Conference Programme

Conference

Advert

  • passport-anniv-02_cloudexpo - website banner
  • SDWan_emailbanner 728 x90
  • SecureOps_emailbanner 728 x90
  • Hillstone Networks - cloud Expo ad banner

 

Important Notice:

All attendees who have completed their full vaccination regime in Singapore under the national vaccination program (i.e. using PSAR authorised vaccines) and have had sufficient time to develop sufficient protection (i.e. two weeks after the second dose of the Pfizer-BioNTech/Comirnaty or Moderna COVID-19 vaccination) will be exempted from pre-event testing (PET).

Your vaccination status will be displayed in your TraceTogether (TT) and HealthHub application. You will need to bring along your mobile device with call or internet service, or updated TraceTogether (TT) app on the day of the event, business, or activity. If you do not have a mobile device, please bring along your working TraceTogether token.

More details can be found on the Ministry of Health's website: www.moh.gov.sg/covid-19/pet

Theatre 1

Loading
Theatre 1
  1. Theatre 1
    Ransomware is emerging once again as a great risk factor for Defenders world-wide. With the wide availability of Ransomware as a Service and the shift to double extortion tactics, the attackers become ...
  2. Theatre 1
    • Strategy, Architecture & Operational Security
    With the advent of industrialisation 4.0 in smart cities, the lines between cyber and physical space continue to blur. Against the gloomy backdrop of an increasingly sophisticated threat landscape, re ...
  3. Theatre 1
    • Cybersecurity culture
    A robust data security strategy and capability is a perquisite for secure operations in a cloud-first future. At BHP, Mathieu has been leading the charge to bring more automation into how the organisa ...
  4. Theatre 1
    • Risk Management & Governance
    The changing cyber landscape fuelled by advances in technology and the use of it creates challenges and opportunities.  Embedding security into the technology and processes becomes a necessity.  Board ...
  5. Theatre 1
    • Identity & Privacy
  6. Theatre 1
    • Mobility & IoT
    The applications of connected industrial devices have created unprecedented productivity and efficiency gains but have also exposed previously unreachable critical infrastructure systems to attack fro ...
  7. Theatre 1
    • Strategy, Architecture & Operational Security
    Audits, compliance, and security are top of mind for most enterprises. What if these could be fully integrated into the way you release software and deploy infrastructure? If we automated our complian ...
  8. Theatre 1
    • Identity & Privacy
    Ransomware, data breaches, losing your customer's data, spoofed emails, fake social media accounts, hacked websites and mobile apps, and other cyber attacks will cause business disruptions and bring d ...

Theatre 2

Loading
Theatre 2
  1. Theatre 2
    Smarter Containment with Zero Trust Segmentation Working harder does not always make sense, sometimes it is important to work smarter to gain efficiencies.    During this presentation we will discuss: ...
  2. Theatre 2
    • Strategy, Architecture & Operational Security
    Ever more organisations are adopting a multi cloud approach, allowing staff to use apps and services from many different providers. This is great in theory, yet a complex infrastructure is a hacker’s ...
  3. Theatre 2
    • Cloud/DevOps
    Every CISO has opportunity to protect people from cyber threats. In this session Mac will share how World Vision, donors, and beneficiaries are protected from the adverse effects of brand abuse and in ...
  4. Theatre 2
    • Strategy, Architecture & Operational Security
    This session will review the latest Monetary Authority of Singapore’s latest Cloud Advisory whitepaper as well as the 2019/2020 Public Sector Data Security Review Committee’s 5 Key Data Security Recom ...
  5. Theatre 2
    • Risk Management & Governance
    Can you answer these questions?  1. How effective are my defences?  2. Which threat actors are targeting my organisation at this time?  3. What types of threats am I being targeted with, and can I det ...
  6. Theatre 2
    • Strategy, Architecture & Operational Security
    There are many different security frameworks available that help organisations manage and reduce cybersecurity risk to critical infrastructure and industrial control systems.  Embracing the NIST Cyber ...

Theatre 3

Loading
Theatre 3
  1. Theatre 3
  2. Theatre 3
    Driven by the post-pandemic hybrid working model, customer experience digitization and organization transformation, cloud computing has become more pivotal for the enterprises, not only for cost savin ...
  3. Theatre 3
    • Strategy, Architecture & Operational Security
    Counterintelligence against the attackers is strategic which an internal deception tool could address the gap in defense-in-depth in conjunction with Endpoint Prevention Platform (EPP), Endpoint Detec ...
  4. Theatre 3
    • Identity & Privacy
    The responsibility for data privacy was vested on the data owners when concerned with cloud services. They were held accountable for data breach incidents while the data processors were spared. Howeve ...
  5. Theatre 3
    • Strategy, Architecture & Operational Security
    The way we will be working is changing and so should your network architecture. Join Gaurav Mallawat as he shares his thoughts on how companies should look at and plan for their network architecture t ...
  6. Theatre 3
    • Cybersecurity culture
    Criminal underground overview including the dark web. Why and how criminals sell their breaches? Examples of access for sale and how can we use such intel to detect breaches?
  7. Theatre 3
    • Risk Management & Governance
    Digitization has increased in the latest years, bringing extensive cyber risks. Understanding the exposures, and potential financial losses might be complex and challenging for all companies. This is ...
  8. Theatre 3
    • Strategy, Architecture & Operational Security
    In cybersecurity, an active defence strategy is leveraged to outmanoeuvre an adversary and make an attack more difficult to carry out. Slowing down or derailing the attacker so they cannot advance or ...

Exhibitor News


 

Exhibitors and Sponsors

Platinum Sponsors

  • PacificTech
  • Proofpoint

Platinum Sponsor

  • Cybereason
  • Sophos

Gold Sponsor

  • Barracuda

Gold Sponsor

  • Qualys

Silver Sponsors

  • Entrust
  • Hillstone
  • Horangi

Silver Sponsors

  • Jiran
  • Intel741
  • Thales

Silver Sponsors

  • CDNetworks
  • Sangfor
  • Seculetter

Silver Sponsors

  • PulseSecure
  • Radware
  • Privasec

 

Silver Sponsors

  • SonicWall
  • Tenable
  • Tufin
  • UCWare

 

Bronze Sponsors

  • appView
  • Firemon
  • Indeed ID

Bronze Sponsors

  • Noviflow
  • Utimaco
  • Wizlyn

 

Bronze Sponsors

  • ThycoticCentrify
  • XM Cyber

 

Partners

Knowledge Partner

  • BICSI

News Distribution Partner

  • ACN Newswire

Associate Content Partner

  • Uptime Institute

Strategic SEO Partner

  • AdVantage

Strategic Event Partner

  • ISC2

Event Partners

  • AiSP
  • ARC Advisory
  • Asia Cloud Computing Association (ACCA)
  • Asosiasi Cloud Computing Indonesia
  • Fintech Association of Hong Kong
  • Accelerating Asia

Event Partners

  • Best Practice of eCommerce
  • BigDataX
  • CMO Council
  • ISACA
  • CSCIS
  • La French Tech
  • ASME

Event Partners

  • Practical DevSecOps
  • Digital Advertising Association Thailand (DAAT)
  • DevOps Institute
  • Forrester
  • Singapore Chamber of E-Commerce
  • Plug And Play
  • Co Creation Lab

Event Partners

  • IASA
  • IPI Singapore
  • itSMF
  • IFMA
  • European Data Centre Association
  • GS1

Event Partners

  • KinerjaBisa
  • Logistics & Supply Chain Management Society
  • Michael Page
  • NexChange
  • SG Tech
  • CHIME

Event Partners

  • Singapore Cyber Security Consortium (SGCSC)
  • Structure Research
  • General Assembly
  • Open Connectivity Foundation
  • Smart Asia India

Media Partners

  • APAC CIO
  • APSM
  • Asia Blockchain Review
  • Asia Research News

Media Partners

  • Australian Cybersecurity Magazine
  • Australian Security Magazine
  • BizClik Media
  • European Data Centre Association

Media Partners

  • Chief IT
  • CIO Advisor APAC
  • Cross Border Magazine
  • AI Time Journal

Media Partners

  • CryptoNewsZ
  • ComputerWeekly.com
  • Cyber Security ASEAN
  • Asia Content News
  • Enterprise Security Magazine

Media Partners

  • Data Storage ASEAN
  • e27
  • Fintech Finance
  • CMO Asia
  • GovTech SEA

Media Partners

  • Jumpstart Media
  • My Security Media
  • Retail CIO Outlook
  • Cybersec Asia
  • Frontier Enterprise – Jicara Media

Media Partners

  • Telecom Era
  • Supply Chain Digital
  • Techwire Asia
  • Gigabit
  • Digicon Asia

Media Partners

  • FutureIoT
  • Marketing Ops
  • Payment & Cards Network
  • Techtarget
  • FutureCIO

Official Partner Hotel

  • MBS

Media Partners

  • Wire 19
  • 计算机网络世界
  • Supply Chain Brain
  • Disruptive Tech Asean
  • FutureCFO

Testimonials

  • As cyber security is the hot topic at the moment, there are many exhibitors with new product showcase and conference speakers sharing their expertise, I find it very informative and insightful. My job scope covers a broad spectrum, having other shows like Big Data and IoT in one room is very convenient. Look forward to coming back next year too!
    Deputy Manager, Land Transport Authority
  • I’m interested in a couple of topics (i.e. Internet of Things, eCommerce and cloud & cyber security), so that’s why I’m here. We’ve just finished a conversation with NETSCOUT and are quite interested in their products – we will keep in touch with them to see how we can further collaborate.
    IT Manager, BSH Home Applications Pte Ltd
  • The event was good and informative. I've attended this event to browse for more products and solutions which we can use in our organisation to improve operations efficiency. I'll definitely be back next year.
    Team Lead, FMIS ICT Strategy, Lead and Innovation, Ministry of Economy and Finance
  • I attend this show with no particular focus but the speaker line up is good, the topics covered are wide as well. The speakers provide insightful content that are relevant to my job – cloud, cyber security, networks and the co-location of different shows help to save time too!
    Regional IT Governance Manager, TP ICAP