Organisations across the ASEAN region are harnessing technology-led innovation to meet customer needs. Top of mind for many organisations is how they can capitalise on this innovation while maintaining the security of their users, data and applications. 

On 4 April, Palo Alto Networks and our partners will bring together global and local industry experts at the Cybersecurity Forum in Philippines.

Through keynote addresses, vendor and industry sessions, you will get up to speed on the latest network, cloud and endpoint security innovations, and leave with new ideas to better protect your organisation. 

Register today for this full day event where you will walk away with:

  • Valuable and actionable security insights
  • Best practices and the opportunity to hear from your peers
  • An understanding of key policy changes and how they impact your organisation

AGENDA

Time Topic
8:00 – 8.55 Registration and Morning Coffee
8:55 – 9:00 Opening
9:00 – 9:30 Disrupting Cybersecurity Status Quo
Oscar Visaya, Country Manager, Palo Alto Networks Philippines
9:30 – 10.00 Keynote
Vicky Ray, Principal Researcher, Unit 42, Palo Alto Networks
10:00 – 10:30 Industry Keynote
Henry Rhoel R. Aguda, Senior Executive Vice President Chief Technology & Operations Officer and Chief Transformation Officer
Jose Paolo G. Rufo, CIO Chief Information Security Officer & VP, Union Bank of the Philippines
10:30 – 10:45 Networking Break
10:45 – 11:15 Evolving Your Security Operation to Keep Pace with Digital Risk
Robert Cosme , Systems Engineer Manager, Palo Alto Networks Philippines
11.15 – 11.45 Panel Discussion ‘Avengers of Cyber Security’
Moderator: Aggie Flavier
Panelist: Kevin O’Leary, Field Chief Security Officer, Palo Alto Networks APAC
11.45 – 12.30 Co-session with Tech Alliance (Microsoft)
12:30 – 13:30 Lunch
13:30 – 14:00 Security Operating Platform Show Time!
Adrian Dumangas & Marc Lainez, Systems Engineer , Palo Alto Networks Philippines
14:00 – 14:45 Co-session with Tech Alliance (Firemon)
14:45 – 15:30 Co-session with Tech Alliance (RSA)
15:30 – 15:45 Networking Break
15:45 – 16:30 Co-session with Tech Alliance (Aruba)
16:30 - 17:15 Cortex XDR - Breaking Detection & Response Silos
Robert Cosme , Systems Engineer Manager, Palo Alto Networks Philippines
17:15 - 17:30 Summary, Lucky Draw & Closing

SPEAKERS

Ken Teong
Country Manager, Palo Alto Networks Malaysia

Ken Teong is country manager for Malaysia at Palo Alto Networks, responsible for driving business strategy and growth for the Malaysia market.

Prior to joining Palo Alto Networks, Ken spent 14 years of his career with Avanade and has held several senior leadership roles. He has vast experience in managing large enterprises from the Energy, Financial Services, Manufacturing to Public Sector industry.

As a veteran in the technology industry, Ken brings with him a wealth of experience in driving IT transformation projects for enterprises from establishing business target operating model (TOM) to systems implementation.

Ken is passionate about cybersecurity and he is a strong advocate of embedding cybersecurity at the early stage of any digital transformation.

Ken Teong holds a Bachelor’s Degree in Electrical Engineering and Postgraduate Diploma in Software Engineering.



Mark Du Plessis
Managing Director Accenture

Mark is a passionate and experienced security leader with over 23 years’ experience in helping some of the largest global and regional companies transform their security programmes. He has deep knowledge in the fields of Cyber Security, Operational Technology and IOT Security with over 13 years of Operational Technology Security specialisation. He leads the security business within the ASEAN Resources Industry as well as being the principal Subject Matter Advisor for OT/IoT and Cyber Security across APAC. He is a member of the ISA-62443 Standards Committee and is a participant in several working groups.


Eddie Lim
Senior SE Manager, Palo Alto Networks ASEAN

Eddie is senior manager of systems engineering at Palo Alto Networks. In his role, he is responsible for leading a team of highly trained engineers across ASEAN, and working closely with customers to strengthen their cybersecurity posture.

Eddie has over 15 years of experience in the industry with various leading IT vendors and specialises in Enterprise Network Security. He joined Palo Alto Networks from F5 Networks where he oversaw and managed the installation and configuration of operating systems and channel development. Prior to F5 Networks, he also held senior technical roles at Blue Coat Systems and BigFix.

He is a strong advocate of education and is constantly educating customers on the evolution of the cyberthreat landscape and sharing best practices to help them prevent potential cyberattacks. Having a keen understanding of customers’ needs also allows him to be a valuable feedback channel to HQ Product Management them, especially in areas of new feature requests and product enhancements.

Eddie holds a Bachelor’s Degree in Information and Technology (Honours) from Queensland University of Technology.


Cyrus Yap
Systems Engineer Palo Alto Networks Malaysia

Cyrus Yap joins Palo Alto Networks as a Solution Architect with 8 years of IT experience mainly revolve around Network Security. Prior to joining Palo Alto Networks, Cyrus Yap had served M-Security Technology, HP and Huawei Technologies as Technical Consultant.


Jerry Chiang
Systems Engineer Palo Alto Networks Malaysia

Jerry Chiang joins in Palo Alto Networks as a System Engineer. With 15 years of experience in various background in the IT industry. Jerry Chiang gained his expertise in multiple security disciplines. Prior to joining Palo Alto Networks, Jerry Chiang was the principal SE at SonicWALL and Regional Consultant at Systex Distribution.


Sam Soon
Systems Engineer Palo Alto Networks Malaysia

Sam Soon has more than 13 years of experience in IT, his earlier years was spent with a Value-added Distributor specializing in the security space holding diverse portfolios which includes consulting, project management and professional services supporting various Enterprise, Service Providers and Financial Institution. Currently in Palo Alto Networks, Sam develops solutions and shares best practices, common approaches and new technology implementations to address cyber security concerns of the customer, helping them improve their security postures and align security strategically with business initiatives. Prior to Palo Alto Networks, he held consultant positions at A10 Networks and Clavister.


Aaron Chan
Systems Engineer, Palo Alto Networks Malaysia

"With more than 16 years of experience the IT industry, Aaron Chan has garnered broad knowledge in solving customer's IT challenges. Aaron Chan came from the networking background and very quickly gained his footing in the field of cyber security. As a passionate individual in his work, Aaron has helped modernize the security architecture of many large enterpises as well as service providers in the country. Aaron Chan is now the lead SE based in Malaysia. Prior to joining Palo Alto Networks, he has worked for Juniper Networks, BlueCoat Systems and NTT."


 

SYNOPSIS

The Three Milestones for Future-Proof Cybersecurity Strategy

CyberSecurity is a holistic and 'equilibrium-like' of protection, detection, and response. Over the past few years, we've started seeing Threat Intelligence products and services. Security operation teams are consolidating them into their arsenal as the reason for two trends in computing. 

First, companies practically have nearly lost control of our computing environment. Our data is mostly held in the cloud by other services providers companies. Moreover, our networks likely be outsourced and security tools are disjointed. This situation makes the response far more complicated and involved manual tasks because we might not have visibility into all parts of our critical network infrastructures and no automation and integration framework to quickly prevent successful cyber-attacks.

Second, attacks are getting more sophisticated. The rise of APTs (advanced persistent threats), ransomware, crypto jacking - attacks that specifically target for reasons other than pure financial theft - brings with it a new variety of attacker, which requires a different threat model. The situation is getting worse as hacking becomes a more integral part of geopolitics, unrelated networks are increasingly collateral damaged in nation-state fights. These ever-increasing number of cyber-attacks requires the integrated cybersecurity platform and powerful machine learning to detect, analyse, predict, automate and defend against the cyber threats in nearly real-time. 

In this session, we discuss the concept of cyber threat intelligence and its main challenges and opportunities for 2019 toward future-proof cybersecurity strategy, and then briefly introduce the integrated security platform which can addresses the current difficulties of disjointed tools and how to leverage threat intelligence to prevent latest cyber-attacks and use security automation as much as possible. 


Evolving Your Security Operation to Keep Pace with Digital Risk

Today’s Digital world has changed, and the traditional perimeter may not exist for many organization because now, users, data, and applications are everywhere. Your organization might have adopted SaaS applications, which are outside the control of the IT team, applications are often deployed in the public cloud where we see many organisations using multiple cloud providers at the same time. Furthermore, your users are continuing to access services from anywhere, whether they are in branch offices or completely mobile. With this ramifications, you may have a lot of security tools running in your network, cloud, and endpoint. From security operation point of view, it is already exhausting to manage several security devices like firewalls, IDS/IPS, web proxies, antivirus on emails and endpoints. When an security incident happened, it is very daunting task to correlate all information from different tools and from different technology providers and require manual action to quickly deliver security protections.

In this session, we will explain 3 steps that security operation must follow to keep bad guys out and take your SOC to the next level toward Next Generation SOC where we can help you prevent successful cyber-attacks, automate where possible and quickly consume security innovation at rapid pace in this digital era. 


Best Practices for Secure Deployments in Google Cloud

For many organizations, the cloud has become the main – if not the only – route to market for new application development and deployment. It’s easy to see why, Cloud environments afford greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help businesses maintain a competitive edge.

Today, most data and applications now reside in multiple clouds spanning infrastructure, platform and security as a service – IaaS, PaaS and SaaS. Unfortunately, many businesses are still saddled with legacy products that don’t work in the cloud or point products that don’t communicate with each other, while some enterprises rely solely on cloud vendor-supplied security. Confidently accelerating your move to the cloud requires consistent, automated protections across your multi-cloud deployments to prevent data loss and business interruption. We can help you reduce security fragmentation and successfully manage risk in the cloud.

In this session, you will understand the shared responsibility model in cloud, and how Palo Alto Networks can address those challenges with an innovative security approach that eliminates the wide range of cloud risks that can cause security breaches while enabling your organization to achieve consistent, frictionless protection for all your cloud environments.


Security Operating Platform Show Time!

Cybersecurity defence has to be able to gain balance in the asymmetric war with the adversaries. Adversaries has been using every resource that easily available, and every new emerging technology to break in and get your crown jewels they are aiming for. While security engineers, sitting in the dark facing handful of shrieking alerts with no context coming from disjointed point products, getting overwhelmed by manual response needed to be made. Don’t be that guy!

Now it is time to change and to embrace a new approach of closely integrated technology leveraging the power of Cloud, Analytics and Automation as the spears and shields for enterprise defenders.

In this session you will see how our security technologies, with network security, cloud delivered protections, endpoint protection, rich threat intelligence and threat hunting capabilities, work in conjunction to enforce automated protections for each level of threat risks to deliver a consistent protection across network, cloud and endpoint.

Finally, security that actually works!


Is your business ready for the Digital Workspace? Citrix Workspace and ADC: Secure apps, Desktop and Data

A digital workspace is a flexible and integrated way to deliver and manage the apps, desktops, data and devices your users need in a contextual and secure way. A unified, contextual and secure digital workspace from Citrix enables you to do all of this and realize the full benefits of hybrid- and multi-cloud environments while simplifying management and overcoming security challenges with a people-centric approach to security. Palo Alto Networks and Citrix have developed validated joint solutions that provide you with best-practice guidelines and resources to design infrastructure that achieves availability, security, performance, flexibility and visibility.


Is Your Mobile Device and Internet of Things Secured? Let's Strengthening BYOD and IoT with Integrated Security Approach

In this modern era, mobile devices - Bring Your Own Device (BYOD), Internet of Things (IoT) have been used widely in the company. Users can evade traditional security architectures with the use of several mobile devices to have access within the network. IT security team has no visibility about who the users are, what devices that they use, and what application that they open. IoT on the other hand are installed via non IT personnel like CCTV Cameras It become the nightmare to the team because of the shadow IT conditions. Despite of the flexibility and ease of usage, mobile devices and IoTs have some drawbacks which must be seriously solved by IT security team because of the lack of control and monitoring. Palo Alto Networks and Aruba Networks has joint validated design approach to make sure that your network secured by offering great visibility about the users, devices, and applications. Also, it can achieve availability, security, and performance.


Building a Zero Trust Security in the Data Center and Cloud

The modern data center has ever-increasing demands for throughput and performance, and Enterprises are in the journey to move workload from on-prem data center to many places in private/public cloud. The Trend  is showing that there is a shifting  from building legacy applications on physical or VMs to micro services, containers, server-less architecture, and adoption of DevOps. The speed to deploy these services is a key success in Digital Transformation to stay ahead and winning the competition. But how about security services ? Are you able to mitigate all kind of security threats without losing the business.

In this session, you will learn macro and micro-segmentation with Arista Networks and how to achieve agility, automation, and as well as security protection seamlessly in data center and private/public cloud. With Arista Cloud Vision, you can achieve simplified policy definition, cloud agnostic, automated security enforcement to get consistent security across all private and public cloud.


Fueling the Future with Data

The explosion of data in today’s digital economy has resulted a fundamental shift from using data to run the business. Now, Data is a new currency of great business outcomes and successful initiatives. Business acceleration through data analytics leads to lowered costs, reduced risk, and accelerated innovation, all with the predictive insights gained by data analytics. In addition, data retention is also a high priority for enterprise organizations. In most companies, IT is responsible not only for the integrity of the data, but also for adherence to industry policies and government regulations for the retention of data. NetApp has the holistic data management strategy that can help you to manage your massive unstructured data growth, to place content in the right  location, at the right time and the right storage tier to accelerate the delivery of new services




In Collaboration with
Gold Sponsors


Supporting Distributors