Using AI & Behavioural Biometrics to mitigate Social Engineering Banking Fraud

Vaibhav Khandelwal, Regional Head of Security and Fraud, ASEAN & India, F5  •  April 8, 2022


Securing your Endpoints in the Era of Digital Transformation

Romanus Prabhu Raymond, Global head of technical support for endpoint management & security, ManageEngine, a division of Zoho Corp  •  April 8, 2022


Two-Way Street: A Cybersecurity Debate between CTO vs. CISO-Where is the Disagreement?

Mario Demarillas, CISO and Head of IT Consulting and Software Engineering, Exceture, Philippines , Edmund Situmorang, Managing Director and CTO, Tech Connect Innovation Centre, Sinarmas Mining-Indonesia  •  April 8, 2022


Assessing the Effectiveness of Your Cyber Threat Intelligence Program: Building a Business Case

Scott Flower, Associate Professor, University of Western Australia  •  April 8, 2022


Panel discussion: You Have Been Breached: Is Your Incidence Response Strategy Top Notch?

George Do, CISO, Gojek , James Fong , Emil Tan, Chief Operating Officer, Red Alpha Cybersecurity  •  April 8, 2022

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.