Cloud computing is one of the key drivers for achieving an organization’s mission and is finally becoming a new norm. As a result, cloud spending will continue to grow, making it the top investment area for enterprises. But the complexity of cloud can be the perfect place for attackers to hide, offering concealment as a launchpad for further harm. Unawareness of the threats, risks and vulnerabilities makes it more challenging to protect organizations from data loss. Sessions on this day will provide needed context to assist organizations in making educated risk management decisions regarding their cloud adoption strategies.
Welcome Remarks & Keynote: Why AI Needs Cyber Security Urgently?
Traditionally, cyber security systems have been adding AI capabilities to detect unknown malware, zero day attacks and to analyse logs to detect abnormalities to discover frauds, insider attacks and denial of service malfunctions. However, these sophisticated AI systems are themselves attackable via Adversarial Examples. For instance, one could bypass an email anti-phishing…
Disrupting yourself and your Adversaries in the cloud
As organisations lift and shift workloads into the cloud they are required to not only protect themselves from external threats but also from internal disruptions such as multi cloud deployment sprawl, de-centralised management of these cloud services and the most damaging lack of centralised security and visibility. As we lean forward into…
State of Cybersecurity 2020: Cloud Security Threats and Security Practices
For the last 3+ years ISACA has been conducting member surveys around the world on State of Cybersecurity. The latest report based on survey conducted in Q4 2019 focuses on the threat landscape, the measures security professionals employ to keep their enterprises safe, and key trends and themes in the practice of…
Modeling Against the Top Threats in Cloud
Since 2010, the CSA Top Threats report has revealed major security concerns in cloud computing from top industry professionals. John shares how the report can be used to protect against the latest attacks and high profile breaches of the past year. Leveraging the latest Deep Dive attack model, popular breaches are broken…
About the Presenters on Day 1
Jim Reavis, Co-Founder & CEO, CSA
For many years, Jim Reavis has worked in the information security industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about emerging security trends have been published and presented widely throughout the industry and have influenced many. Jim is helping shape the future of information security and related technology industries as co-founder, CEO and driving force of the Cloud Security Alliance. Jim has been named as one of the Top 10 cloud computing leaders by SearchCloudComputing.com.
Jim is the President of Reavis Consulting Group, LLC, where he advises security companies, governments, large enterprises and other organizations on the implications of new trends such as Cloud, Mobility, Internet of Things and how to take advantage of them. Jim founded SecurityPortal, the Internet’s largest website devoted to information security in 1998, and guided it until a successful exit in 2000. Jim has been an advisor on the launch of many industry ventures that have achieved a successful M&A exit or IPO. Jim is widely quoted in the press and has worked with hundreds of corporations on their information security strategy and technology roadmap. Jim has a background in networking technologies, marketing, product management and systems integration. Jim received a B.A. in Business Administration / Computer Science from Western Washington University in 1987 and formerly served on WWU’s alumni board. Jim was recognized as a WWU Distinguished Alumnus in 2015. In 2016, Jim was inducted into the Information Systems Security Association (ISSA) Hall of Fame.
Prof. Yu Chien Siang, Chief Innovation & Trust Officer, Amaris AI
Prof Yu Chien Siang is the Chief Innovation & Trust Officer for Amaris AI, an AI startup that offers full stack AI as a service. He was the Chief Innovation Officer (CIO) of a department in the Ministry of Home Affairs and later of Certis Cisco. In this role, he pioneered and developed new AI systems, i.e. embedded AI for low power and low cost edge systems, led a Malware and IoT Security Lab, as well as a Robotics and Drones Lab. Prior to this, he was the most senior Computer Security Consultant at the Singapore government. He was awarded the Carl Duisberg Gesellschaft Scholarship to pursue his studies at a German university and graduated as a Data Systems Engineer. During his study, he received training at the Siemens Research Laboratory and IBM R&D Laboratory in Boblingen. He has been working in the Civil Service since 1981 and was awarded National Day Honours, the Public Administration Medal (Silver) in 1993 and (Silver) Bar in 2004. He was also given the Cyber Security Hall of Fame in 2018, an inaugural professional category award from AISP and supported by the Cyber Security Agency.
He has been active in the fields of IT leadership, innovation development and its related cultural transformation and IT Security for more than 30 years. During this time, he led numerous national-level IT projects in information security such as the Electronic Road Pricing (ERP), Standard Operating Environment (SOE) etc., IoT security via the ANSES project and homeland security, developing workflow and people identification operational systems. He was instrumental in evolving many advanced systems architecture used in the public service and the fundamental mechanisms required for their large systems rollout. He invented unique low cost smart card readers, strong cryptographic systems, more efficient protocols and fault tolerant designs. He was also a pioneer in robotics cum drone and AI hacking and new ideas like adaptive security (Liquid Defence) and Security by Design.
In addition, he teaches a series of AI courses, titled Eureka!AI for C-suite and modern cyber security for CISOs at NUS and the undergraduate course on “Introduction to Cyber Crime”, but now renamed as “Introduction to Cyber Security” in his capacity as Adjunct Associate Professor at the Department of Mathematics of the National University of Singapore. He was an ex-President of the Singapore Microcomputer Society, a pioneer in the exploitation of microcomputers and a regular speaker at government events, being the founder of the Governmentware show. He has also been one of the judges for the RSA Innovation Sandbox since 2014. He is currently a member of ITSC, worked on ISO security standards and was involved in the early days of the AISP.
Mickey Perre, Senior Solution Architect – Security Specialist
Mickey Perre is as a Security Specialist working at Elastic with a long and varied background in Cyber and IT. He has worked across multiple industries including Legal, Gambling, Healthcare and Government. Working for a search company with a varied customer base Mickey has a unique perspective of challenges that are faced by modern organisations.
Phoram Mehta, President, ISACA Singapore Chapter
Phoram Mehta currently serves as the President of ISACA Singapore and has been a board member for 5+ years. He has served on global ISACA’s global committees on CISM and CRISC certifications and is an active participant in SG, ASEAN and APAC level industry forums on Cybersecurity related topics.
Mr.Mehta is the CISO for PayPal’s Asia-Pacific region. A seasoned professional and technical leader with over two decades in Information Security, Mr. Mehta has been instrumental in building secure technology solutions for multiple companies across a spectrum of sectors including financial services, healthcare, telecommunication, and government in North America and Asia-Pacific regions.
Mr. Mehta also oversees PayPal’s Global Tech Risk Mgmt and Infosec Research and Outreach initiatives and advises cybersecurity startups in Singapore, India and US.
John Yeoh, Global VP of Research, CSA
John Yeoh is currently working in the capacity of Global Vice President at Cloud Security Alliance (CSA). He has previously held the profiles of Director of Research, Senior Research Analyst and Acting Research Director at the firm. John is also a Technical Advisory Council Member for the Federation Communications Commission. He is an alumnus of the prestigious Massachusetts Institute of Technology (MIT) and University of Washington.