CSX NORTH AMERICA

CSX EUROPE

CSX ASIA PACIFIC

14 - 16 NOVEMBER  |   SINGAPORE

EXPLORE. EXCHANGE. EXCEL.

 

KEYNOTES

Silver Sponsors

ACTIVITIES

Make new connections and liven up your experience at CSX by participating in the following activities outside the conference. Each activity is designed to enhance your cyber experience while you have fun!

Connecting Women Leaders in Technology

Amazing things can happen through facilitated peer-to-peer networking, including having careers leap forward! All CSX 2016 attendees are welcome to join in on the fun and make new connections at this dynamic, interactive event.

 

 

AGENDA

VENUE

Marina Bay Sands

10 Bayfront Avenue, Singapore, 018956

+65 6688 8868

 

12

13

14

15

16

SATURDAY

TIME

FUNCTION

LOCATIONS

7:00-17:00 Workshop Registration

Peony Junior Ballroom Foyer
8:00-9:00 Workshop Breakfast

 
9:00-17:00 Workshop 1 - Cybersecurity Fundamentals
John Tannahill, CISM, CGEIT, CRISC

 
10:30-11:00
Workshop Refreshment Break

 
12:30-13:30 Workshop Lunch

 
15:00-15:30 Workshop Refreshment Break

 

JUSTIFY YOUR ATTENDANCE

For information security professionals, nothing is more imperative than staying ahead of the curve. ISACA’s Cybersecurity Nexus applies five decades of best-practice IT knowledge towards the most advanced cyber security training program in the industry.

 

Attendees will gain cyber security skills that will help their organization:

 

Identify - Develop the organizational understanding to manage cybersecurity risk to systems, assets, data and capabilities.

Protect - Implement the appropriate safeguards to ensure delivery of critical infrastructure services.

Detect - Discover cybersecurity events and potential events quickly and effectively.

Respond & Recover - Accurately execute and assess the correct actions to manage a security event.

Explore - Leverage thought leadership and proven experience on processes, technologies and techniques that are newly emerging as “Megatrends” and solutions for cybersecurity and information systems professionals around the world.

 

 

SUNDAY

TIME

FUNCTION

LOCATIONS

7:00-12:00 Workshop Registration

Peony Junior Ballroom Foyer
8:00 - 9:00 Workshop Breakfast

 
9:00-17:00 Workshop 1 - Cybersecurity Fundamentals
John Tannahill, CISM, CGEIT, CRISC

 
10:30-11:00
Workshop Refreshment Break

 
12:30-13:30 Workshop Lunch

 
13:00-19:00 Exhibitor Setup

 
15:00-19:00 CSX Conference Registration

Peony Junior Ballroom Foyer
15:00-15:30 Workshop Refreshment Break

 
17:00-19:00 Welcome Reception

Roselle Junior Ballroom Foyer

Connecting Women Leaders in Technology

 

Join ISACA’s exciting new pilot program–Connecting Women Leaders in Technology–at CSX 2016 Asia Pacific.

All attendees are invited to the networking event Tuesday evening focused on empowering women within the global technology workforce. Come join in on the fun and make new connections that help accelerate your career to new levels at this entertaining, interactive Connecting Women networking event.

MONDAY

TIME

FUNCTION

LOCATIONS

8.00-17.00 Registration & Information Desk

Peony Junior Ballroom Foyer
8:00-8.45 Continental Breakfast

 
8:00-19:00 Expo Hall

 
8:45-8:50 Opening Remarks – Christos K. Dimitriadis

 
8:50-9:00 Guest of Honor Opening Remarks – Teo Chin Hock

 
9:00-10:00 Opening General Session – Quest Means Business
Richard Quest

 
10:00-10:30 Refreshment Break

 
10:30-11:30 Session 111 - Art of Performing Risk Assessments
Session 112 - PKI to Secure the Cloud
Session 113 - Cybersecurity in Industrial Control Systems
Session 114 - Cyber Security Incident Response Hands on Lab - Part 1

 
11:30-11:45 Movement Break

 
11:45-12:45 Session 121 - Governance of Privileged Identities – Key to Breach Prevention
Session 122 - Moving Forward with Cyber Security - Singapore Findings from The Global State of Information Security Survey 2017
Session 123 - The Enterprise Immune System
Session 124 - Cyber Security Incident Response Hands on Lab - Part 2

 
12:45-13:45 Lunch

 
13:45-14:45  General Session Keynote: What They Know
 Ashkan Soltani

 
14:45-15:00 Movement Break

 
15:00-16:00 Session 131 - Meeting the Million Person Cyber Deficit
Session 132 - Measuring Security: How do I Know what a Valid Metric Looks Like?
Session 133 - SIEM: Extracting Intelligence out of Logs
Session 134 - Privacy in the IoT Era

 
16:00-16:30 Refreshment Break

 
16:30-17:30 Session 141 - Safely Embracing the Cloud
Session 142 - Encryption, Encryption, Encryption!
Session 143 - Proactive Cyber Defence using User Behavior Analysis
Session 144 - Under cyberattack! Do you have a response strategy?!

 
17:30-19:30 Expo Hall Networking Reception

 
17:30-18:00 Spotlight Session  1 - Real-Time Data Audit and Security: Find, Classify and Protect Sensitive Data

 

TUESDAY

TIME

FUNCTION

LOCATIONS

8:00-17:00 Registration & Information Desk

Peony Junior Ballroom Foyer
8:00-8:45 Continental Breakfast

 
8:00-16:00 Expo Hall

 
8:45-8:50
Opening Remarks – Phoram Mehta

 
8:50-9:00
Guest of Honor Opening Remarks – Vivek Kumar

 
9:00-10:00
General Session Keynote – Mind The Gap: Analyzing Cyber Security Controls that Few Organizations are Implementing, and Why
Justine Bone

 
10:00-10:30 Refreshment Break

 
10:30-11:30 Session 211 - Device Characterization
Session 212 - Database Security - Cyber Security Control - Part 1
Session 213 - Footprinting and Information Exposure Risks Lab – Part 1
Session 214 - Amplification and Reflection DdoS Attacks

 
11:30-11:45 Movement Break

 
11:45-12:45 Session 221 - Technology Risk Management that Works…
Session 222 - Database Security - Cyber Security Control - Part 2
Session 223 - Footprinting and Information Exposure Risks Lab – Part 2
Session 224 - Using Guerrilla Warfare Tactics to Secure Vulnerable Systems

 
12:45-13:45 Lunch

 
13:45-14:45 General Session Keynote – The Challenges and Opportunities of the CISO in Today's World
Eddie Schwartz, CISA, CISM, CISSP, ISSEP, PMP

 
14:45-15:00 Movement Break

 
15:00-16:00 Session 231 - Effective IT Security Framework
Session 232 - DevSecOps and the future of Enterprise Security
Session 233 - Footprinting and Information Exposure Risks Lab – Part 3
Session 234 - Strangers in the Night: A 3am Cybercrisis is Not the Time for Introduction
236 - Connecting Women in Technology Session

 
16:00-16:30 Refreshment Break

 
16:30-17:30 Session 241 - Building a GRC System: From Right Objectives to Measurable GRC
Session 242 - Internet of Things to Internet of Threats
Session 243 - Footprinting and Information Exposure Risks Lab – Part 4
Session 244 - Incident Response - Good, Bad and Ugly

 

WEDNESDAY

TIME

FUNCTION

LOCATIONS

8:00-12:00 Registration & Information Desk

Peony Junior Ballroom Foyer
8:45-9:45 Session 311 - Implementing Segregation of Duties
Session 312 - Biometric Authentication - Combat Crime
Session 313 - Understanding Covert Channels of Communication
Session 314 - Plan, Do, Check, Act – How does your Cyber Security Incident Response Plan Measure up?

 
9:45-10:00
Movement Break

 
10:00-11:00 Session 321 - Blockchain: Ensuring Confidence in Digital Transactions
Session 322 - Securing Mobile App with Open-source Tools
Session 323 - Next Generation Security Operations Centre
Session 324 - You Have a Blind Spot – Why Encryption Is Making You Sick

 
11:00-11:15 Movement Break

 
11:15-12:15 Closing General Session Keynote
Greg Williams

 

NOVEMBER

NOVEMBER

NOVEMBER

NOVEMBER

NOVEMBER

SESSIONS & WORKSHOP

 

Cutoff date Thursday, 20 October 2016

 SGD 340.00

Average nightly rate+Taxes & Fees

IDENTIFY

Develop the organizational understanding to manage cybersecurity risk to systems, assets, data and capabilities. Learn how to focus and prioritize your organization’s efforts, consistent with its risk management strategy and business needs. The Identify track explains asset management, business environment, governance, risk assessment and risk management strategies.

 

Implement the appropriate safeguards to ensure delivery of critical infrastructure services. The Protect track teaches access control, awareness, and training data security, information protection, processes and procedures, maintenance and protective technology.

 

DETECT

Discover cybersecurity events and potential events quickly and effectively. The Detect track focuses on anomalies and events, security, continuous monitoring and detection processes.

 

RESPOND

Accurately execute and assess the correct actions to manage a security event. The Respond track covers response planning, communications, analysis, mitigation and improvements.

 

RECOVER

Develop plans for resilience and to restore any capabilities or services that were impaired due to a cyber security event. Initiate timely recovery to normal operations to reduce operational impact. The Recover track examines recovery planning, improvements and communications.

 

EXPLORE

Leverage thought leadership and proven experience on processes, technologies and techniques that are newly emerging as “Megatrends” and solutions for cyber security and information systems professionals around the world.

 

WORKSHOP

Media Partners

 

You will find the latest cyber security news and in-depth coverage of Singapore's and international cyber security news. Whether you are a IT Security Professional or someone aspiring to be one, you will find all the useful IT security materials/resources which may help you in your work and/or career development. You can register and join the various forums and topics that is available in the portal.

SPONSORS and MEDIA PARTNERS

Registration is closed.

 

 

Justify Your Attendance

SINGAPORE LOCAL ATTRACTIONS

 

 

Supporting Sponsors

Gold Sponsors

Winner of the Queen’s Award for Enterprise in Innovation 2016, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects and responds to previously unidentified threats, powered by machine learning and mathematics developed by specialists from the University of Cambridge. Without using rules or signatures, Darktrace is uniquely capable of understanding the ‘pattern of life’ of every device, user and network within an organization, and defends against evolving threats that bypass all other systems.

CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live—from the data center to the mobile device. Our software and solutions help our customers thrive in the new application economy by delivering the means to deploy monitor and secure their applications and infrastructure.

See what attendees loved about 2016’s CSX conference in Signapore

 

Thank you to all our attendees!

CSX 2016 Asia Pacific has come to a close and was a resounding success. We would like to thank all of our speakers and volunteers for helping to create an energetic and collaborative learning atmosphere. But most importantly, we would like to thank all of you who attended. None of this would be possible without your passion for learning and dedication to your profession.

PRICING

 

CLICK HERE TO RESERVE

A select number of CSX 2016 Asia Pacific
guest rooms at a special guest rate are
available for a limited time.

 

 

The Hotel is a 2-minute walk from Bayfront metro station and 9 km from Universal Studios Singapore.  All guest rooms feature floor-to-ceiling windows with city/bay views.  These sleek rooms come with free Wi-Fi, flat-screens and minibars.

 

The Sands SkyPark® has gained a legendary reputation by the 360-degree views on the observation deck, most notably the breath-taking experience of swimming in the iconic infinity-edged swimming pool 200 metres in the sky.

 

Shopaholics will enjoy in the rows of luxury retailers in The Shoppes at Marina Bay Sands®, which houses the largest collection of coveted designer boutiques in Asia. Collectors of dining experiences will find restaurants from such world-famous chefs as Tetsuya Wakuda, Wolfgang Puck and others to add to their collection of experiences.

 

Other attractions on the grounds include the MasterCard Theatres at Marina Bay Sands®, featuring stunning performances for world-class entertainment.

 

© 2016 ISACA. ALL RIGHTS RESERVED