater resource agility and business continuity. With this new perimeter, organizations ...
This session will provide a powerful analysis of the latest attack trends seen by the world’s top incident response (IR) firms. Even as a steady drumbeat of headlines keeps the world’s attention focus ...
Machine learning and visualisation are two common analytics tools applied in many domains. Coupled with the supercomputing infrastructure provided by National Supercomputing Centre (NSCC) Singapore, y ...
Digital transformation creates new sources of competitive advantage for businesses. The hyper-connectivity that enables digital transformation, however, comes with an increasing risk of cyber attacks ...
Investing in cybersecurity is essential but looking only inside the perimeter might be deceiving. As the majority of successful hacks begin with phishing and password reuse companies should look beyon ...
This session will discussed the following: (a) Regulatory regimes in Singapore governing data breaches (b) Post breach management legal and technical guidelines c) Cyber insurance as a risk management ...
Join ForeScout to explore common but incorrect assumptions that organisations make when thinking about securing connected devices (campus, data center, cloud, IoT and Operational Technology) and the c ...
As more organizations move from a Mobile-first strategy to a Mobile-only strategy, they may reap the benefits of reduced costs and, possibly, better user experience too. But there is also going to be ...
What is the cloud's benefit if the public does not trust it? Globally, public trust in large institutions, governments, NGOs and digital businesses is falling fast (2017 and 2018 Edelman Trust Baromet ...
There are many cyber security challenges being faced by organizations today, and the feeling is that organizations still struggle with it, despite budgets which keep getting higher. This is partly due ...
Find out how to implement and enforce a least privilege policy without putting the brakes on productivity. How removing admin rights from endpoints is critical, and why ensuring application control is ...
Public cloud adoption and growing BOYD are two massive trends that are transforming enterprise IT and business agility. With these trends, corporate data is moving beyond on-premise security and outsi ...
A third-party attack occurs when someone gains access to your internal system through an external partner or third-party service provider with access to your systems and data. This changes the attack ...
Two ongoing innovations are on their way to change the future of computing in an unprecedented way: blockchain and quantum computers. What does it take to secure blockchains in all their flavors and a ...
New regulations can often lead to more paperwork and new processes without actually improving security, costing money with little benefit. As organisations strive to achieve the highest compliance pos ...
The speaker will walk the audience through the cyber kill chain process of how, in theory, an attempt to breach a typical energy plant from the process of reconnaissance, weaponization, delivery, expl ...
Backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)², the Certified Cloud Security Professional (CCSP) credential denotes profe ...
The General Data Protection Regulation (GDPR) came into full force on the on the 25th of May 2018. Five months in, John will take a look at how organisations have adapted to the new requirements, and ...
When you think about cyber-crime, and cyber-crime as an industry, the value for attackers is founded upon data. In the end, this industry monetizes on data and everything else (like malware, ATPs, bru ...
AWS (Amazon Web Services) is one of the most secure cloud platforms available to you, but AWS is only responsible for security OF the cloud, you need to take responsibility for security IN the cloud. ...
Technology has revolutionized the world and improved our daily lives. As millions of new devices are connected to the internet each month, technology is moving at an astonishing rate. Simultaneously, ...
Understanding what cloud attacks look like and what the critical parts of your infrastructure are. How to use Serverless functions in AWS, azure, and GCP to automatically remediate when someone is att ...
In recent years, a growing demand to replace passwords and better protect online users has fueled the creation of new, open authentication standards that would deliver on the simplicity and security c ...
Artificial Intelligence and Internet of Things devices are the next frontier for cyber security. This panel will discuss how businesses can integrate new technology with legacy systems to deal with th ...