Architecting Cybersecurity to Future-proof Smart Cities against Emerging Cyber-physical ThreatsSteven Sim, President, ISACA Singapore Chapter With the advent of industrialisation 4.0 in smart cities, the lines between cyber and physical space continue to blur. Against the gloomy backdrop of an increasingly sophisticated threat landscape, re-alignment of security... Read More
|
|
![]() |
Compliance as Code is a Business RequirementSai Linn Thu, Regional PS lead, APJ, Chef.io Audits, compliance, and security are top of mind for most enterprises. What if these could be fully integrated into the way you release software and deploy infrastructure? If we automated our compliance policies and defined... Read More
|
How to build a Secure Crypto Foundation in a Modern World?Melvin Koh, Senior Sales Engineer Manager, ASEAN, Thales A hardware security module (HSM) is a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle. Learn how to get ready for a quantum-safe era, and compliance requirements... Read More
|
|
![]() |
Mapping security frameworks to your critical assets – A focus on Singapore CCOP and NISTRichard Bussiere, Head of Operational Technology, Asia Pacific, Tenable There are many different security frameworks available that help organisations manage and reduce cybersecurity risk to critical infrastructure and industrial control systems. Embracing the NIST Cybersecurity Framework... Read More
|
![]() |
Deception in Active DefenceJeremy Ho, Director, APAC, Attivo Networks In cybersecurity, an active defence strategy is leveraged to outmanoeuvre an adversary and make an attack more difficult to carry out. Slowing down or derailing the attacker so they cannot advance or complete their attack... Read More
|
![]() |
Applied Counter-Intelligence in ICS/SCADAArt Rebultan, Global CERT – Cyber Counterintelligence, Equinix Inc. Counterintelligence against the attackers is strategic which an internal deception tool could address the gap in defense-in-depth in conjunction with Endpoint Prevention Platform (EPP), Endpoint Detection and Response (EDR)... Read More
|
Panel discussion - CISO Manual: navigating unknown threats with the new perimeter
|