Home Conference Conference Agenda

CONFERENCE AGENDA

A.M.



  • Registration

  • Australian LNG and Gas Market Outlook and Policies

  • Global LNG Market Trends, Business Models, Pricing, etc


 

P.M.



  • LNG and Gas Infrastructure Development;

  • Emerging Market LNG Demand and Investment Analysis;

  • Onshore and offshore LNG terminals Investment and Financing;

A.M.



  • Large-scale LNG projects engineering, construction and risk management;

  • Innovative LNG technologies to drive down cost, reduce carbon emission and improve production efficiency;

  • Digital Solutions and Operational Excellence


 

P.M.



  • LNG as fuel and opportunities for the industry;

  • CCS’ role to play in LNG industry

  • Hydrogen and LNG production technologies;

NEXT-GEN INFORMATION SYSTEMS SECURITY

Hosted by: Leadership from Cyperspace Operations Command (Command 86), Ministry of Defense

13:00
DELEGATE REGISTRATION
13:30
OPENING REMARK

Leadership from Cyperspace Operations Command (Command 86), Ministry of Defense
13:35
Insider threats: Is your biggest enemy in your own backyard?

Consulting expert from Fortinet
13:55
Protect your network from malicious intrusions with advanced endpoint security

Consulting expert from CMC
14:15
Transform your Zero Trust journey for Digital Transformation Readiness

Mr. Philip Hung Cao, Solutions Architect, Palo Alto Networks





 



 


Philip Hung Cao (aka #tekfarmer), ZTX-S, CCISO,
CISM, CCSP, CCSK, CASP, GICSP, PCNSE is a Strategist, Advisor,
Contributor, Educator and Motivator. He has 19 years’ experience in
IT/Cybersecurity industry in various sectors & positions.




View more




Mr. Philip Hung Cao
Mr. Philip Hung Cao
Solutions Architect


14:35
TEA BREAK
14:55
Insider threats: Is your biggest enemy in your own backyard?

Ms. Jolene Lim, Technology Consultant, RSA NetWitness Business (South East Asia)





 



 


As digital initiatives evolve business operations,
the ‘weakest link’ becomes an amplified factor as any issue can
quickly escalate into a major business risk. Your employees could be
the organization’s biggest security threat.

As we all place our focus in external threat actors because they are
thrilling and following attack patterns, one that we have seen
frequently is that, organizations do overlook harmful security
threat at their own backyard, which really are: their own employees.




View more




Ms. Jolene Lim
Ms. Jolene Lim
Technology Consultant


15:15
Risk mitigation with AI-powered threat intelligence

Consulting expert from MobiFone
15:35
Data security on hybrid cloud platform

Consulting expert from HPE
15:55
PANEL DISCUSSION
Moderator (tentative): Leadership from Cyperspace Operations Command
(Command 86), Ministry of Defense



 

Topics of discussion

 


  • Building Security-of-Things

  • Measuring cyber security performance for improvement

  • How to fully leverage AI/ML, Bigdata power in cyber defense tactic?


 

Panelists

 


  • Leaders from the Department of Financial Informatics and Statistics, Ministry of Finance

  • Representatives from IT Vendors

  • Representatives from enterprises

17:30
END OF CONFERENCE SESSION 2
  • Concurently with Conference Session 1, 3
  • Time: 13:00 – 17:30

PROTECTING PERSONAL DATA

Hosted by: Leadership from Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security

13:00
DELEGATE REGISTRATION
13:30
OPENING REMARK

Leadership from Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security
13:35




Universal Privilege Management – What it is and How you can maximize
it in your organization?



Mr.
Eugene Lin
, Regional Director – APJ, BeyondTrust


 



Threat actors continue to take advantage of the lack of privilege
control in organisations across Singapore. 80% of all breaches
involve some sort of privilege credential, and nearly 90% of
critical Microsoft vulnerabilities could be mitigated just by
removing admin rights.A new era of Privilege Access Management has
arrived – The Universal Privilege Management.




View more




Mr. Eugene Lin
Mr. Eugene Lin
Regional Director – APJ


13:55
Integrated security to protect personal data on smartphones

Consulting expert from Samsung
14:15



New hope in Fraud Prevention. U.E.B.A & Real time transaction risk scoring covering all payment channels



Mr. Kulakov Kirill, Technical Consultant, BI.ZONE



 


This
is a short story about what we have in fighting against fraud in all
banking channels. We will have a look to most important challenges,
will analyze most relevant attacks on bank customers and will answer
to main question “How effectively defend bank customers from various
fraud and what technologies we can use for it?”




View more




Mr. Kulakov Kirill
Mr. Kulakov Kirill
Technical Consultant


14:35
TEA BREAK
14:55
Upgrading vulnerability management capability to tackle the evergreen phishing threat

Representative from Enterprise (Vietcombank)
15:15
Unlocking the potential of Big data analytics to improve fraud prevention

Representative from Data Asia
15:35
Securing enterprises’ digital assets on cloud?

Mr. Nguyen Truong Thang, Director, Institute of Information Technology, Vietnam Academy of Science and Technology

15:55
PANEL DISCUSSION
Moderator (tentative): Leadership from Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security

 

Topics of discussion

 


  • Best pratice sharings in building high-tech-incorporated security posture

  • The security testing of mobile devices

  • Malware infections of devices


 

Panelists

 


  • Representatives from enterprises (Vietcombank, Prudential)

  • Representatives from IT Vendors

  • Consulting experts

17:30
END OF CONFERENCE SESSION 3
  • Concurently with Conference Session 1, 2
  • Time: 13:00 – 17:30