Organisations across the ASEAN region are harnessing technology-led innovation to meet customer needs. Top of mind for many organisations is how they can capitalise on this innovation while maintaining the security of their users, data and applications. 

On 20 March, Palo Alto Networks and our partners will bring together global and local industry experts at the Cybersecurity Forum in Singapore. 

Through keynote addresses, vendor and industry sessions, you will get up to speed on the latest network, cloud and endpoint security innovations, and leave with new ideas to better protect your organisation. 

Register today for this full day event where you will walk away with:

  • Valuable and actionable security insights
  • Best practices and the opportunity to hear from your peers
  • An understanding of key policy changes and how they impact your organisation

AGENDA

Time Topic
8:00 – 8.55 Registration and Morning Coffee
8:55 – 9:00 Opening
9:00 – 9:30 Disrupting Cybersecurity Status Quo
Claribel Chai, Country Manager, Palo Alto Networks Singapore
9:30 – 10:00 Keynote
Naveen Zutshi, CIO, Palo Alto Networks
10:00 – 10.30 Industry Keynote
Joshua Kennedy White, Managing Director Accenture APAC
10:30 – 10:45 Networking Break
10:45 – 11:15 Evolving Your Security Operation to Keep Pace with Digital Risk
Wing Kwong Wee, System Engineer Manager, Palo Alto Networks Singapore
11:15 – 11:45 Panel Discussion ‘Avengers of Cyber Security’ 
Moderator: Alvin Tan, Director, Cloud, Cyber Security and Commercial Sales Palo Alto Networks ASEAN
Speakers: Bisham Kishnani, Consulting Engineer Manager Palo Alto Networks APAC
Kenneth Sim, Consulting Services Director Asia Pac Distribution
11.45 – 12.30 Co-session with Splunk
Jie Hong Lim, Senior Sales Engineer, Splunk
12.30 – 13.30 Lunch
13:30 – 14:00 Security Operating Platform Show Time! 
Palo Alto Networks
14:00 – 14:45 Co-session with Aruba
Jeff Yeo, Regional Security Product Manager, Aruba APJ
Chin Ching and Alywin, System Engineer Palo Alto Networks Singapore
14:45 – 15:30 Co-session with Menlo Security
Boon Peng, Solutions Architect, Menlo Security APAC
15:30 – 15:45 Networking Break
15:45 – 16:30 Co-session with Microsoft
Richard Koh, Chief Technology Officer, Microsoft Philippines
16:30 - 17:15 Co-session with Tech Alliance
17:15 - 17:30 Summary, Lucky Draw & Closing

SPEAKERS

Claribel Chai
Country Manager, Palo Alto Networks Singapore

Claribel Chai is country manager for Singapore at Palo Alto Networks. In this role, Claribel focuses on driving the strategic security initiatives for customers across multiple industry verticals, ensuring that their security needs are met.Claribel has more than 20years of experience in the IT industry, including more than 13years in cybersecurity. Shehas a strongtechnical backgroundand an excellent track record of success in driving business growth. Claribel has helped grow the publicsector businessfourfold, making it the biggest public sector business in the Asia-Pacific region. Prior to joining Palo Alto Networks, Claribel was with McAfee’s team for 10 years, rising to becomeSales Director.Claribel holds a Bachelor of Information Technologyfrom Queensland University of Technology.Outside of work, Claribel enjoys spending time with family and is a self-confessed foodie.

Naveen Zutshi
CIO, Palo Alto Networks

Naveen Zutshi joined Palo Alto Networks as senior vice president and chief information officer in December 2015. In this role he is responsible for Palo Alto Networks information technology solutions, driving a comprehensive strategy for information technology that will enable the company to rapidly scale, deliver innovative solutions globally and build a world-class IT organization.

Naveen’s experience spans large-scale enterprises to small startups with special focus on applications, software development and IT infrastructure. Prior to joining the Palo Alto Networks team, Naveen was senior vice president, Technology at Gap Inc. where he was responsible for the company’s infrastructure, operations and information security organizations.

Naveen earned a B.E. in Computer Engineering from Bangalore University and an MBA from the University of Arkansas.

Alvin Tan
Regional Head, Palo Alto Network ASEAN

Alvin Tan is regional head for ASEAN at Palo Alto Networks. In this role, Alvin is responsible for driving strategic security initiatives for customers across multiple industry and verticalsto ensurethat their security needs are met. With over 20 years of experience in the IT industry, Alvin has a strong technical background especially in cybersecurity, and an excellent track record of success in driving business growth. Alvin also has a deep understanding of cloud security and helping customers to be protected in the cloud environment isone of his key focus areas. Prior to joining Palo Alto Networks, he spent 12 years in McAfee, where he built and led high-performing regional teams across multiple functions and drovethe security solutions business. He also ensured customer success while working within the partner ecosystem to drive channel profitability. He was recognised for establishing the McAfee office in Malaysia, rebuilding the Philippines and Vietnam teams, and setting up the channels ecosystems in Singapore. On top of that, he was involved in driving McAfee’s businesses in the mid market and SMB segments. Prior to McAfee, Alvin worked at IBM, NEC and Oracle. Alvin is a recognised speaker at many security events and takes a keen interest in bringing cybersecurity education to young internet users.

Bisham Kishnani
Head of Consulting Engineer, Palo Alto Networks APAC

Bisham Kishnani is head of consulting engineering at Palo Alto Networks for the Asia Pacific region where he is responsible for the company’s growth strategy in the region. In this role, Bisham heads up the consulting engineering team across the region to help industry partners, academia, andgovernment organisations improve their security posture as well as develop cyber resilient infrastructure.Having worked in the technology sector for close to 18 years, Bisham brings with him a wealth of experience being in management, solutions architecture and consulting engineering that spans across different areas of data centers, cloud, networking and security. Before joining Palo Alto Networks, Bisham worked with Juniper Networks for close to 10 years as Senior Consulting Engineer, India & SAARC. He was responsible for designing solutions for large enterprises and telecom customers in the Data Center, SDN, Virtualisation & Security spaces. Bisham holds a Diploma in Digital Electronics & Bachelor of Engineering degree from Mumbai(India) University. Outside of work, Bisham is a technology enthusiast.

 

SYNOPSIS

The Three Milestones for Future-Proof Cybersecurity Strategy

CyberSecurity is a holistic and 'equilibrium-like' of protection, detection, and response. Over the past few years, we've started seeing Threat Intelligence products and services. Security operation teams are consolidating them into their arsenal as the reason for two trends in computing. 

First, companies practically have nearly lost control of our computing environment. Our data is mostly held in the cloud by other services providers companies. Moreover, our networks likely be outsourced and security tools are disjointed. This situation makes the response far more complicated and involved manual tasks because we might not have visibility into all parts of our critical network infrastructures and no automation and integration framework to quickly prevent successful cyber-attacks.

Second, attacks are getting more sophisticated. The rise of APTs (advanced persistent threats), ransomware, crypto jacking - attacks that specifically target for reasons other than pure financial theft - brings with it a new variety of attacker, which requires a different threat model. The situation is getting worse as hacking becomes a more integral part of geopolitics, unrelated networks are increasingly collateral damaged in nation-state fights. These ever-increasing number of cyber-attacks requires the integrated cybersecurity platform and powerful machine learning to detect, analyse, predict, automate and defend against the cyber threats in nearly real-time. 

In this session, we discuss the concept of cyber threat intelligence and its main challenges and opportunities for 2019 toward future-proof cybersecurity strategy, and then briefly introduce the integrated security platform which can addresses the current difficulties of disjointed tools and how to leverage threat intelligence to prevent latest cyber-attacks and use security automation as much as possible. 


Evolving Your Security Operation to Keep Pace with Digital Risk

Today’s Digital world has changed, and the traditional perimeter may not exist for many organization because now, users, data, and applications are everywhere. Your organization might have adopted SaaS applications, which are outside the control of the IT team, applications are often deployed in the public cloud where we see many organisations using multiple cloud providers at the same time. Furthermore, your users are continuing to access services from anywhere, whether they are in branch offices or completely mobile. With this ramifications, you may have a lot of security tools running in your network, cloud, and endpoint. From security operation point of view, it is already exhausting to manage several security devices like firewalls, IDS/IPS, web proxies, antivirus on emails and endpoints. When an security incident happened, it is very daunting task to correlate all information from different tools and from different technology providers and require manual action to quickly deliver security protections.

In this session, we will explain 3 steps that security operation must follow to keep bad guys out and take your SOC to the next level toward Next Generation SOC where we can help you prevent successful cyber-attacks, automate where possible and quickly consume security innovation at rapid pace in this digital era. 


Best Practices for Secure Deployments in Google Cloud

For many organizations, the cloud has become the main – if not the only – route to market for new application development and deployment. It’s easy to see why, Cloud environments afford greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help businesses maintain a competitive edge.

Today, most data and applications now reside in multiple clouds spanning infrastructure, platform and security as a service – IaaS, PaaS and SaaS. Unfortunately, many businesses are still saddled with legacy products that don’t work in the cloud or point products that don’t communicate with each other, while some enterprises rely solely on cloud vendor-supplied security. Confidently accelerating your move to the cloud requires consistent, automated protections across your multi-cloud deployments to prevent data loss and business interruption. We can help you reduce security fragmentation and successfully manage risk in the cloud.

In this session, you will understand the shared responsibility model in cloud, and how Palo Alto Networks can address those challenges with an innovative security approach that eliminates the wide range of cloud risks that can cause security breaches while enabling your organization to achieve consistent, frictionless protection for all your cloud environments.


Security Operating Platform Show Time!

Cybersecurity defence has to be able to gain balance in the asymmetric war with the adversaries. Adversaries has been using every resource that easily available, and every new emerging technology to break in and get your crown jewels they are aiming for. While security engineers, sitting in the dark facing handful of shrieking alerts with no context coming from disjointed point products, getting overwhelmed by manual response needed to be made. Don’t be that guy!

Now it is time to change and to embrace a new approach of closely integrated technology leveraging the power of Cloud, Analytics and Automation as the spears and shields for enterprise defenders.

In this session you will see how our security technologies, with network security, cloud delivered protections, endpoint protection, rich threat intelligence and threat hunting capabilities, work in conjunction to enforce automated protections for each level of threat risks to deliver a consistent protection across network, cloud and endpoint.

Finally, security that actually works!


Is your business ready for the Digital Workspace? Citrix Workspace and ADC: Secure apps, Desktop and Data

A digital workspace is a flexible and integrated way to deliver and manage the apps, desktops, data and devices your users need in a contextual and secure way. A unified, contextual and secure digital workspace from Citrix enables you to do all of this and realize the full benefits of hybrid- and multi-cloud environments while simplifying management and overcoming security challenges with a people-centric approach to security. Palo Alto Networks and Citrix have developed validated joint solutions that provide you with best-practice guidelines and resources to design infrastructure that achieves availability, security, performance, flexibility and visibility.


Is Your Mobile Device and Internet of Things Secured? Let's Strengthening BYOD and IoT with Integrated Security Approach

In this modern era, mobile devices - Bring Your Own Device (BYOD), Internet of Things (IoT) have been used widely in the company. Users can evade traditional security architectures with the use of several mobile devices to have access within the network. IT security team has no visibility about who the users are, what devices that they use, and what application that they open. IoT on the other hand are installed via non IT personnel like CCTV Cameras It become the nightmare to the team because of the shadow IT conditions. Despite of the flexibility and ease of usage, mobile devices and IoTs have some drawbacks which must be seriously solved by IT security team because of the lack of control and monitoring. Palo Alto Networks and Aruba Networks has joint validated design approach to make sure that your network secured by offering great visibility about the users, devices, and applications. Also, it can achieve availability, security, and performance.


Building a Zero Trust Security in the Data Center and Cloud

The modern data center has ever-increasing demands for throughput and performance, and Enterprises are in the journey to move workload from on-prem data center to many places in private/public cloud. The Trend  is showing that there is a shifting  from building legacy applications on physical or VMs to micro services, containers, server-less architecture, and adoption of DevOps. The speed to deploy these services is a key success in Digital Transformation to stay ahead and winning the competition. But how about security services ? Are you able to mitigate all kind of security threats without losing the business.

In this session, you will learn macro and micro-segmentation with Arista Networks and how to achieve agility, automation, and as well as security protection seamlessly in data center and private/public cloud. With Arista Cloud Vision, you can achieve simplified policy definition, cloud agnostic, automated security enforcement to get consistent security across all private and public cloud.


Fueling the Future with Data

The explosion of data in today’s digital economy has resulted a fundamental shift from using data to run the business. Now, Data is a new currency of great business outcomes and successful initiatives. Business acceleration through data analytics leads to lowered costs, reduced risk, and accelerated innovation, all with the predictive insights gained by data analytics. In addition, data retention is also a high priority for enterprise organizations. In most companies, IT is responsible not only for the integrity of the data, but also for adherence to industry policies and government regulations for the retention of data. NetApp has the holistic data management strategy that can help you to manage your massive unstructured data growth, to place content in the right  location, at the right time and the right storage tier to accelerate the delivery of new services




In Collaboration with
Platinum Sponsor
   
Gold Sponsors


 
Silver Sponsors


 
Supporting Distributors