CISOsummit 2014 Nov. 5, 2014 to Nov. 7, 2014, equarius,Singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
A Government-wide Information Security Programme: A Case of the Western Region Municipality Highlighted Case Study Irene Corpuz The UAE as a whole has been pioneering and investing on technology, and thus focus ...
Think like a Bad Guy- Change the Game to Protect your Business Keynote Tony Caine N/A
Building Secure Information & Communications Infrastructure for Smart Cities Roundtable Irene Corpuz , Sally Leivesley , Sunil Gupta Including discussion around current Advanced Cognitive Early Warning Prevention Systems for Smart Cities Discussion and ...
The Human Story of Security Case Study Mike Usher N/A
Security Breaches & Reporting Keynote Mike Humphrey N/A
Top New Application Security Challenges for CISOs and New Tips and Tricks to Address Them Tobias Gondrom N/A
How is the CISO Role Changing? What is Intelligent Security? How does Risk Management Fit in? Panel Chuan-wei Hoo , Khadir Fayaz - Thoughts on how the CISO role is changing? Currently and over the next five ...
Workshop 1: The Price is Right: Writing a Security Plan that makes Financial Sense Richard Cross Is there any repeatable logic for pricing risks or do we accept the relative irrationality ...
Workshop 2: Application Security for CISOs - Best Practices: Security & Risks of Web Applications Tobias Gondrom N/A
Workshop 3: Information Security Assurance Across the Supply Chain - How can we Protect Customer Information Due Diligence in Vendor Selection? How can we Trust Service? Cheryl Hennell Good practice supply chain & 3rd party risk management; due diligence in vendor selection and ...
Optimising Intelligent Systems for Competitive Advantage: Discussions on Singapore and an International Case Study of Systems Failures in Flight MH370 Keynote and Scenario Planning Sally Leivesley - Smart systems, interconnectedness and convergence - Singapore's optimisation of intelligent systems: Discussion - Security ...
Defense in Depth is Fading, is Cyber Resiliency the Answer? Khadir Fayaz N/A
Security and Transparency - How Google Handles Data Closing Keynote Eran Feigenbaum N/A
Where Does InfoSec sit in the context of Enterprise Risk? Keynote Richard Cross What is the relative importance of InfoSec when top management have to survey and prioritise ...
Consumerisation & Information Sharing - What Happens when it goes Wrong? Panel Gadi Evron , Chuan-wei Hoo , Mike Humphries , Stewart Hayes - Securing communications, cooperation and collaboration in the Asia-Pacific region - Security and privacy today ...
Counterintelligence and Deception Keynote Gadi Evron N/A
Are you ready for Cyber Security? Chuan-wei Hoo N/A
Rolling out a National Network is a Key Infrastructure Project with th eObjective of Securing Australia's Position in the Digital Age Case Study Stewart Hayes This case study will provide wholesale high speed broadband services to every citizen in Australia ...
How to Maintain Proactive Security in the Post-"Heartbleed" "Shell Shock" World? Case Study Viktor Polic - Information centric and people centric security - Revisiting identity and access management - Cryptographic ...
How can we Best Understand Adversaries' Processes and Building in Security Capabilities? What are the Game-Changers? Panel Tony Caine - What vulnerabilities could be affecting your organisation? How do we prioritise? - How data ...
The Business of Information Security: Establishing the Desired Outcome Case Study Bjorn Bjornsvik N/A