officiated by featuring international...
TRANSCRIPT
OFFICIATED BY
SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS
FEATURING INTERNATIONAL PRESENTATIONS FROM THOUGHT LEADERS AND GLOBAL ORGANISATIONS
Dato’ Dr. Mazlan YusoffDirector General Malaysian Administration Modernisation and Management Planning Unit (MAMPU)
Dato’ Dr Haji Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia
Susie Dorai RajDirector - ICT Consultancy Division Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)
Ts. Dr. Maslina Daud Senior Vice President, Cyber SecurityProactive Services DivisionCyberSecurity Malaysia
Shariffah Rashidah Syed OthmanDirector Cyber Security Policy and International Cooperation DivisionNational Cyber Security Agency (NACSA)
Dr Suhazimah Dzazali Deputy Director General – Information and Communication Technology Malaysian Administration Modernisation and Management Planning Unit (MAMPU)
Associate Prof. Ts. Dr. Nurhizam Safie Mohd SatarDeputy Dean (Industry & Community Partnership and Income generation)Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia
Harme Mohamed DirectorCyber Security Technology Division National Cyber Security Agency (NACSA)
Mark BowryRadio & Regional Business Lead – TechnologyAustralian Broadcasting Corporation
Klaus FelscheFormer Director – Analytics InnovationDepartment of Immigration and Border Protection
Dr Nalin Asanka Gamagedara ArachchilageLecturer - Cyber SecurityUniversity of New South Wales
Glenn AsheChief Technology Officer Australian Institute of Health and Welfare
Mohit SagarGroup Managing Director & Editor in ChiefOpenGov Asia
Dr Omar HatamlehChief Innovation Officer, Engineering NASA JSC National Aeronautics & Space Administration Executive Director Space Studies Program International Space University
Chris BuxtonChief Digital Officer Statistics New Zealand
Janek RozovChief Digital Officer and Government Deputy Chief Information Officer Ministry of Economic Affairs and Communications, Estonia
Aleksi GrymHead of Digitalisation Bank of Finland
Frans RijkersStrategic Advisor Innovation & Identity - National Office for Identity Data Ministry for the Interior and Kingdom Relations The Netherlands
Dr Andy ChunRegional Director - Technology Innovation, Prudential Corporation AsiaAdjunct Professor, City University of Hong Kong
Azih YusofICT Consultant, System DevelopmentMalaysian Administrative and Modernisation Planning Unit (MAMPU)
Siew Wai YoongSenior Manager - National Strategic InitiativeMIMOS Berhad
Harisfazillah JamelIndependent Open Source Software ConsultantMalaysian Open Source Community
Badrul Hisham BesriSenior DirectorTM One
Ahmad OsmanICT Consultant, Data Center ManagementMalaysian Administration Modernisation and ManagementPlanning Unit (MAMPU)
Dato’ Mohd Nor HassanChief ICT ConsultantMalaysian Administrative Modernisation and Management Planning Unit (MAMPU)
NEXT-GEN GOVERNMENT: EMBRACING INNOVATION AND DISRUPTION
Mohd Syukor AbdulInformation Technology OfficerSoutheast Asia Regional Centre for Counter-Terrorism (SEARCCT)Ministry of Foreign Affairs, Malaysia
Mohd Rafiq Mohamed HashimDirector - Information SecurityGiTN
Datuk Seri Dr. Ismail bin Hj. BakarChief Secretary to the Government of Malaysia
Brought to you by: In Collaboration with:
N. Bala SubramanyamChief Executive Officere-Pragati Authority, India
Asst. Prof. SutheeChantrapunth Deputy DirectorDefence Technology InstituteThailand
ExhibitorsPartners
®
Lead Partners Strategic Partners
EVENT AT A GLANCE DAY 1TUESDAY, 13TH NOVEMBER 2018
Arrival of Guests and DelegatesBreakfast
National Anthem
Doa Recital
Opening and Launching of PSCC 2018
Datuk Seri Dr. Ismail bin Hj. BakarChief Secretary to the Government of Malaysia
POWER TALKCIO’s of the Future: Generalists or Specialists?
MORNING COFFEE BREAK
KEYNOTE PRESENTATION – INTERNATIONAL A Future with Innovation
Dr Omar HatamlehNational Aeronautics & Space AdministrationInternational Space University
TECHNOLOGY CASE STUDY Open Source Innovation in Public Sector
Tan Meng WaiRed Hat
KEYNOTE PRESENTATION – INTERNATIONALAdopting “Cloud-First” Strategy to Boost Digital Economy and Deliver Digital Transformation
Mark BowryAustralian Broadcasting Corporation
TECHNOLOGY CASE STUDY Digital Government Development Strategy
John LockhartDigital Cities Projects Director, Asia Pacific SouthDell EMC
KEYNOTE PRESENTATION – INTERNATIONALConnected Government and Connected Citizens
N. Bala Subramanyame-Pragati Authority,India
TECHNOLOGY CASE STUDY Securing the Multi-Cloud
Eric LiewCisco
KEYNOTE PRESENTATION – INTERNATIONALHuman Factors in Cyber Security and Privacy
Dr Nalin Asanka Gamagedara ArachchilageUniversity of New South Wales, Australia
TECHNOLOGY CASE STUDY Fraud Prevention - Are you Doing Enough to Protect Your Business and Your Clients
Stefanus Natahusada Kaspersky Lab
THE GREAT DEBATEIs the Public Sector Ready to Let the Citizens Drive Decisions on Public Policies and Services?
LUNCH AND NETWORKING BREAK
8.00 am
8.45 am
9.00 am
9.50 am
10.25 am
11.10 am
10.55 am
11.25 am
11.40 am
11.55 pm
12.10 pm
12.40 pm
12.25 pm
12.55 pm
1.10 pm
2
EVENT AT A GLANCE DAY 1 - AFTERNOON STREAMED SESSIONSTUESDAY, 13TH NOVEMBER 2018
KEYNOTE PRESENTATIONProviding a Standardised, Secured and Innovative way to Produce and Consume Services – Case Study on Estonia’s X-Road Open Source Data Exchange Layer
KEYNOTE PRESENTATIONNew Zealand’s Integrated Data Infrastructure - Strategies, Implementation, Successes, Challenges and Road Ahead
KEYNOTE PRESENTATIONNeed For A Paradigm Shift In Cybersecurity
KEYNOTE PRESENTATIONTowards the Next Generation of Public Services – Cloud Enables Better Governance Models
3.15pm TECHNOLOGY CASE STUDY Empowering Government Transformation
3.15pm TECHNOLOGY CASE STUDY Understanding Threat Key to Good Cyber Defence
KEYNOTE PRESENTATIONCyber Security and Privacy in Mobile Wireless Environments
3.00pm KEYNOTE PRESENTATIONThe Digitisation of the Australian Broadcasting Corporation
3.00pm KEYNOTE PRESENTATIONFuture cyber security threats and challenges: Are you ready for what's coming?
KEYNOTE PRESENTATIONAdopting DigitalTransformation in Public Schools and Campuses
4.15pm TECHNOLOGY CASE STUDY The Advent of Autonomous Networks: Are you Ready to Give up Control?
4.30pm TECHNOLOGY CASE STUDY Avoid a Business Continuity Planning at Your Own Risk
4.30pm KEYNOTE PRESENTATIONDeveloping the Cyber Skills of the Future
4.15pm TECHNOLOGY CASE STUDY Cyber Exposure – A New Discipline for Reducing Cyber Risk
NETWORKING SESSION AND END OF DAY 1
END OF DAY 1 END OF DAY 1
PANEL DISCUSSION Secure Cloud Strategy - Enhance Collaboration, Improve Responsiveness and Increase Innovation Across the Public Service
3.45pm TECHNOLOGY CASE STUDY The Changing Face of Communications: How Cloud Changes Unified Communications
3.45pm TECHNOLOGY CASE STUDY Building a resilience security architecture with lower TCO
TECHNOLOGY CASE STUDY Are Truly Open Clouds possible?
2.45pm TECHNOLOGY CASE STUDY Digital Government Development Strategy – Cornerstone Building Blocks
2.45pm TECHNOLOGY CASE STUDY Threat Management & Defence: Our answer to Cybersecurity Risk Mitigation in an era of Complex Threats
KEYNOTE PRESENTATIONHow Governments are using Open Source to Serve the Citizens
4.00pm KEYNOTE PRESENTATIONThe Fourth Industrial Revolution - Challenges and Opportunities
4.00pm KEYNOTE PRESENTATIONA Security Rethink for Public Services: Plugging the Physical Breaches as these may pose even more risk to government computer systems than cyber intrusions, because physical access opens so many more channels of attack
TECHNOLOGY CASE STUDY Full Stack Cloud Solution, Inspires Digital Enterprises
3.30pm KEYNOTE PRESENTATIONThe Rise of Artificial Intelligence: What does the Future Look Like and What are We Seeing Now
3.30pm KEYNOTE PRESENTATIONHarnessing the Potential of Blockchain Technology to BoostCyber Security
Harnessing the Potential of Opensource , Sharing Latest Trends, Addressing Upcoming Challenges and Identifying new Opportunities for a Successful Digital Journey
Accelerating Government's Capability and Use of Digital Transformation Tools
Interconnectedness of Physical and Digital Security
DigiTech – Digital Transformation
SecureTech – Cyber & Physical Security
2.30 pm
2.50 pm
3.05 pm
3.20 pm
4.30 pm
4.45 pm
3.50 pm
4.10 pm
3.35 pm
3
EVENT AGENDA DAY 1TUESDAY, 13TH NOVEMBER 2018
9.00 am
4
POWER TALK
9.50 am
Opening and Launching of PSCC 2018
Redefining the Role of Chief Information Officers in the age of Transformation and Disruption – CIO’s as Enabler-in-ChiefCIO’s as the catalysts, integrators and orchestrators of the digital ageCultivating digital leadership mindsets and behaviours in your teamsEmphasising the needs of the customers (citizens,other agencies) first rather than technology itselfAligning the IT objectives with the business priorities of your organisations and creating a culture which embraces innovation and change
CIO’s of the Future: Generalists or Specialists?
8.00 am
Arrival of Guests and Delegates Breakfast
National AnthemDoa Recital
8.45 am
Moderator:
Panellists:
Mohit Sagar Group Managing Director & Editor in Chief OpenGov Asia
Aleksi GrymHead of Digitalisation Bank of Finland
Frans RijkersStrategic Advisor Innovation & IdentityNational Office for Identity DataMinistry for the Interior and Kingdom Relations, The Netherlands
Janek RozovChief Digital Officer & Government Deputy Chief Information OfficerMinistry of Economic Affairs and Communications, Estonia
Chris BuxtonChief Digital OfficerStatistics New Zealand
Datuk Seri Dr. Ismail bin Hj. BakarChief Secretary to the Government of Malaysia
5
11.10 am
TECHNOLOGY CASE STUDY
Open Source Innovation in Public Sector
How different governments across Asia has made a difference with open source solutionsWhy Enterprise open source is economical, powerful and capable of driving innovationHow It avoids lock-in and provides the freedom to explore and move when technology changes
A Future with Innovation
How technology will be disrupting the future economyRole of Artificial Intelligence and RoboticsEffect on future job markets
KEYNOTE PRESENTATION – INTERNATIONAL
10.55 am
With digitalisation, open source technology is gaining momentum and governments are increasingly embracing open source solutions. In open government initiatives, open source has led to greater citizen participation and contribution. Exciting new technology concepts such as containers, cloud computing, and big data offer multiple avenues for governments and federal agencies to improve operational efficiencies and mission performance.As the world moves faster and becomes more ambiguous, our ability to predict the future is becoming less and less. Particularly in the public sector where the project scope is more large-scale, a more agile approach is needed — onethat is not surprisingly very similar to the DevOps model for software development, and specifically to open source
This session will explore ideas and give examples of :
11.25 am
KEYNOTE PRESENTATION – INTERNATIONAL
Adopting “Cloud-First” Strategy to Boost Digital Economy and Deliver Digital Transformation
Understanding how cloud is fundamental to an organisation's digital transformationEnabling the government to rapidly deliver innovative public-sector services without incurring highlevels of capital expenditureWould compliance with regulations pose a significant impediment to cloud adoption
Dr Omar HatamlehChief Innovation Officer, Engineering NASA JSCNational Aeronautics & Space Administration USAExecutive Director – Space Studies ProgramInternational Space University
Mark BowryRadio & Regional Business Lead – TechnologyAustralian Broadcasting Corporation
Tan Meng Wai Director of Solution Architecture, Asian Growth and Emerging MarketsRed Hat, Asia Pacific
MORNING COFFEE BREAK
10.25 am
6
11.55 am
KEYNOTE PRESENTATION – INTERNATIONAL
Connected Government and Connected Citizens
11.40 am
TECHNOLOGY CASE STUDY
Digital Government Development Strategy
Driving public sector transformation and realise connected government with demonstrable benefitsUsing e-Governance as a tool to provide seamless integrated services to its citizensEnhancing citizen-centricity, responsiveness, inclusiveness and citizen engagement as essential ingredients of good governance
Building a resilient economy, secure and modern government in harmony embracing industry 4.0 technology Smarter digital edge and e-gov ICT modernisationBest practice government policy enables four distinctive critical areas of the “smart customs”
12.10 pm
TECHNOLOGY CASE STUDY
How you can enable holistic workload protection & forensics for Multi-Cloud data centers by providing the capability to reduce attack surface and proactive detection of anomalous behavioursIn this session you will learn how the solution enables these capabilities and allows you to build a more secure Multi-Cloud environment
Securing the Multi-Cloud
Many organisations are choosing multi-cloud as their cloud strategy, but few understand how to integrate visibilityand security into the cloud environment. How are workloads communicating? Who are they communicating with? One of the key challenges facing customers is how do they provide a secure infrastructure for applications without compromising agility
Join this session to hear about:
12.25 pm
KEYNOTE PRESENTATION – INTERNATIONAL
Understanding and changing behavioural influences to help protect infrastructure, cloud, network systems and dataDesigning and implementing educational tools, technology and methodologies to increase cyber security awarenessUsing gaming technology to help protect computer users against phishing attacks
Human Factors in Cyber Security and Privacy
Eric LiewData Center Product Sales ManagerCisco
Dr Nalin Asanka Gamagedara ArachchilageLecturer - Cyber SecurityUniversity of New South Wales
John LockhartDigital Cities Projects Director, Asia Pacific SouthDell EMC
N. Bala SubramanyamChief Executive Officere-Pragati Authority, India
7
12.40 pm
TECHNOLOGY CASE STUDY
PROPOSITION OPPOSITION
Fraud Prevention - Are you Doing Enough to Protect Your Business and Your Clients
Businesses have already gone far beyond traditional services providing their customers with access to their personal accounts via online channels and mobile devices. Digital transformation brings new opportunities, customers and of course, more revenue. On the other hand, it opens the doors to fraudsters with new sophisticated schemes, cross-channel attacks both on the user’s device and account.
Learn how to provide seamless user verification for legitimate clientsEnable cross-channel detection of money laundering and related activitiesDetect account takeovers
Tapping on to the power of social media, and the IoT to let the users’ preferences drive the content of policies and servicesHow would these initiatives impact public sector performance and broader policy outcomesWhat are its implications, risks and potentials for the public sector
THE GREAT DEBATE
Is the Public Sector Ready to Let the Citizens Drive Decisions on Public Policies and Services?
Let's debate on the pros and cons. What are its implications, risks and potentials?
12.55 pm
Moderator:
Stefanus Natahusada Presales Manager - SEAKaspersky Lab
Mohit Sagar Group Managing Director & Editor in Chief OpenGov Asia
Glenn Ashe Chief Technology OfficerAustralian Institute of Health and Welfare
1.10 pm
LUNCH AND NETWORKING BREAK
N. Bala SubramanyamChief Executive Officere-Pragati Authority, India
Dr Andy ChunRegional Director - Technology Innovation Prudential Corporation AsiaAdjunct Professor, City University of Hong Kong
Klaus Felsche Former Director – Analytics InnovationDepartment of Immigration and Border Protection
8
AFTERNOON STREAMED SESSIONS
STREAM 1
STREAM 2
DigiTech - Digital TransformationAccelerating Government's Capability and Use of Digital Transformation Tools DigiTech
SecureTech – Cyber & Physical SecurityInterconnectedness of Physical and Digital Security SecureTech
STREAM 3
2.30 pm
2.50 pm
Are Truly Open Clouds possible?
The industry is full of buzz around private cloud, public cloud, hybrid cloud & multi-cloud. Traditionally, governments have shied away from public clouds due to security and data residency concerns. However, much has evolved and hybrid cloud / multi-cloud architectures are becoming the norm
This session explores how open source help:
TECHNOLOGY CASE STUDY
To mitigate the risk of cloud silos as more and more workloads are moving into the cloudTechnologies like containers and serverless are also getting a lot of attention but are these silver bullets?
9
STREAM 1 |
KEYNOTE PRESENTATION
Deploying new and advanced security and privacy-preserving measuresFocusing on collaborative intrusion detection networks to allow intrusion detection system nodes to exchange data with each otherImportance of providing authentication, confidentiality, access control and non-repudiation
Cyber Security and Privacy in Mobile Wireless Environments
3.05 pm
KEYNOTE PRESENTATION – INTERNATIONAL
Providing a Standardised, Secured and Innovative Way to Produce and Consume Services – Case Study on Estonia’s X-Road Open Source Data Exchange Layer
Allowing nation’s various public and private sector e-service databases to link up and function in harmonyEnsuring confidentiality, integrity and interoperability between data exchange partiesFocusing on practical collaboration, sharing of experience and promoting innovation
Janek RozovChief Digital Officer & Government Deputy Chief Information OfficerMinistry of Economic Affairs and CommunicationsEstonia
Tan Meng Wai Director of Solution Architecture, Asian Growth and Emerging MarketsRed Hat, Asia Pacific
Ts. Dr. Maslina DaudSenior Vice President, Cyber SecurityProactive Services DivisionCyberSecurity Malaysia
Towards the Next Generation of Public Services – Cloud Enables Better Governance Models
Realising tangible operational and financial benefits and reduced costsImproving organisational agility and transformation in service deliveryDecreasing project roll out timeframe, administrative costs and improve asset utilisation
KEYNOTE PRESENTATION
3.20 pm
3.35 pm
TECHNOLOGY CASE STUDY
Risk vs Reward on the migration to OpenStackHow do decide on the OpenStack Cloud Solution to use How to mitigate the impact on the existing infrastructure
Full Stack Cloud Solution, Inspires Digital Enterprises
The OpenStack story is part of the larger global shift towards Cloud Systems and Solutions. As OpenStack is able to constantly evolve and constantly improve due of its open-source nature, it means that whenever situations change or needs arises, one can leverage on a large active community to quickly respond with innovative solutions:
10
PANEL DISCUSSION
Making risk-based decisions when applying cloud securityTaking full advantage of cloud automation practices and design services for the cloudCreate opportunities to reuse and share capabilities through increased collaboration
Secure Cloud Strategy - Enhance Collaboration, Improve Responsiveness and Increase InnovationAcross the Public Service
3.50 pm
Moderator:
Panellists:
Harisfazillah JamelIndependent Open Source Software ConsultantMalaysian Open Source Community
Associate Prof. Ts. Dr. Nurhizam Safie Mohd SatarDeputy Dean (Industry & Community Partnership and Income generation)Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia
Patrick Low Beng Chee Principal Architect Enterprise Business Group Southern Pacific RegionHuawei Technologies
Mohd Syukor AbdulInformation Technology OfficerSoutheast Asia Regional Centre for Counter-Terrorism(SEARCCT) Ministry of Foreign Affairs, Malaysia.
Ahmad OsmanICT Consultant, Data Center ManagementMalaysian Administration Modernisation and Management Planning Unit (MAMPU)
Mohd Rafiq Mohamed HashimDirector - Information Security GiTN
Azih YusofICT Consultant, System DevelopmentMalaysian Administrative and Modernisation Planning Unit(MAMPU)
11
KEYNOTE PRESENTATION
Education industry is amongst top 5 digitally disrupted hence generating notable trends in educationThere are challenges that hinders 21st CLD aspirationsTM perspective on Education Stakeholders’ journey helps to ensure the effectiveness of 21st CLD in public schools and campuses
Adopting Digital Transformation in Public Schools and Campuses
4.30 pm
4.45 pm
NETWORKING SESSION AND END OF DAY 1
4.10 pm
KEYNOTE PRESENTATION – INTERNATIONAL
How Governments are using Open Source to Serve the Citizens
Utilising open source as key driver of government digital transformationUsing open model to design and evaluate public policyEngaging with the citizens and participating in open source communities to solve citizens' problems
Badrul Hisham BesriSenior DirectorTM One
Frans RijkersStrategic Advisor Innovation & IdentityNational Office for Identity DataMinistry for the Interior and Kingdom Relations, The Netherlands
12
STREAM 2 | DigiTech
KEYNOTE PRESENTATION – INTERNATIONAL
2.30 pm
New Zealand’s Integrated Data Infrastructure - Strategies, Implementation, Successes, Challengesand Road Ahead
Integrated Data as an enabler for research, allowing insights into complex issues and offering opportunities across multiple government agenciesProviding the insights government agencies need to improve social and economic outcomes for New ZealandersSecuring the data whilst maintaining privacy and confidentiality
2.45 pm
TECHNOLOGY CASE STUDY
Digitally transforming and adaptation for future longevityRevisit the e-government designDigital city architecture – e-government, e-citizen, and integrated IOT
Digital Government Development Strategy – Cornerstone Building Blocks
The changes at the ABC and our move from one-way broadcast via AM radio to fully interacting with ouraudience on social mediaOur ongoing efforts to remain a trusted and relevant part of Australians lives, both here and overseasPioneering forms of content distribution
KEYNOTE PRESENTATION – INTERNATIONAL
The Digitisation of the Australian Broadcasting Corporation
From microphones to podcasts and iView, and everything in between. Discussing:
3.00 pm
Chris BuxtonChief Digital OfficerStatistics New Zealand
John LockhartDigital Cities Projects Director, Asia Pacific SouthDell EMC
Mark BowryRadio & Regional Business Lead – TechnologyAustralian Broadcasting Corporation
13
TECHNOLOGY CASE STUDY
3.15 pm
Empowering Government Transformation
Meet the demands of today’s modern citizens with a secure cloud platform that eliminates data silos & fragile P2P integrations
How a complete cloud offers agencies a modern approach to cutting-edge service delivery Meet evolving threats with cloud security Embracing modern technologies to engage with constituents
3.30 pm
What are the current trends in AI adoptionWhat are the promises of AI in the short term, over the next 3-5 years and then beyondWhat are some of the challenges ahead
Crisis Communication: The Power of Video During Uncertain TimesVideo collaboration promotes flexible schedules without the old struggles to communicate over email or phone Government agencies go digital to increase efficiency, and to improve collaboration
The Rise of Artificial Intelligence: What does the Future Look Like and What are We Seeing Now
The Changing Face of Communications: How Cloud Changes Unified Communications
Video conferencing transforms government by offering easy and affordable ways to collaborate
KEYNOTE PRESENTATION – INTERNATIONAL
3.45 pm
TECHNOLOGY CASE STUDY
4.00 pm
KEYNOTE PRESENTATION
Fourth Industrial Revolution - IoT and i4.0 : What is their relationshipOvercoming future issues & challengesWhat is the way forward
The Fourth Industrial Revolution - Challenges and Opportunities
Troy LatterDefence & National Security Innovation AdvisorOracle JAPAC
Dr Andy ChunRegional Director - Technology InnovationPrudential Corporation AsiaAdjunct Professor, City University of Hong Kong
Bryan LeeVideo Collaboration Business Lead & Category Manager (ASEAN)Logitech Video Collaboration
Siew Wai YoongSenior Manager - National Strategic InitiativeMIMOS Berhad
4.15 pm
TECHNOLOGY CASE STUDY
TECHNOLOGY CASE STUDY
Workflow Automation, to counter complexity & keep up with IoT growth Operational efficiency to monetise opportunities from Disparate Data Sources Designing and operating Networks of the Future
The Advent of Autonomous Networks: Are you Ready to Give up Control?
4.30 pm
END OF DAY 1
4.45 pm
14
Intent-based networking has the promise of aligning and enforcing network lifecycle management to business intent, while the ever- increasing need for network security may get some much-needed help from machine learning and artificial intelligence. Autonomous networks and workflow automation technologies can help us keep up with the growth of IoT and complexity of modern networks, but are we ready to give up control? Network analytics and business intelligence can deliver operational efficiencies and monetization opportunities for enterprises by bringing together insights from the vast amount of disparate data sources scattered throughout the network. The session will look at how we may design, deploy and operate networks in the future
Avoid a Business Continuity Planning at Your Own Risk
Most businesses have some sort of plan for how they would respond to a major disruption or attack, however, very few are realistically prepared. At most organisation, these plans are fragmentary, primitive, and don’t account for all possible situations and causes. This is unsafe, and possibly due to ignorance. No organisation is invincible or exempt from outside attacks. As CIO, it’s up to you to:
Develop a careful and comprehensive business continuity plan that ensures your organisation is not ruined and demolished under the weight of uncontrollable circumstancesImplement robust Business continuity practices in your organisation to ensure stability and future health of your organisationSecuring the future of your business and preparing for uncontrollable circumstances
Andrew KerneboneRegional SE DirectorExtreme Networks
Kavitha MuthySecurity Architect of Governance, Risk Management and CompliancePrestariang Systems
STREAM 3 | SecureTech
2.30 pm
KEYNOTE PRESENTATION – INTERNATIONAL
KEYNOTE PRESENTATION
Need For A Paradigm Shift In Cybersecurity
Developing practical techniques in offensive and defensive cyber operationsWhat are the best practices in mitigating reputational and financial risks?Building Cyber-resilience as an enterprise risk management strategyAdopting multi stakeholder approach to face next tier, multifaceted cyberthreats successfully
With level of sophistication of cyberthreats rising, governments and businesses need to up their ante, how do wework towards decreasing our vulnerabilities?
2.45 pm
TECHNOLOGY CASE STUDY
How do we predict the exact nature of future threats and how to combat them?Are the legacy governmental and regulatory policies proving to be counterproductive?Importance of collaboration between government and the private sector to deal with the scope and scale of cyber threats
Future Cyber Security Threats and Challenges : Are you Ready for What's Coming ?
3.00 pm
15
Threat Management & Defence: Our answer to Cybersecurity Risk Mitigation in an era of Complex Threats
As more and more organisations embark on their digital transformation, so too have the threat actors. We are in the era of complex threats
Predict – Know the threats and threat actors before they attack youDetection – Continuous monitoring for rapid threat discoveryRespond – How can you effectively investigate and respond to the attack if it hits
Dr Nalin Asanka Gamagedara ArachchilageLecturer - Cyber SecurityUniversity of New South Wales
Shariffah Rashidah Syed OthmanDirector Cyber Security Policy and International Cooperation DivisionNational Cyber Security Agency (NACSA)
Stefanus Natahusada Presales Manager - SEAKaspersky Lab
3.15 pm
TECHNOLOGY CASE STUDY
Understanding Threat Key to Good Cyber Defence
It is necessary to understand the nature of the threat so as to be able to take appropriate defensive measuresGood defence can mitigate a lot of the dangers that cyber criminals poseIt’s imperative to understand hackers (or threat actors) are not one homogenous group , various motives drive different groups of hackers and their targets and modus operandi vary
One indirect result of the SingHealth Cyberbreach in which digital records of 1.5 million patients were stolen has been that there is now growing realisation within South-east Asia that data breaches and cyber attacks do not happen only in the West. Feedback from security researchers suggest that in South-east Asia, there has been, till now, less awareness about the nature of the global cyberthreat. The SingHealth breach has in fact helped to highlight the danger to the region
3.30 pm
KEYNOTE PRESENTATION – INTERNATIONAL
16
Harnessing the Potential of Blockchain Technology to Boost Cyber Security
What is blockchain and how does it work?How blockchain can help protect data from cyber attacks? Blockchain applications and how to apply in military usages
3.45 pm
TECHNOLOGY CASE STUDY
Building a resilience security architecture with lower TCO
Improving your security architecture with added network resiliencyPreparing for the next Generation network architectureHybrid Cloud security monitoring blueprint
As the volume and speed of network data increases, security tools are unable to keep up, resulting in security tool sprawl, performance degradation, inefficiencies and unnecessary expenditures. All of this leads to increased time to threat detection and response and a higher risk of a breach – despite massive spending on security tools
The solution is to build an efficient network security architecture that copes with increasing network speeds today and in the future, improving the return on investment of security tools while reducing complexity, cost and tool overload across physical, virtual or cloud infrastructure
Security tools get the right data at the right time and speed. Threats are more visible across cloud, hybrid and on-premises environments, resources can be deployed faster and security tools perform at higher levels
Mandar Bale Solutions ArchitectFireEye, Asia Pacific
Gwen LeeCountry Manager - South East AsiaGigamon
Asst. Prof. Suthee ChantrapunthDeputy DirectorDefence Technology InstituteThailand
4.00 pm
4.15 pm
END OF DAY 1
4.45 pm
17
KEYNOTE PRESENTATION
TECHNOLOGY CASE STUDY
Exploring ways to better link cyber and physical defenceDetecting physical manifestations of cyber events to prevent infiltration in information and communication technologies, systems, and networksAdopting micro-segmentation as a multi-layered defensive mechanism
A Security Rethink for Public Services: Plugging the Physical Breaches as these may pose even morerisk to government computer systems than cyber intrusions, because physical access opens so manymore channels of attack
4.30 pm
KEYNOTE PRESENTATION
Cyber Exposure – A New Discipline for Reducing Cyber Risk
Today’s CISO is under more pressure than ever to keep the organisation secure, but is the only measure of ‘success’ the avoidance of a data breach and bad press? How can we measure the effectiveness of our Cyber Security programs and know if our security posture is getting better or worse over time?Learn how you can best understand and reduce your organisation’s Cyber Risk and gain solid benchmarkinginformation about the effectiveness of your cyber security program against those of your industry peers
Digital transformation and an explosion of security data have created massive blind spots around cyber risk. Yet that overload of information has made it nearly impossible to know what to focus on. Cyber Exposure, a new discipline built on vulnerability management, is helping organisations measure and reduce cyber risk by providing visibility across assets and insight on what matters most. Learn how Cyber Exposure is helping organisations prioritise effectively to reduce cyber risk
Developing the Cyber Skills of the Future
Creating centres for cyber excellence within your agenciesUpskilling existing staff to meet the skills gapCoordinating with universities to provide the future workforce
Dato’ Mohd Nor HassanChief ICT ConsultantMalaysian Administrative Modernisation and Management Planning Unit(MAMPU)
Dato’ Dr. Haji Amirudin Abdul WahabChief Executive OfficerCyberSecurity Malaysia
Sugiarto KohRegional Director - Southeast AsiaTenable
8.00 am
Arrival of Guests and Delegates Breakfast
EVENT AGENDA DAY 2WEDNESDAY, 14TH NOVEMBER 2018
18
9.00 am
9.15 am
Agencies are requiring enhanced security, but are we doing enough to enable a modern workforce to function securely in the digital age?Examining some of the recent attacks and what the response to these have beenDeveloping and implementing an effective privacy and data protectioncompliance program while reducing data breach and cybersecurity risks
Cyber Security and Data Privacy in the Digital Age – What Does The Future Look Like and What DoWe Need To Do?
Cyber Security and Data Privacy has a symbiotic relationship. What can agencies do to protect themselves from thethreats of data breach and cyber threats in the digital age?
Moderator:
Panellists:
Keynote PresentationResponding to the Digital Expectations of Citizens: Innovating Public Service Delivery
PANEL DISCUSSION
Dr Suhazimah Dzazali Deputy Director General – Information and Communication Technology Malaysian Administration Modernisation and Management Planning Unit (MAMPU)
Mohit Sagar Group Managing Director & Editor in Chief OpenGov Asia
Dato’ Dr. Haji Amirudin Abdul WahabChief Executive OfficerCyberSecurity Malaysia
Dr Nalin Asanka Gamagedara ArachchilageLecturer - Cyber SecurityUniversity of New South Wales
Harme MohamedDirector Cyber Security Technology Division National Cyber Security Agency (NACSA)
Susie Dorai RajDirector - ICT Consultancy Division Malaysian Administrative Modernisation and Management Planning Unit(MAMPU)
EVENT AGENDA DAY 2WEDNESDAY, 14TH NOVEMBER 2018
19
Limitations of SMEs in doing business due to lack of knowledge and applications using technology – how it’s deterring SMEs to propel to greater heightsChallenges: Why SMEs are reluctant in using technology and how current government initiatives are not directly addressing this matterSuggestions for improvement
Digitising the SMEs: The Pivotal Role of The Government and Tech Providers
9.40 am
TECHNOLOGY CASE STUDY
KEYNOTE PRESENTATION – INTERNATIONAL
9.55 am
Digital Identity in The Blockchain Era – Creating a ‘Self-Sovereign’ Digital Identity
Building a digital ecosystem and discussing how collaboration is key to delivering truly citizen-centric servicesProviding an executable trust framework for governments to implement citizen identification whilst protecting and preserving the privacyEmpowering citizens to control the formalisation of their identity, manage their digital personas, and actively monetise their personal data
10.10 am
TECHNOLOGY CASE STUDY
Packet Intelligence for Actionable Network Visibility & Security
Thorough Network Forensic where The Truth Is in the PacketsSustainability & Scalability for Business Planning & Continuity Complete Visibility via SNMP, Netflow & Packet Inspection
In Today’s Converging IT Ecosystem, Why NPM is Critical Across Wired, Wireless & Unified Communications Operations
Ms Nuraslina Zainal AbidinGroup Managing Director Genaxis Sdn Bhd CEO Innovations Associates Consulting
Frans RijkersStrategic Advisor Innovation & IdentityNational Office for Identity DataMinistry for the Interior and Kingdom Relations, The Netherlands
Mark Kirwan Head of Sales, EMEASavvius
10.25 am
NETWORKING AND MORNING COFFEE
11.10 am
TECHNOLOGY CASE STUDY
KEYNOTE PRESENTATION – INTERNATIONAL
10.55 am
Estonia's Experience in the Digital Transformation of Government Services
Responsibility for service qualityService catalogue mapping and management toolService quality basic indicators
20
KEYNOTE PRESENTATION – INTERNATIONAL
11.25 am
Digitalisation in Finance and Road to Cashless Society – A Finnish Experience
Embracing innovation and disruptionDeploying new technology to improve the quality, pricing, and convenience of productsGenerating a better financial system for customers and citizens in the future
Walk through the emerging use of these ML/AI techniques in DC operations and Usage beyond DC in wired and wireless networks
Data Centre of the Future
ML/AI driven Network Planning & Operations
Enterprise IT architects are facing a deluge of information from DC and Cloud infrastructure and associated tools which makes it humanly impossible to draw quick insights and be proactive in their operations. Innovations in ML/AI based approaches can help Enterprise IT to regain control of their operations
This session will:
Janek RozovChief Digital Officer & Government Deputy Chief Information OfficerMinistry of Economic Affairs and CommunicationsEstonia
Andrew KerneboneRegional SE DirectorExtreme Networks
Today, in Estonia’s public sector we have a complicated overview of the services that the state offers. This entails for the end user time and money spent on finding out who, where and how offers certain services. The task of the service owner is the search for possibilities to make services more convenient, financially rational and the realisation of these goals, based on the value generated through the provision of services. We in Estonia have created the Public Service Portfolio with more than 1500 public services described both in human and machine readable format. Each service with each channel has fields for mapping KPIs. In the future state will get an overview of the quality and net price of the services it offers
Aleksi GrymHead of Digitalisation Bank of Finland
21
Proposition: Opposition:
12.00 pm
Closing Remarks
12.10 pm
LEARNING JOURNEY COMPETITION
Moderator:
Glenn Ashe Chief Technology OfficerAustralian Institute of Health and Welfare
Dr Omar HatamlehChief Innovation Officer, Engineering NASA JSC National Aeronautics & Space Administration Executive Director Space Studies Program International Space University
Klaus Felsche Former Director – Analytics InnovationDepartment of Immigration and Border Protection
Dato’ Dr. Mazlan YusoffDirector GeneralMalaysian Administrative Modernisation and Management Planning Unit (MAMPU)
12.45 pm
NETWORKING LUNCH AND END OF DAY 2
DEBATE SESSION
Future of AI – Boon or Doom?
11.40 am
Stephen Hawking had said that "The development of full artificial intelligence could spell the end of the human race.”
Do you agree? Let us debate this
Chris BuxtonChief Digital OfficerStatistics New Zealand
Mark BowryRadio & Regional Business Lead – TechnologyAustralian Broadcasting Corporation