Venue
TBA
TBA, Singapore

What is Qwoted?

Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.

Event Date Wed Sep 6 +08 (over 1 year ago)
In your timezone (EST): Tue Sep 5 12:00pm - Tue Sep 5 12:00pm
Location TBA
Singapore
Region APAC
Details

Cybersecurity leaders say Southeast Asia has become a hotbed for cybercrime activities. In 2022, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. The region must take a collaborative defense approach to respond to this new threat environment. The challenge for enterprises has been to ascertain how much risk they are willing to accept to accomplish their mission. In the hybrid and interconnected world, the noticeable change has been changing consumption patterns of security technologies, which require new ways to deploy frameworks. The enterprise’s success will depend on its endurance to balance offense and defense to mitigate these threats using the right tools, technologies, and best practices. To gain insights into how to establish a secure ecosystem in this dynamic world, attend ISMG's cybersecurity summit and explore diverse cybersecurity trends from ransomware to supply chain attacks, infrastructure security to automotive cybersecurity, endpoint security featuring AI, connected devices’ challenges, critical infrastructure vulnerabilities, ICS risk, crypto challenges, extended detection and response, cyber insurance, and more. You can also earn your CPE credits by attending the summit. ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

OT and IT Convergence: Measuring the Security Risks
Most OT systems are designed with little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission-critical for enterprise security.

As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps? Can you deploy suitable asset inventory methods and map the IT/OT risks?

This session will cover:

Building complete visibility and monitoring your IT and OT assets with the right access control
Integrating OT threat monitoring into SoC for threat detection
Implementing essential steps to establish OT security

Sponsors & Partners

2023 Sponsors

• CyberEd.io
• CyberEdBoard
• Cyber Theory