Total Security Conference Singapore 2020
Attending this event?

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Wednesday, October 21

8:30am PDT

Registration & Morning Networking
Wednesday October 21, 2020 8:30am - 9:00am PDT

9:00am PDT

Chair's Opening Remarks
Wednesday October 21, 2020 9:00am - 9:10am PDT

9:10am PDT

Rethinking Cybersecurity in the Post-Covid-19 World
When the comfort zone of enterprise security administrators – known devices, known networks, known space – no longer apply, how does the new security landscape look? What could security professionals do to safeguard their enterprises in this new normal?

Wednesday October 21, 2020 9:10am - 9:30am PDT

9:30am PDT

Unifying Endpoint Management and Security for Visibility and Control
Explore how a unified platform can streamline administration while improving, at scale, cross-platform visibility and cyber threat prevention and remediation.

Wednesday October 21, 2020 9:30am - 9:50am PDT

9:50am PDT

Securing the End: How to Protect Endpoints Effectively Outside Organization Network Perimeter?
With remote working, at-scale, expected to be the new norm, securing endpoints that connect from outside a network perimeter has become more critical than ever before.
-    How can CISOs protect endpoints that reside outside their security perimeters?
-    How to best monitor, control, maintain, and authenticate endpoints?
- How to balance between confidentiality, availability, and business viability, from policy and access right stand points?


Mathieu Lahierre

Principal Application & Data Security - Cybersecurity, Technology Risk & Compliance, BHP

Wednesday October 21, 2020 9:50am - 10:30am PDT

10:30am PDT

Integrating Endpoint Detection and Response to Strengthen Security Posture
Discover how EDR solutions can help CISO view suspicious activity at endpoints comprehensively and facilitate investigations and responses remotely.

Wednesday October 21, 2020 10:30am - 10:50am PDT

10:50am PDT

Coffee Break & Security Showcase
Wednesday October 21, 2020 10:50am - 11:20am PDT

11:20am PDT

Implementing User and Entity Behaviour Analytics (UEBA) for Better Detection
Increasingly skilful hackers are able to bypass perimeter defences and prevention is no longer enough. Detecting breaches is paramount for speedy response to minimize damages. In this session, learn:
-    How shifting from rule- and pattern-based detection to behavioural analytics enabled by AI can effectively detect insider threats
-    How UEBA can enhance monitoring and screening to identify penetrations
- How UEBA complements existing detection tools for comprehensive threat indication

Wednesday October 21, 2020 11:20am - 11:40am PDT

11:40am PDT

Transcending Traditional Boundaries: Adopting Zero Trust Architecture (ZTA) in a Perimeter-less World
With remote working, cloud computing and Internet of Things, traditional network perimeters are no longer sufficient in establishing isolated, safe environments. Therefore, CISOs must assume the network is hostile and always verify before providing the least privilege required.
-    How to safeguard valuable data, assets, applications and services by granular segmentation?
-    How best to verify and authenticate trusts?
-    How to establish access policies based on the principle of lease privilege?
-    What architecture and infrastructure need to be changed to facilitate ZTA?
- How to implement ZTA without sacrificing user experiences?

Wednesday October 21, 2020 11:40am - 12:20pm PDT

12:20pm PDT

Enabling Zero Trust Architecture with Next Generation Firewall
Find out how Next Generation Firewalls with application control and intrusion prevention could act as segmentation gateways that create micro-perimeters around the protect surface in ZTA.

Wednesday October 21, 2020 12:20pm - 12:40pm PDT

12:40pm PDT

Networking Lunch Break
Wednesday October 21, 2020 12:40pm - 2:00pm PDT

2:00pm PDT

Integrating Disparate Security Systems for Streamlined Operations
Learn how a state-of-the-art Security Orchestration Platform can improve the security posture of your company.

Wednesday October 21, 2020 2:00pm - 2:20pm PDT

2:20pm PDT

Evolving Cyber-security Threat Patterns: How to Orchestrate and Automate Speedy Responses to AI-Driven Cyber-Attacks
With larger attack surfaces vulnerable to more sophisticated and speedier campaign-style attacks driven by machine learning, CISOs must rely on security orchestration, automation and response (SOAR) for efficient defence.
-    How can CISOs visualize and view beyond their dashboard, the security landscape to correctly identify the real threats
-    How to create good eco-systems with multiple defence tools from different vendors
-    With attackers using pivot for AI engines and modifying signatures in real time, how can defence adapt and keep up
- How best to automate responses to decrease response time without disrupting business operations

Wednesday October 21, 2020 2:20pm - 3:00pm PDT

3:00pm PDT

Automating Investigation Processes and Responses to Minimize Costly Damages from Cyber-security Incidents
Find out how security automation can simplify investigation and reduce reaction time, enabling security teams to mitigate events quicker.

Wednesday October 21, 2020 3:00pm - 3:20pm PDT

3:20pm PDT

Coffee Break & Security Exhibition Showcase
Wednesday October 21, 2020 3:20pm - 3:40pm PDT

3:40pm PDT

Striking the Balance: Realigning Security Resources to Support Business Recovery and Agility
In a post-Covid-19 world where enterprises strive to recoup lost revenue, speed and agility might take priority over security and compliance, providing enterprising attackers the gap to access sensitive data and essential infrastructure.
-    How can CISO ensure that their enterprises do not get compromised despite the emphasis on speed to market?
-    How to balance and prioritize security investments when under revenue pressure?
-    Is SecOps – integration of IT security and operations – the answer to more efficient cybersecurity?
- How can CISO successfully implement SecOps, from people and technology perspectives?

Wednesday October 21, 2020 3:40pm - 4:20pm PDT

4:20pm PDT

Managing the Inevitable: Ensuring Cyber Resiliency for Business Continuity and Data Recovery
Since cyber-attacks can no longer be fully prevented, it is imperative for organizations to be prepared to respond to and recover from adverse cyber events to limit the severity and ensure business continuity.
-    How well-prepared are organizations in Singapore to respond and restore services?
-    What are the best practices in creating and implementing response and recovery plans?
-    How can attacks and relevant responses be identified efficiently?
- What more can we do to accelerate service restoration?


Christopher Han

VP IT & CISO, Sunseap Group

Wednesday October 21, 2020 4:20pm - 5:00pm PDT

5:00pm PDT

Closing Remarks & End of Conference
Wednesday October 21, 2020 5:00pm - 5:30pm PDT