The South East Asia region is poised for digital transformation across enterprises; it has become an easy and prime target for cyberattacks.
It’s no longer a matter of if, but when you’re going to be the victim of a cyberattack. Are you prepared? It’s no longer a theory about protecting your critical...
With the dawn of the fourth industrial revolution (industry 4.0), organizations have put their digital transformation at the top of their agenda. While the digital transformation will enhance competitiveness and bring agility and optimal decision-making capabilities, it brings cybersecurity risks and innovation. It is...
We have been hearing about digital transformation for some time. Your business could be looking to reduce the cost or thinking about agility and swiftly bringing your services to market.
Many of us are on a similar journey! New terms, new architectures, confusing statements, and more security technologies are...
The daunting task for CISOs today is to turn today’s threats into tomorrow’s advantage. The tool that most security leaders are leaning on is the XDR to build resilient, dynamic, and living security. You could argue that true XDR can bring material benefit, but only if it combines different detection capabilities...
Banks in the ASEAN have seen their customers targeted by social engineering frauds. New fraudulent methods are bypassing Web application firewalls and multi-factor authentication security controls.
This session will cover:
How are fraudsters leveraging automated bots, MFA bypass toolkits, and social engineering...
VThe challenge for CISOs in their digital transformation journey is to understand the right technologies required for their business and how do you secure those endpoints that are going to expand. The question would arise on what you need to focus on endpoint security that could protect all access points which are...
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and part of technology innovation? Is the CTO function aligned with security in driving innovation? Meeting the...
Organizations believe that cloud computing brings a whole new level of autonomy and functionality, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud and enterprises are in a race to adopt the ‘cloud-first’ strategy to...
The region has witnessed the most prominent organizations hitting the headlines. It is beyond doubt that organizations have a huge staff and a myriad of cybersecurity tools to secure their environment; yet, they were still breached. The current approach is insufficient, and the deployed technologies don’t provide...
Building relationships with business unit leaders and driving a practical risk-based discussion with the board is critical in making informed risk decisions.
The daunting task for CISOs is the uncertainty around the reporting of significant risks, including just what represents a 'significant' risk, which...
The popular SolarWinds hack, the supply chain attack that implanted a backdoor in the Orion network monitoring software pushed to 18,000 of the firm's customers, is considered to be potentially the most significant intrusion in our history.
The campaign's full scale, including all of the tactics, techniques and...
As Russia and Ukraine invasions are making the headlines, organizations across the globe are facing a series of DDoS attacks. Besides, new forms of malware intrusions are surfacing that can destroy infected machines. How are organizations in the South East Asian regions responding to DDoS attacks? How vulnerable are...
Where does the journey to ‘zero trust’ begin and what are the common entry points and how can it unfold. Experts agree that ‘zero trust’ is based on the premise, ‘assume breach’, and treat every asset as breached, and all traffic as hostile.
The plenary session will discuss how the way we approach...
The year 2021 stands as testimony to the large ransomware attacks witnessed globally. The South East Asia is not an exception. The Southeast Asian region will see a spike in multifaceted extortion with more public breaches, along with an increase in ransomware-as-a-service operations in 2022. the increase will be...
Most OT systems are designed with very little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission-critical for enterprise security. As a CISO, can you reduce risk, security, and risk management functions silos to bridge...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.