BROUGHT TO YOU BY

EXCLUSIVE MEDIA PARTNER

Singapore

Thursday, 15 August 2019

Four Points by Sheraton

AGENDA

REGISTRATION CLOSED

Melbourne

Thursday, 22 August 2019

Grand Hyatt

AGENDA

REGISTRATION CLOSED

According to recent reports, 81% of hacking-related breaches leverage stolen or weak passwords. This is consistent with other breaches that have hit the Asia Pacific region in recent years. Singapore Health, Cathay Pacific and the Australian Parliament are just recent examples of how unprotected privilege credentials can be exploited to gain access to sensitive data.

Privileged accounts and credentials are the most commonly targeted point of entry for cybercriminals, and the risk surface is growing significantly. With the development of hybrid infrastructures, virtualisation, and cloud, there are more privileged accounts than ever for attackers to target. Asia Pacific is a significant target for cyber threats due to its geographical region and hub for global commerce.

Taking place in Singapore and Melbourne, the "Privileged Access Forum: Defending Against Targeted Attacks" are designed for business and technical drivers of the cybersecurity program within government and enterprise organisations. With a dynamic mix of plenary sessions and interactive panel discussions, these half-day conferences will offer you the opportunity to hear from prominent industry experts and exchange best practices with fellow IT security professionals from across industries.

Registrations are by-invitation only and are kindly limited to government and corporate teams currently tasked with working in information security or information technology.

MEET OUR GUEST SPEAKERS

Shane Read

Chief Information Security Officer,
Nobel Group,
HONG KONG

Morey Haber

Chief Technology Officer & Chief Information Security Officer, BeyondTrust,
USA

Gene Ng

Regional Vice President - APJ, BeyondTrust,
SINGAPORE

ANMOL SINGH

Cybersecurity Strategist and Advisor (former Gartner)
GERMANY

WHY YOU CAN'T AFFORD TO MISS IT

Real Case Studies & Invaluable Information

Hear from our international speakers and stay up-to-date with what’s happening in the IT security industry around the world and in Asia Pacific.

Watch a Live Hack!

How cyber hackers infiltrate an organisation’s network and exploit privileged credentials to move laterally and gain access to sensitive information.

Privileged Account Security

Understand why global industry analysts like Gartner recommend Privilege Access Management as the number one priority for CISOs, and a critical part of the IT security strategy.

BROUGHT TO YOU BY

EXCLUSIVE MEDIA PARTNER

 

SINGAPORE

Thursday, 15 August 2019
Four Points by Sheraton | 382 Havelock Rd, Singapore 169629

9:00 AM – Guest arrival and breakfast

9:30 AM – Opening Address: The Changing Landscape of Cyber Security in APJ
(by Gene Ng, Regional VP – APJ, BeyondTrust)

  • The latest statistics about cyber risks in APJ
  • Going beyond compliance with PAM

9:45 AM – Privileged Access Management: Key Trends and Takeaways, 2019
(by Anmol Singh, Cybersecurity Strategist and Advisor)

  • The key trends, adoption patterns and use-cases of PAM
  • Deriving the most out of your PAM deployment(s)

10:25 AM – 12 Steps to Building Effective Cyber-Defense Strategies to Protect Organisations
(by Morey Haber, Global CTO & CISO, BeyondTrust)

  • How identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack. Understand a 12-step implementation plan for a successful privileged access management program

10:55 AM – Coffee break

11:15 AM – Live Hack: Lessons Learnt from Recent High Profile Breaches
(by Perry Chu, Security Architect)

  • Watch a live “pass the hash” hack and learn how to block it using Endpoint Privilege Management & Password Management
  • How PAM controls can help you to prevent your organisation from becoming the next victim

11:45 AM – Just-in-Time (JIT) Privileged Access – Why It Is The Next Big Step In Risk Reduction & How To Implement It
(by Morey Haber, Global CTO & CISO)

  • Understanding Just-In-Time PAM for DevSecOps
  • Why controlling privileged access plus enhanced policies with behavioral data is so important

12:15 PM – “Why are we still getting hacked”
(by Shane Read, CISO, Noble Group)

  • War Stories from the Field – How my cyber security teams recovered from cyberattacks in 2 different occasions
  • Roundtable Workshop

12:45 PM – Panel Discussion with IT Security Executives (Moderator Jane Lo, MySecurity Media Correspondent)

  • Q &A with guest executives from high profile enterprises in APJ about how they can manage and secure privileged and remote users

1:15 PM – Final Remarks and Key Takeaways (Jane Lo, MySecurity Media Correspondent & Gene Ng, Regional VP - APJ)

1:25 PM – Networking Lunch

  • Networking drinks followed by a three-course meal

3:00 PM - Event close

REGISTRATION CLOSED
 

MELBOURNE

Thursday, 22 August 2019

Grand Hyatt Melbourne | 123 Collins St, Melbourne VIC 3000

1:30 PM – Guest arrival and coffee

2:00 PM – Opening Address: The Changing Landscape of Cyber Security in APJ (by Gene Ng, Regional VP – APJ, BeyondTrust)

  • The latest statistics about cyber risks in APJ
  • Going beyond compliance with PAM

2:15 PM – Privileged Access Management: Key Trends and Takeaways, 2019 (by Anmol Singh, Cybersecurity Strategist and Advisor)

  • The key trends, adoption patterns and use-cases of PAM
  • Deriving the most out of your PAM deployment(s)

2:55 PM – 12 Steps to Building Effective Cyber-Defense Strategies to Protect Organisations (by Morey Haber, Global CTO & CISO, BeyondTrust)

  • How identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack
  • Understand a 12-step implementation plan for a successful privileged access management program

3:25 PM – Afternoon break

3:55 PM – Live Hack: Lessons Learnt from Recent High Profile Breaches (by Perry Chu, Security Architect)

  • Watch a live “pass the hash” hack and learn how to block it using Endpoint Privilege Management & Password Management
  • How PAM controls can help you to prevent your organisation from becoming the next victim

4:25 PM – Just-in-Time (JIT) Privileged Access – Why It Is The Next Big Step In Risk Reduction & How To Implement It (by Morey Haber, Global CTO & CISO)

  • Understanding Just-In-Time PAM for DevSecOps
  • Why controlling privileged access plus enhanced policies with behavioural data is so important

4:55 PM – Key findings from the 2019 Microsoft Vulnerabilities Report (by Guest Speaker)

  • The 2019 Microsoft Vulnerabilities Report compiles every Microsoft security bulletin from the past 12 months, analyses the trends, and includes viewpoints from security experts.

5:15 PM – Panel Discussion with IT Security Executives (Chris Cubbage, MySecurity Media Director)

  • Q &A with guest executives from high profile enterprises in APJ about how they can manage and secure privileged and remote users

5:45 PM – Final Remarks and Key Takeaways (by Chris Cubbage, MySecurity Media Director & Gene Ng, Regional VP – APJ)

6:00 PM – Networking Drinks followed by 3 Course Dinner

  • Networking drinks followed by a three-course meal

8:00 PM - Event close

IMPORTANT DISCLAIMER

Flights and accommodation shall be at each attendee’s own cost.

As the organiser, we will manage the event in good faith and in conformance with industry standards. Under no circumstances will the organiser be held responsible or liable in any way for any claims, damages, losses, expenses, costs or liabilities whatsoever arising from any case of force majeure, unlawful mass protest, riots, theft, natural disasters and further unforeseen circumstances. If you have other questions, please email us at marketing@beyondtrust.com.

To the extent permitted by applicable law, except for any damages arising out of BeyondTrust’s gross negligence, wilful misconduct or fraudulent act, in no event will BeyondTrust’s liability arising out of or related to this event exceed usd$20,000 per participant. To the extent permitted by applicable law, beyondtrust will have no liability to participant for any lost profits or revenues or loss of data or for any indirect, special, incidental, consequential or punitive damages arising out of, or in connection with the event, however caused, whether in contract, tort or under any other theory of liability, and whether or not such party has been advised of the possibility of such damages.

BeyondTrust’s policy is to comply with all applicable anti-corruption laws and regulations in all countries in which it does business, and we believe that this event and the hospitality offered by us as part of it are reasonable and appropriate as part of our business relationship. We acknowledge that our customers and partners may have similar policies/corporate code of ethics. We will consider your acceptance of our invitation and participation at the event as an acknowledgement that it is within your company’s policy limits and/or that you have received appropriate authorisation from your company. If your company prohibits your participation or limits the expenses that BeyondTrust may cover in any manner in this event, please let us know in advance and we will cooperate in complying with your company’s policies.