<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • 20 August 2025

  • 08:30

    Registration, Coffee & Networking in the Exhibition Area

    Arrow
  • 09:00
    sanjeev g

    Welcoming Remarks from Corinium & Chair's Remarks

    Sanjeev Gathani - Group Compliance Officer - RV Health

    Arrow
  • 09:10
    1143 CISO Brisbane_Icon_Networking

    Speed Networking

    Arrow
  • 09:15
    Raja Selvaraj

    Securing Multi-Cloud Environments: Managing Complexity Without Losing Control

    Dr. Raja Selvaraj - Senior Principal Cyber Security Consultant - Cloud and Container Security - Standard Chartered

    Arrow
  • 09:40
    Sponsor Presentation

    How SASE Revolutionises Cloud Security

    Arrow
    • Understand how Secure Access Service Edge (SASE) integrates networking and security into a unified cloud-native framework
    • Explore how SASE enhances zero-trust principles, ensuring secure access for users and devices across diverse locations
    • Discover strategies to simplify multi-cloud environments while improving data visibility and control.
    • Learn how SASE reduces latency and operational complexity, delivering better performance for today’s hybrid workforce
  • 10:05
    Panel Discussion

    Keynote Panel: Securing AI and LLMs in the Cloud: Balancing Innovation and Risk

    Arrow
    • Ensuring compliance with regional data residency laws while training and hosting AI models in the cloud
    • Implementing granular identity and access management to secure LLM endpoints and APIs from unauthorised use
    • Protecting AI workflows from threats like misconfigured cloud storage, exposed credentials, and cloud-native attacks
    • Shared Responsibility Model: Clarifying the division of security responsibilities between cloud providers and organisations deploying AI and LLMs

    Speakers:

    Dennis Chung Chief Security Officer Microsoft

    Daryl Pereira CISO Asia-Pacific Google Cloud

    Frankie Shuai APAC CISO Financial Services Sector

    Dr. Yap Ghim Eng Director and Head of Practice, Data Engineering GovTech Singapore  

    Ruchika Arora SVP - Public Cloud Embedded Risk & Controls Citibank

  • 10:40
    Sponsor Presentation

    Topic to Be Confirmed

    Senior Representative - - Saviynt

    Arrow

    In today’s rapidly evolving digital landscape, organizations face increasing complexity in managing their IT and security environments. Fragmented infrastructures, diverse cloud services, and emerging cyber threats make it challenging to maintain control while ensuring seamless operations and security.

    This presentation, "From Complexity to Control: Regaining IT and security modernisation with Connectivity Cloud," will explore how Cloudflare's Connectivity Cloud offers a transformative solution to these challenges. By unifying and simplifying network, application, and security management across on-premises, public cloud, SaaS, and public internet environments, Connectivity Cloud enables organisations to regain control and drive IT modernisation.

    Attendees will gain insights into how Connectivity Cloud reduces complexity, enhances visibility, and fortifies security postures through integrated, cloud-native solutions. The session will also highlight real-world use cases, demonstrating how businesses have successfully leveraged Connectivity Cloud to streamline operations, protect their assets, and achieve strategic goals in an increasingly interconnected world.

    Join us to discover how you can take control of your IT and security landscape, reduce operational burdens, and pave the way for future-ready digital transformation.

  • 11:05

    Morning Coffee & Networking in the Exhibition Area

  • 11:35
    Panel Discussion

    Panel: Advanced Cloud Infrastructure and Security - Leading in the Next Era of Cloud Transformation

    Arrow
    • Implementing and scaling Zero Trust models to enhance security postures across complex cloud environments
    • AI and Machine Learning for Threat Detection: Leveraging advanced AI/ML technologies to proactively detect and mitigate sophisticated cloud security threats
    • Exploring automation tools and frameworks for continuous monitoring, incident response, and compliance across multi-cloud environments
    • How is Quantum changing Cloud Computing and the respective security measures around it?

    Speakers:

    Shian Hui Yah Lead Enterprise Architect StarHub

    Donald Ong Senior Security Consultant Cyber Security Agency of Singapore

    Han Neng Wong Senior Manager, IT & Cyber Security Charles and Keith Group

  • 12:10
    Sponsor Presentation

    Navigating the Regulatory Labyrinth: Cloud Security versus Traditional Cyber Security

    Arrow
    • Mapping out the unique regulatory challenges that come with the adoption of cloud security solutions
    • What are the fundamental differences between cloud security and on-premises cybersecurity strategies? How does this change your cloud security approach?
    • Uncovering best practices for managing data privacy and security in a multi-cloud environment
    • Gaining insights into the latest regulatory trends impacting cloud security landscapes
  • 12:35
    victor chin-2

    Cloud Security Alliance's Top Threats to Cloud Computing Report

    Victor Chin - Technical Information Security Officer (TISO) - Cloud Security Alliance

    Arrow
  • 13:00

    Buffet Lunch & Networking in the Exhibition Area

  • 14:00
    Panel Discussion

    Panel Discussion: Can Cloud Adoption Be an Enabler Instead of a Blocker with the Right Security Protocols?

    Arrow
    • Best practices for protecting data and maintaining compliance when migrating to the cloud
    • How can we proactively manage cloud security risks, from data breaches to misconfigurations?
    • Fostering an organisational mindset that prioritises security throughout cloud adoption
    • How can we overcome current challenges to leverage secure cloud platforms to enable agility, cost-efficiency, and scalability without compromising data protection

    Speakers:

    Kok Yew Toh Cyber and Tech Risk Nomura

    Yih Wen Tsai Senior Cybersecurity Architect PODIUM.io

  • 14:35
    Sponsor Presentation

    Leading Cost-Efficient Management of Multi-Cloud Environments

    Arrow
    • Has cloud brought in the ROI promised? How do we justify the security cost?
    • Optimising the security portion of cost efficiency of a multi-cloud environment
    • Ideas and best practices around cloud integration management
  • 15:00
    Sponsor Presentation

    Post-Incident Cloud: What Happens After the Breach?

    Arrow
    • What are the first 24–72 hours of a cloud breach response really like—and how should your cloud architecture support rapid containment and recovery?
    • How do organisations handle internal accountability, external disclosures, and cloud provider coordination after a major incident?
    • What long-term security and architectural changes are typically made after a breach—and what can others learn without waiting for a crisis?
  • 15:25

    Afternoon Tea & Networking in the Exhibition Area

  • 15:55
    Kritika-2

    Strategic Approaches to Strengthening Identity Management in Cloud Security Architectures

    Kritika Moyal - Cloud Security Specialist - Financial Services Sector

    Arrow
    • Evolving identity management strategies to support complex hybrid and multi-cloud environments
    • Integrating advanced authentication and authorisation frameworks for enhanced cloud security
    • Leveraging AI and machine learning to detect and prevent identity-related security breaches in real-time
    • Balancing user experience with security protocols in a constantly changing cloud landscape
  • 16:20
    Sponsor Presentation

    Managing Data Creep in the Cloud: Strategic Approaches to Mitigate Risk and Ensure Compliance

    Arrow
    • Addressing how data creep impacts storage, retrieval, and regulatory compliance in dynamic cloud environments
    • Identifying, tracking, and securing unstructured or unmanaged data across diverse cloud platforms
    • Best practices for automating security policies and access controls to handle expanding data footprints
    • Navigating cloud provider roles versus enterprise obligations to address data creep challenges effectively
  • 16:45

    Close of Cloud Security Singapore 2025