officiated by featuring international...

21
OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING INTERNATIONAL PRESENTATIONS FROM THOUGHT LEADERS AND GLOBAL ORGANISATIONS Dato’ Dr. Mazlan Yusoff Director General Malaysian Administration Modernisation and Management Planning Unit (MAMPU) Dato’ Dr Haji Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia Susie Dorai Raj Director - ICT Consultancy Division Malaysian Administrative Modernisation and Management Planning Unit (MAMPU) Ts. Dr. Maslina Daud Senior Vice President, Cyber Security Proactive Services Division CyberSecurity Malaysia Shariffah Rashidah Syed Othman Director Cyber Security Policy and International Cooperation Division National Cyber Security Agency (NACSA) Dr Suhazimah Dzazali Deputy Director General – Information and Communication Technology Malaysian Administration Modernisation and Management Planning Unit (MAMPU) Associate Prof. Ts. Dr. Nurhizam Safie Mohd Satar Deputy Dean (Industry & Community Partnership and Income generation) Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Harme Mohamed Director Cyber Security Technology Division National Cyber Security Agency (NACSA) Mark Bowry Radio & Regional Business Lead – Technology Australian Broadcasting Corporation Klaus Felsche Former Director – Analytics Innovation Department of Immigration and Border Protection Dr Nalin Asanka Gamagedara Arachchilage Lecturer - Cyber Security University of New South Wales Glenn Ashe Chief Technology Officer Australian Institute of Health and Welfare Mohit Sagar Group Managing Director & Editor in Chief OpenGov Asia Dr Omar Hatamleh Chief Innovation Officer, Engineering NASA JSC National Aeronautics & Space Administration Executive Director Space Studies Program International Space University Chris Buxton Chief Digital Officer Statistics New Zealand Janek Rozov Chief Digital Officer and Government Deputy Chief Information Officer Ministry of Economic Affairs and Communications, Estonia Aleksi Grym Head of Digitalisation Bank of Finland Frans Rijkers Strategic Advisor Innovation & Identity - National Office for Identity Data Ministry for the Interior and Kingdom Relations The Netherlands Dr Andy Chun Regional Director - Technology Innovation, Prudential Corporation Asia Adjunct Professor, City University of Hong Kong Azih Yusof ICT Consultant, System Development Malaysian Administrative and Modernisation Planning Unit (MAMPU) Siew Wai Yoong Senior Manager - National Strategic Initiative MIMOS Berhad Harisfazillah Jamel Independent Open Source Software Consultant Malaysian Open Source Community Badrul Hisham Besri Senior Director TM One Ahmad Osman ICT Consultant, Data Center Management Malaysian Administration Modernisation and Management Planning Unit (MAMPU) Dato’ Mohd Nor Hassan Chief ICT Consultant Malaysian Administrative Modernisation and Management Planning Unit (MAMPU) NEXT-GEN GOVERNMENT: EMBRACING INNOVATION AND DISRUPTION Mohd Syukor Abdul Information Technology Officer Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT) Ministry of Foreign Affairs, Malaysia Mohd Rafiq Mohamed Hashim Director - Information Security GiTN Datuk Seri Dr. Ismail bin Hj. Bakar Chief Secretary to the Government of Malaysia Brought to you by: In Collaboration with: N. Bala Subramanyam Chief Executive Officer e-Pragati Authority, India Asst. Prof. Suthee Chantrapunth Deputy Director Defence Technology Institute Thailand Exhibitors Partners Lead Partners Strategic Partners

Upload: others

Post on 06-Jun-2020

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

OFFICIATED BY

SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS

FEATURING INTERNATIONAL PRESENTATIONS FROM THOUGHT LEADERS AND GLOBAL ORGANISATIONS

Dato’ Dr. Mazlan YusoffDirector General Malaysian Administration Modernisation and Management Planning Unit (MAMPU)

Dato’ Dr Haji Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia

Susie Dorai RajDirector - ICT Consultancy Division Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)

Ts. Dr. Maslina Daud Senior Vice President, Cyber SecurityProactive Services DivisionCyberSecurity Malaysia

Shariffah Rashidah Syed OthmanDirector Cyber Security Policy and International Cooperation DivisionNational Cyber Security Agency (NACSA)

Dr Suhazimah Dzazali Deputy Director General – Information and Communication Technology Malaysian Administration Modernisation and Management Planning Unit (MAMPU)

Associate Prof. Ts. Dr. Nurhizam Safie Mohd SatarDeputy Dean (Industry & Community Partnership and Income generation)Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia

Harme Mohamed DirectorCyber Security Technology Division National Cyber Security Agency (NACSA)

Mark BowryRadio & Regional Business Lead – TechnologyAustralian Broadcasting Corporation

Klaus FelscheFormer Director – Analytics InnovationDepartment of Immigration and Border Protection

Dr Nalin Asanka Gamagedara ArachchilageLecturer - Cyber SecurityUniversity of New South Wales

Glenn AsheChief Technology Officer Australian Institute of Health and Welfare

Mohit SagarGroup Managing Director & Editor in ChiefOpenGov Asia

Dr Omar HatamlehChief Innovation Officer, Engineering NASA JSC National Aeronautics & Space Administration Executive Director Space Studies Program International Space University

Chris BuxtonChief Digital Officer Statistics New Zealand

Janek RozovChief Digital Officer and Government Deputy Chief Information Officer Ministry of Economic Affairs and Communications, Estonia

Aleksi GrymHead of Digitalisation Bank of Finland

Frans RijkersStrategic Advisor Innovation & Identity - National Office for Identity Data Ministry for the Interior and Kingdom Relations The Netherlands

Dr Andy ChunRegional Director - Technology Innovation, Prudential Corporation AsiaAdjunct Professor, City University of Hong Kong

Azih YusofICT Consultant, System DevelopmentMalaysian Administrative and Modernisation Planning Unit (MAMPU)

Siew Wai YoongSenior Manager - National Strategic InitiativeMIMOS Berhad

Harisfazillah JamelIndependent Open Source Software ConsultantMalaysian Open Source Community

Badrul Hisham BesriSenior DirectorTM One

Ahmad OsmanICT Consultant, Data Center ManagementMalaysian Administration Modernisation and ManagementPlanning Unit (MAMPU)

Dato’ Mohd Nor HassanChief ICT ConsultantMalaysian Administrative Modernisation and Management Planning Unit (MAMPU)

NEXT-GEN GOVERNMENT: EMBRACING INNOVATION AND DISRUPTION

Mohd Syukor AbdulInformation Technology OfficerSoutheast Asia Regional Centre for Counter-Terrorism (SEARCCT)Ministry of Foreign Affairs, Malaysia

Mohd Rafiq Mohamed HashimDirector - Information SecurityGiTN

Datuk Seri Dr. Ismail bin Hj. BakarChief Secretary to the Government of Malaysia

Brought to you by: In Collaboration with:

N. Bala SubramanyamChief Executive Officere-Pragati Authority, India

Asst. Prof. SutheeChantrapunth Deputy DirectorDefence Technology InstituteThailand

ExhibitorsPartners

®

Lead Partners Strategic Partners

Page 2: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

EVENT AT A GLANCE DAY 1TUESDAY, 13TH NOVEMBER 2018

Arrival of Guests and DelegatesBreakfast

National Anthem

Doa Recital

Opening and Launching of PSCC 2018

Datuk Seri Dr. Ismail bin Hj. BakarChief Secretary to the Government of Malaysia

POWER TALKCIO’s of the Future: Generalists or Specialists?

MORNING COFFEE BREAK

KEYNOTE PRESENTATION – INTERNATIONAL A Future with Innovation

Dr Omar HatamlehNational Aeronautics & Space AdministrationInternational Space University

TECHNOLOGY CASE STUDY Open Source Innovation in Public Sector

Tan Meng WaiRed Hat

KEYNOTE PRESENTATION – INTERNATIONALAdopting “Cloud-First” Strategy to Boost Digital Economy and Deliver Digital Transformation

Mark BowryAustralian Broadcasting Corporation

TECHNOLOGY CASE STUDY Digital Government Development Strategy

John LockhartDigital Cities Projects Director, Asia Pacific SouthDell EMC

KEYNOTE PRESENTATION – INTERNATIONALConnected Government and Connected Citizens

N. Bala Subramanyame-Pragati Authority,India

TECHNOLOGY CASE STUDY Securing the Multi-Cloud

Eric LiewCisco

KEYNOTE PRESENTATION – INTERNATIONALHuman Factors in Cyber Security and Privacy

Dr Nalin Asanka Gamagedara ArachchilageUniversity of New South Wales, Australia

TECHNOLOGY CASE STUDY Fraud Prevention - Are you Doing Enough to Protect Your Business and Your Clients

Stefanus Natahusada Kaspersky Lab

THE GREAT DEBATEIs the Public Sector Ready to Let the Citizens Drive Decisions on Public Policies and Services?

LUNCH AND NETWORKING BREAK

8.00 am

8.45 am

9.00 am

9.50 am

10.25 am

11.10 am

10.55 am

11.25 am

11.40 am

11.55 pm

12.10 pm

12.40 pm

12.25 pm

12.55 pm

1.10 pm

2

Page 3: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

EVENT AT A GLANCE DAY 1 - AFTERNOON STREAMED SESSIONSTUESDAY, 13TH NOVEMBER 2018

KEYNOTE PRESENTATIONProviding a Standardised, Secured and Innovative way to Produce and Consume Services – Case Study on Estonia’s X-Road Open Source Data Exchange Layer

KEYNOTE PRESENTATIONNew Zealand’s Integrated Data Infrastructure - Strategies, Implementation, Successes, Challenges and Road Ahead

KEYNOTE PRESENTATIONNeed For A Paradigm Shift In Cybersecurity

KEYNOTE PRESENTATIONTowards the Next Generation of Public Services – Cloud Enables Better Governance Models

3.15pm TECHNOLOGY CASE STUDY Empowering Government Transformation

3.15pm TECHNOLOGY CASE STUDY Understanding Threat Key to Good Cyber Defence

KEYNOTE PRESENTATIONCyber Security and Privacy in Mobile Wireless Environments

3.00pm KEYNOTE PRESENTATIONThe Digitisation of the Australian Broadcasting Corporation

3.00pm KEYNOTE PRESENTATIONFuture cyber security threats and challenges: Are you ready for what's coming?

KEYNOTE PRESENTATIONAdopting DigitalTransformation in Public Schools and Campuses

4.15pm TECHNOLOGY CASE STUDY The Advent of Autonomous Networks: Are you Ready to Give up Control?

4.30pm TECHNOLOGY CASE STUDY Avoid a Business Continuity Planning at Your Own Risk

4.30pm KEYNOTE PRESENTATIONDeveloping the Cyber Skills of the Future

4.15pm TECHNOLOGY CASE STUDY Cyber Exposure – A New Discipline for Reducing Cyber Risk 

NETWORKING SESSION AND END OF DAY 1

END OF DAY 1 END OF DAY 1

PANEL DISCUSSION Secure Cloud Strategy - Enhance Collaboration, Improve Responsiveness and Increase Innovation Across the Public Service

3.45pm TECHNOLOGY CASE STUDY The Changing Face of Communications: How Cloud Changes Unified Communications

3.45pm TECHNOLOGY CASE STUDY Building a resilience security architecture with lower TCO

TECHNOLOGY CASE STUDY Are Truly Open Clouds possible?

2.45pm TECHNOLOGY CASE STUDY Digital Government Development Strategy – Cornerstone Building Blocks

2.45pm TECHNOLOGY CASE STUDY Threat Management & Defence: Our answer to Cybersecurity Risk Mitigation in an era of Complex Threats

KEYNOTE PRESENTATIONHow Governments are using Open Source to Serve the Citizens

4.00pm KEYNOTE PRESENTATIONThe Fourth Industrial Revolution - Challenges and Opportunities

4.00pm KEYNOTE PRESENTATIONA Security Rethink for Public Services: Plugging the Physical Breaches as these may pose even more risk to government computer systems than cyber intrusions, because physical access opens so many more channels of attack

TECHNOLOGY CASE STUDY Full Stack Cloud Solution, Inspires Digital Enterprises

3.30pm KEYNOTE PRESENTATIONThe Rise of Artificial Intelligence: What does the Future Look Like and What are We Seeing Now

3.30pm KEYNOTE PRESENTATIONHarnessing the Potential of Blockchain Technology to BoostCyber Security

Harnessing the Potential of Opensource , Sharing Latest Trends, Addressing Upcoming Challenges and Identifying new Opportunities for a Successful Digital Journey

Accelerating Government's Capability and Use of Digital Transformation Tools

Interconnectedness of Physical and Digital Security

DigiTech – Digital Transformation

SecureTech – Cyber & Physical Security

2.30 pm

2.50 pm

3.05 pm

3.20 pm

4.30 pm

4.45 pm

3.50 pm

4.10 pm

3.35 pm

3

Page 4: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

EVENT AGENDA DAY 1TUESDAY, 13TH NOVEMBER 2018

9.00 am

4

POWER TALK

9.50 am

Opening and Launching of PSCC 2018

Redefining the Role of Chief Information Officers in the age of Transformation and Disruption – CIO’s as Enabler-in-ChiefCIO’s as the catalysts, integrators and orchestrators of the digital ageCultivating digital leadership mindsets and behaviours in your teamsEmphasising the needs of the customers (citizens,other agencies) first rather than technology itselfAligning the IT objectives with the business priorities of your organisations and creating a culture which embraces innovation and change

CIO’s of the Future: Generalists or Specialists?

8.00 am

Arrival of Guests and Delegates Breakfast

National AnthemDoa Recital

8.45 am

Moderator:

Panellists:

Mohit Sagar Group Managing Director & Editor in Chief OpenGov Asia

Aleksi GrymHead of Digitalisation Bank of Finland

Frans RijkersStrategic Advisor Innovation & IdentityNational Office for Identity DataMinistry for the Interior and Kingdom Relations, The Netherlands

Janek RozovChief Digital Officer & Government Deputy Chief Information OfficerMinistry of Economic Affairs and Communications, Estonia

Chris BuxtonChief Digital OfficerStatistics New Zealand

Datuk Seri Dr. Ismail bin Hj. BakarChief Secretary to the Government of Malaysia

Page 5: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

5

11.10 am

TECHNOLOGY CASE STUDY

Open Source Innovation in Public Sector

How different governments across Asia has made a difference with open source solutionsWhy Enterprise open source is economical, powerful and capable of driving innovationHow It avoids lock-in and provides the freedom to explore and move when technology changes

A Future with Innovation

How technology will be disrupting the future economyRole of Artificial Intelligence and RoboticsEffect on future job markets

KEYNOTE PRESENTATION – INTERNATIONAL

10.55 am

With digitalisation, open source technology is gaining momentum and governments are increasingly embracing open source solutions. In open government initiatives, open source has led to greater citizen participation and contribution. Exciting new technology concepts such as containers, cloud computing, and big data offer multiple avenues for governments and federal agencies to improve operational efficiencies and mission performance.As the world moves faster and becomes more ambiguous, our ability to predict the future is becoming less and less. Particularly in the public sector where the project scope is more large-scale, a more agile approach is needed — onethat is not surprisingly very similar to the DevOps model for software development, and specifically to open source

This session will explore ideas and give examples of :

11.25 am

KEYNOTE PRESENTATION – INTERNATIONAL

Adopting “Cloud-First” Strategy to Boost Digital Economy and Deliver Digital Transformation

Understanding how cloud is fundamental to an organisation's digital transformationEnabling the government to rapidly deliver innovative public-sector services without incurring highlevels of capital expenditureWould compliance with regulations pose a significant impediment to cloud adoption

Dr Omar HatamlehChief Innovation Officer, Engineering NASA JSCNational Aeronautics & Space Administration USAExecutive Director – Space Studies ProgramInternational Space University

Mark BowryRadio & Regional Business Lead – TechnologyAustralian Broadcasting Corporation

Tan Meng Wai Director of Solution Architecture, Asian Growth and Emerging MarketsRed Hat, Asia Pacific

MORNING COFFEE BREAK

10.25 am

Page 6: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

6

11.55 am

KEYNOTE PRESENTATION – INTERNATIONAL

Connected Government and Connected Citizens

11.40 am

TECHNOLOGY CASE STUDY

Digital Government Development Strategy

Driving public sector transformation and realise connected government with demonstrable benefitsUsing e-Governance as a tool to provide seamless integrated services to its citizensEnhancing citizen-centricity, responsiveness, inclusiveness and citizen engagement as essential ingredients of good governance

Building a resilient economy, secure and modern government in harmony embracing industry 4.0 technology Smarter digital edge and e-gov ICT modernisationBest practice government policy enables four distinctive critical areas of the “smart customs”

12.10 pm

TECHNOLOGY CASE STUDY

How you can enable holistic workload protection & forensics for Multi-Cloud data centers by providing the capability to reduce attack surface and proactive detection of anomalous behavioursIn this session you will learn how the solution enables these capabilities and allows you to build a more secure Multi-Cloud environment

Securing the Multi-Cloud

Many organisations are choosing multi-cloud as their cloud strategy, but few understand how to integrate visibilityand security into the cloud environment. How are workloads communicating? Who are they communicating with? One of the key challenges facing customers is how do they provide a secure infrastructure for applications without compromising agility

Join this session to hear about:

12.25 pm

KEYNOTE PRESENTATION – INTERNATIONAL

Understanding and changing behavioural influences to help protect infrastructure, cloud, network systems and dataDesigning and implementing educational tools, technology and methodologies to increase cyber security awarenessUsing gaming technology to help protect computer users against phishing attacks

Human Factors in Cyber Security and Privacy

Eric LiewData Center Product Sales ManagerCisco

Dr Nalin Asanka Gamagedara ArachchilageLecturer - Cyber SecurityUniversity of New South Wales

John LockhartDigital Cities Projects Director, Asia Pacific SouthDell EMC

N. Bala SubramanyamChief Executive Officere-Pragati Authority, India

Page 7: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

7

12.40 pm

TECHNOLOGY CASE STUDY

PROPOSITION OPPOSITION

Fraud Prevention - Are you Doing Enough to Protect Your Business and Your Clients

Businesses have already gone far beyond traditional services providing their customers with access to their personal accounts via online channels and mobile devices. Digital transformation brings new opportunities, customers and of course, more revenue. On the other hand, it opens the doors to fraudsters with new sophisticated schemes, cross-channel attacks both on the user’s device and account.

Learn how to provide seamless user verification for legitimate clientsEnable cross-channel detection of money laundering and related activitiesDetect account takeovers

Tapping on to the power of social media, and the IoT to let the users’ preferences drive the content of policies and servicesHow would these initiatives impact public sector performance and broader policy outcomesWhat are its implications, risks and potentials for the public sector

THE GREAT DEBATE

Is the Public Sector Ready to Let the Citizens Drive Decisions on Public Policies and Services?

Let's debate on the pros and cons. What are its implications, risks and potentials?

12.55 pm

Moderator:

Stefanus Natahusada Presales Manager - SEAKaspersky Lab

Mohit Sagar Group Managing Director & Editor in Chief OpenGov Asia

Glenn Ashe Chief Technology OfficerAustralian Institute of Health and Welfare

1.10 pm

LUNCH AND NETWORKING BREAK

N. Bala SubramanyamChief Executive Officere-Pragati Authority, India

Dr Andy ChunRegional Director - Technology Innovation Prudential Corporation AsiaAdjunct Professor, City University of Hong Kong

Klaus Felsche Former Director – Analytics InnovationDepartment of Immigration and Border Protection

Page 8: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

8

AFTERNOON STREAMED SESSIONS

STREAM 1

STREAM 2

DigiTech - Digital TransformationAccelerating Government's Capability and Use of Digital Transformation Tools DigiTech

SecureTech – Cyber & Physical SecurityInterconnectedness of Physical and Digital Security SecureTech

STREAM 3

Page 9: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

2.30 pm

2.50 pm

Are Truly Open Clouds possible?

The industry is full of buzz around private cloud, public cloud, hybrid cloud & multi-cloud. Traditionally, governments have shied away from public clouds due to security and data residency concerns. However, much has evolved and hybrid cloud / multi-cloud architectures are becoming the norm

This session explores how open source help:

TECHNOLOGY CASE STUDY

To mitigate the risk of cloud silos as more and more workloads are moving into the cloudTechnologies like containers and serverless are also getting a lot of attention but are these silver bullets?

9

STREAM 1 |

KEYNOTE PRESENTATION

Deploying new and advanced security and privacy-preserving measuresFocusing on collaborative intrusion detection networks to allow intrusion detection system nodes to exchange data with each otherImportance of providing authentication, confidentiality, access control and non-repudiation

Cyber Security and Privacy in Mobile Wireless Environments

3.05 pm

KEYNOTE PRESENTATION – INTERNATIONAL

Providing a Standardised, Secured and Innovative Way to Produce and Consume Services – Case Study on Estonia’s X-Road Open Source Data Exchange Layer

Allowing nation’s various public and private sector e-service databases to link up and function in harmonyEnsuring confidentiality, integrity and interoperability between data exchange partiesFocusing on practical collaboration, sharing of experience and promoting innovation

Janek RozovChief Digital Officer & Government Deputy Chief Information OfficerMinistry of Economic Affairs and CommunicationsEstonia

Tan Meng Wai Director of Solution Architecture, Asian Growth and Emerging MarketsRed Hat, Asia Pacific

Ts. Dr. Maslina DaudSenior Vice President, Cyber SecurityProactive Services DivisionCyberSecurity Malaysia

Page 10: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

Towards the Next Generation of Public Services – Cloud Enables Better Governance Models

Realising tangible operational and financial benefits and reduced costsImproving organisational agility and transformation in service deliveryDecreasing project roll out timeframe, administrative costs and improve asset utilisation

KEYNOTE PRESENTATION

3.20 pm

3.35 pm

TECHNOLOGY CASE STUDY

Risk vs Reward on the migration to OpenStackHow do decide on the OpenStack Cloud Solution to use How to mitigate the impact on the existing infrastructure

Full Stack Cloud Solution, Inspires Digital Enterprises

The OpenStack story is part of the larger global shift towards Cloud Systems and Solutions. As OpenStack is able to constantly evolve and constantly improve due of its open-source nature, it means that whenever situations change or needs arises, one can leverage on a large active community to quickly respond with innovative solutions:

10

PANEL DISCUSSION

Making risk-based decisions when applying cloud securityTaking full advantage of cloud automation practices and design services for the cloudCreate opportunities to reuse and share capabilities through increased collaboration

Secure Cloud Strategy - Enhance Collaboration, Improve Responsiveness and Increase InnovationAcross the Public Service

3.50 pm

Moderator:

Panellists:

Harisfazillah JamelIndependent Open Source Software ConsultantMalaysian Open Source Community

Associate Prof. Ts. Dr. Nurhizam Safie Mohd SatarDeputy Dean (Industry & Community Partnership and Income generation)Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia

Patrick Low Beng Chee Principal Architect Enterprise Business Group Southern Pacific RegionHuawei Technologies

Mohd Syukor AbdulInformation Technology OfficerSoutheast Asia Regional Centre for Counter-Terrorism(SEARCCT) Ministry of Foreign Affairs, Malaysia.

Ahmad OsmanICT Consultant, Data Center ManagementMalaysian Administration Modernisation and Management Planning Unit (MAMPU)

Mohd Rafiq Mohamed HashimDirector - Information Security GiTN

Azih YusofICT Consultant, System DevelopmentMalaysian Administrative and Modernisation Planning Unit(MAMPU)

Page 11: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

11

KEYNOTE PRESENTATION

Education industry is amongst top 5 digitally disrupted hence generating notable trends in educationThere are challenges that hinders 21st CLD aspirationsTM perspective on Education Stakeholders’ journey helps to ensure the effectiveness of 21st CLD in public schools and campuses

Adopting Digital Transformation in Public Schools and Campuses

4.30 pm

4.45 pm

NETWORKING SESSION AND END OF DAY 1

4.10 pm

KEYNOTE PRESENTATION – INTERNATIONAL

How Governments are using Open Source to Serve the Citizens

Utilising open source as key driver of government digital transformationUsing open model to design and evaluate public policyEngaging with the citizens and participating in open source communities to solve citizens' problems

Badrul Hisham BesriSenior DirectorTM One

Frans RijkersStrategic Advisor Innovation & IdentityNational Office for Identity DataMinistry for the Interior and Kingdom Relations, The Netherlands

Page 12: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

12

STREAM 2 | DigiTech

KEYNOTE PRESENTATION – INTERNATIONAL

2.30 pm

New Zealand’s Integrated Data Infrastructure - Strategies, Implementation, Successes, Challengesand Road Ahead

Integrated Data as an enabler for research, allowing insights into complex issues and offering opportunities across multiple government agenciesProviding the insights government agencies need to improve social and economic outcomes for New ZealandersSecuring the data whilst maintaining privacy and confidentiality

2.45 pm

TECHNOLOGY CASE STUDY

Digitally transforming and adaptation for future longevityRevisit the e-government designDigital city architecture – e-government, e-citizen, and integrated IOT

Digital Government Development Strategy – Cornerstone Building Blocks

The changes at the ABC and our move from one-way broadcast via AM radio to fully interacting with ouraudience on social mediaOur ongoing efforts to remain a trusted and relevant part of Australians lives, both here and overseasPioneering forms of content distribution

KEYNOTE PRESENTATION – INTERNATIONAL

The Digitisation of the Australian Broadcasting Corporation

From microphones to podcasts and iView, and everything in between. Discussing:

3.00 pm

Chris BuxtonChief Digital OfficerStatistics New Zealand

John LockhartDigital Cities Projects Director, Asia Pacific SouthDell EMC

Mark BowryRadio & Regional Business Lead – TechnologyAustralian Broadcasting Corporation

Page 13: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

13

TECHNOLOGY CASE STUDY

3.15 pm

Empowering Government Transformation

Meet the demands of today’s modern citizens with a secure cloud platform that eliminates data silos & fragile P2P integrations

How a complete cloud offers agencies a modern approach to cutting-edge service delivery Meet evolving threats with cloud security Embracing modern technologies to engage with constituents

3.30 pm

What are the current trends in AI adoptionWhat are the promises of AI in the short term, over the next 3-5 years and then beyondWhat are some of the challenges ahead

Crisis Communication: The Power of Video During Uncertain TimesVideo collaboration promotes flexible schedules without the old struggles to communicate over email or phone Government agencies go digital to increase efficiency, and to improve collaboration

The Rise of Artificial Intelligence: What does the Future Look Like and What are We Seeing Now

The Changing Face of Communications: How Cloud Changes Unified Communications

Video conferencing transforms government by offering easy and affordable ways to collaborate

KEYNOTE PRESENTATION – INTERNATIONAL

3.45 pm

TECHNOLOGY CASE STUDY

4.00 pm

KEYNOTE PRESENTATION

Fourth Industrial Revolution - IoT and i4.0 : What is their relationshipOvercoming future issues & challengesWhat is the way forward

The Fourth Industrial Revolution - Challenges and Opportunities

Troy LatterDefence & National Security Innovation AdvisorOracle JAPAC

Dr Andy ChunRegional Director - Technology InnovationPrudential Corporation AsiaAdjunct Professor, City University of Hong Kong

Bryan LeeVideo Collaboration Business Lead & Category Manager (ASEAN)Logitech Video Collaboration

Siew Wai YoongSenior Manager - National Strategic InitiativeMIMOS Berhad

Page 14: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

4.15 pm

TECHNOLOGY CASE STUDY

TECHNOLOGY CASE STUDY

Workflow Automation, to counter complexity & keep up with IoT growth Operational efficiency to monetise opportunities from Disparate Data Sources Designing and operating Networks of the Future

The Advent of Autonomous Networks: Are you Ready to Give up Control?

4.30 pm

END OF DAY 1

4.45 pm

14

Intent-based networking has the promise of aligning and enforcing network lifecycle management to business intent, while the ever- increasing need for network security may get some much-needed help from machine learning and artificial intelligence. Autonomous networks and workflow automation technologies can help us keep up with the growth of IoT and complexity of modern networks, but are we ready to give up control? Network analytics and business intelligence can deliver operational efficiencies and monetization opportunities for enterprises by bringing together insights from the vast amount of disparate data sources scattered throughout the network. The session will look at how we may design, deploy and operate networks in the future

Avoid a Business Continuity Planning at Your Own Risk

Most businesses have some sort of plan for how they would respond to a major disruption or attack, however, very few are realistically prepared. At most organisation, these plans are fragmentary, primitive, and don’t account for all possible situations and causes. This is unsafe, and possibly due to ignorance. No organisation is invincible or exempt from outside attacks. As CIO, it’s up to you to:

Develop a careful and comprehensive business continuity plan that ensures your organisation is not ruined and demolished under the weight of uncontrollable circumstancesImplement robust Business continuity practices in your organisation to ensure stability and future health of your organisationSecuring the future of your business and preparing for uncontrollable circumstances

Andrew KerneboneRegional SE DirectorExtreme Networks

Kavitha MuthySecurity Architect of Governance, Risk Management and CompliancePrestariang Systems

Page 15: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

STREAM 3 | SecureTech

2.30 pm

KEYNOTE PRESENTATION – INTERNATIONAL

KEYNOTE PRESENTATION

Need For A Paradigm Shift In Cybersecurity

Developing practical techniques in offensive and defensive cyber operationsWhat are the best practices in mitigating reputational and financial risks?Building Cyber-resilience as an enterprise risk management strategyAdopting multi stakeholder approach to face next tier, multifaceted cyberthreats successfully

With level of sophistication of cyberthreats rising, governments and businesses need to up their ante, how do wework towards decreasing our vulnerabilities?

2.45 pm

TECHNOLOGY CASE STUDY

How do we predict the exact nature of future threats and how to combat them?Are the legacy governmental and regulatory policies proving to be counterproductive?Importance of collaboration between government and the private sector to deal with the scope and scale of cyber threats

Future Cyber Security Threats and Challenges : Are you Ready for What's Coming ?

3.00 pm

15

Threat Management & Defence: Our answer to Cybersecurity Risk Mitigation in an era of Complex Threats

As more and more organisations embark on their digital transformation, so too have the threat actors. We are in the era of complex threats

Predict – Know the threats and threat actors before they attack youDetection – Continuous monitoring for rapid threat discoveryRespond – How can you effectively investigate and respond to the attack if it hits

Dr Nalin Asanka Gamagedara ArachchilageLecturer - Cyber SecurityUniversity of New South Wales

Shariffah Rashidah Syed OthmanDirector Cyber Security Policy and International Cooperation DivisionNational Cyber Security Agency (NACSA)

Stefanus Natahusada Presales Manager - SEAKaspersky Lab

Page 16: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

3.15 pm

TECHNOLOGY CASE STUDY

Understanding Threat Key to Good Cyber Defence

It is necessary to understand the nature of the threat so as to be able to take appropriate defensive measuresGood defence can mitigate a lot of the dangers that cyber criminals poseIt’s imperative to understand hackers (or threat actors) are not one homogenous group , various motives drive different groups of hackers and their targets and modus operandi vary

One indirect result of the SingHealth Cyberbreach in which digital records of 1.5 million patients were stolen has been that there is now growing realisation within South-east Asia that data breaches and cyber attacks do not happen only in the West. Feedback from security researchers suggest that in South-east Asia, there has been, till now, less awareness about the nature of the global cyberthreat. The SingHealth breach has in fact helped to highlight the danger to the region

3.30 pm

KEYNOTE PRESENTATION – INTERNATIONAL

16

Harnessing the Potential of Blockchain Technology to Boost Cyber Security

What is blockchain and how does it work?How blockchain can help protect data from cyber attacks? Blockchain applications and how to apply in military usages

3.45 pm

TECHNOLOGY CASE STUDY

Building a resilience security architecture with lower TCO

Improving your security architecture with added network resiliencyPreparing for the next Generation network architectureHybrid Cloud security monitoring blueprint

As the volume and speed of network data increases, security tools are unable to keep up, resulting in security tool sprawl, performance degradation, inefficiencies and unnecessary expenditures. All of this leads to increased time to threat detection and response and a higher risk of a breach – despite massive spending on security tools

The solution is to build an efficient network security architecture that copes with increasing network speeds today and in the future, improving the return on investment of security tools while reducing complexity, cost and tool overload across physical, virtual or cloud infrastructure

Security tools get the right data at the right time and speed. Threats are more visible across cloud, hybrid and on-premises environments, resources can be deployed faster and security tools perform at higher levels

Mandar Bale Solutions ArchitectFireEye, Asia Pacific

Gwen LeeCountry Manager - South East AsiaGigamon

Asst. Prof. Suthee ChantrapunthDeputy DirectorDefence Technology InstituteThailand

Page 17: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

4.00 pm

4.15 pm

END OF DAY 1

4.45 pm

17

KEYNOTE PRESENTATION

TECHNOLOGY CASE STUDY

Exploring ways to better link cyber and physical defenceDetecting physical manifestations of cyber events to prevent infiltration in information and communication technologies, systems, and networksAdopting micro-segmentation as a multi-layered defensive mechanism

A Security Rethink for Public Services: Plugging the Physical Breaches as these may pose even morerisk to government computer systems than cyber intrusions, because physical access opens so manymore channels of attack

4.30 pm

KEYNOTE PRESENTATION

Cyber Exposure – A New Discipline for Reducing Cyber Risk 

Today’s CISO is under more pressure than ever to keep the organisation secure, but is the only measure of ‘success’ the avoidance of a data breach and bad press? How can we measure the effectiveness of our Cyber Security programs and know if our security posture is getting better or worse over time?Learn how you can best understand and reduce your organisation’s Cyber Risk and gain solid benchmarkinginformation about the effectiveness of your cyber security program against those of your industry peers

Digital transformation and an explosion of security data have created massive blind spots around cyber risk. Yet that overload of information has made it nearly impossible to know what to focus on. Cyber Exposure, a new discipline built on vulnerability management, is helping organisations measure and reduce cyber risk by providing visibility across assets and insight on what matters most. Learn how Cyber Exposure is helping organisations prioritise effectively to reduce cyber risk

Developing the Cyber Skills of the Future

Creating centres for cyber excellence within your agenciesUpskilling existing staff to meet the skills gapCoordinating with universities to provide the future workforce

Dato’ Mohd Nor HassanChief ICT ConsultantMalaysian Administrative Modernisation and Management Planning Unit(MAMPU)

Dato’ Dr. Haji Amirudin Abdul WahabChief Executive OfficerCyberSecurity Malaysia

Sugiarto KohRegional Director - Southeast AsiaTenable

Page 18: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

8.00 am

Arrival of Guests and Delegates Breakfast

EVENT AGENDA DAY 2WEDNESDAY, 14TH NOVEMBER 2018

18

9.00 am

9.15 am

Agencies are requiring enhanced security, but are we doing enough to enable a modern workforce to function securely in the digital age?Examining some of the recent attacks and what the response to these have beenDeveloping and implementing an effective privacy and data protectioncompliance program while reducing data breach and cybersecurity risks

Cyber Security and Data Privacy in the Digital Age – What Does The Future Look Like and What DoWe Need To Do?

Cyber Security and Data Privacy has a symbiotic relationship. What can agencies do to protect themselves from thethreats of data breach and cyber threats in the digital age?

Moderator:

Panellists:

Keynote PresentationResponding to the Digital Expectations of Citizens: Innovating Public Service Delivery

PANEL DISCUSSION

Dr Suhazimah Dzazali Deputy Director General – Information and Communication Technology Malaysian Administration Modernisation and Management Planning Unit (MAMPU)

Mohit Sagar Group Managing Director & Editor in Chief OpenGov Asia

Dato’ Dr. Haji Amirudin Abdul WahabChief Executive OfficerCyberSecurity Malaysia

Dr Nalin Asanka Gamagedara ArachchilageLecturer - Cyber SecurityUniversity of New South Wales

Harme MohamedDirector Cyber Security Technology Division National Cyber Security Agency (NACSA)

Susie Dorai RajDirector - ICT Consultancy Division Malaysian Administrative Modernisation and Management Planning Unit(MAMPU)

Page 19: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

EVENT AGENDA DAY 2WEDNESDAY, 14TH NOVEMBER 2018

19

Limitations of SMEs in doing business due to lack of knowledge and applications using technology – how it’s deterring SMEs to propel to greater heightsChallenges: Why SMEs are reluctant in using technology and how current government initiatives are not directly addressing this matterSuggestions for improvement

Digitising the SMEs: The Pivotal Role of The Government and Tech Providers

9.40 am

TECHNOLOGY CASE STUDY

KEYNOTE PRESENTATION – INTERNATIONAL

9.55 am

Digital Identity in The Blockchain Era – Creating a ‘Self-Sovereign’ Digital Identity

Building a digital ecosystem and discussing how collaboration is key to delivering truly citizen-centric servicesProviding an executable trust framework for governments to implement citizen identification whilst protecting and preserving the privacyEmpowering citizens to control the formalisation of their identity, manage their digital personas, and actively monetise their personal data

10.10 am

TECHNOLOGY CASE STUDY

Packet Intelligence for Actionable Network Visibility & Security

Thorough Network Forensic where The Truth Is in the PacketsSustainability & Scalability for Business Planning & Continuity Complete Visibility via SNMP, Netflow & Packet Inspection

In Today’s Converging IT Ecosystem, Why NPM is Critical Across Wired, Wireless & Unified Communications Operations

Ms Nuraslina Zainal AbidinGroup Managing Director Genaxis Sdn Bhd CEO Innovations Associates Consulting

Frans RijkersStrategic Advisor Innovation & IdentityNational Office for Identity DataMinistry for the Interior and Kingdom Relations, The Netherlands

Mark Kirwan Head of Sales, EMEASavvius

10.25 am

NETWORKING AND MORNING COFFEE

Page 20: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

11.10 am

TECHNOLOGY CASE STUDY

KEYNOTE PRESENTATION – INTERNATIONAL

10.55 am

Estonia's Experience in the Digital Transformation of Government Services

Responsibility for service qualityService catalogue mapping and management toolService quality basic indicators

20

KEYNOTE PRESENTATION – INTERNATIONAL

11.25 am

Digitalisation in Finance and Road to Cashless Society – A Finnish Experience

Embracing innovation and disruptionDeploying new technology to improve the quality, pricing, and convenience of productsGenerating a better financial system for customers and citizens in the future

Walk through the emerging use of these ML/AI techniques in DC operations and Usage beyond DC in wired and wireless networks

Data Centre of the Future

ML/AI driven Network Planning & Operations

Enterprise IT architects are facing a deluge of information from DC and Cloud infrastructure and associated tools which makes it humanly impossible to draw quick insights and be proactive in their operations. Innovations in ML/AI based approaches can help Enterprise IT to regain control of their operations

This session will:

Janek RozovChief Digital Officer & Government Deputy Chief Information OfficerMinistry of Economic Affairs and CommunicationsEstonia

Andrew KerneboneRegional SE DirectorExtreme Networks

Today, in Estonia’s public sector we have a complicated overview of the services that the state offers. This entails for the end user time and money spent on finding out who, where and how offers certain services. The task of the service owner is the search for possibilities to make services more convenient, financially rational and the realisation of these goals, based on the value generated through the provision of services. We in Estonia have created the Public Service Portfolio with more than 1500 public services described both in human and machine readable format. Each service with each channel has fields for mapping KPIs. In the future state will get an overview of the quality and net price of the services it offers

Aleksi GrymHead of Digitalisation Bank of Finland

Page 21: OFFICIATED BY FEATURING INTERNATIONAL ...cioconvex.mampu.gov.my/ciouploads/10134c6615288ba74a3a83...OFFICIATED BY SHOWCASING DISTINGUISHED SPEAKERS FROM KEY ORGANISATIONS FEATURING

21

Proposition: Opposition:

12.00 pm

Closing Remarks

12.10 pm

LEARNING JOURNEY COMPETITION

Moderator:

Glenn Ashe Chief Technology OfficerAustralian Institute of Health and Welfare

Dr Omar HatamlehChief Innovation Officer, Engineering NASA JSC National Aeronautics & Space Administration Executive Director Space Studies Program International Space University

Klaus Felsche Former Director – Analytics InnovationDepartment of Immigration and Border Protection

Dato’ Dr. Mazlan YusoffDirector GeneralMalaysian Administrative Modernisation and Management Planning Unit (MAMPU)

12.45 pm

NETWORKING LUNCH AND END OF DAY 2

DEBATE SESSION

Future of AI – Boon or Doom?

11.40 am

Stephen Hawking had said that "The development of full artificial intelligence could spell the end of the human race.”

Do you agree? Let us debate this

Chris BuxtonChief Digital OfficerStatistics New Zealand

Mark BowryRadio & Regional Business Lead – TechnologyAustralian Broadcasting Corporation