About DiCyFor Security Summit
With the current Cybersecurity landscape constantly evolving, security and risk leaders must become the interceptors, to secure their organisations digital systems. No longer focused solely on defence, the security organization must effectively, anticipate and manage security risks in pursuit of enterprise sustainability.
The DiCyFor Security Summit helps security practitioners and risk management leaders to continuously improve the responsiveness of security risk management & technology to achieve mission-critical objectives.
Join the summit to learn best practices and insights to bring back to your respective teams.
2025 SPEAKERS

EVENT HIGHLIGHTS
20+
SPEAKERS
250+
DELEGATES
10+
EXHIBITORS
∞
BUSINESS OPPORTUNITIES
Topics at a Glance
Have access to industry leaders providing key takeaways, specifically designed to help your security and risk management.
Each session has a particular area of focus to help you deliver on what matters most to you and your infosec teams.
Opening Panel Discussion: The 2025 Cyber Security Climate & the
Rise of AI-Powered Cyber Attacks
Where AI is both the shield and the spear. Leading CISOs and security experts will unravel how advanced AI technologies are transforming cyber attacks, from hyper-realistic phishing scams to automated exploits targeting cryptocurrency platforms. Discover actionable strategies to leverage AI for real-time threat detection, enhance vulnerability management, and build a proactive, intelligence-driven SOC.
This is your chance to gain exclusive insights on establishing an AI-Ready enterprise, from forming an AI Center of Excellence to embedding ethical AI governance into your cybersecurity framework. Don’t miss out on learning how to turn emerging AI risks into robust, future-proof defenses.
Panellists:
Shaofei Huang, Group CISO @ SMRT Corporation Ltd
Audrey Teoh, CISO and Data Protection @ Singpost
Rob Dooley, General Manager, Asia Pacific @ Rapid7
Moderator: Tobias Klingel, Head of Information Security @ Aspire
Unmasking the Cyber Threats: A Forecast for 2025 and Beyond
The rapid advancement of emerging technologies such as 5G, blockchain, artificial intelligence (AI), and quantum computing presents both unprecedented opportunities and new challenges for cybersecurity. In this presentation, we will explore the evolving landscape of cybersecurity threats as these technologies continue to mature and become more integrated into critical infrastructure. By 2025 and beyond, the proliferation of 5G will amplify the attack surface, while blockchain’s decentralized nature will redefine trust and authentication protocols. AI will play a dual role, both as a tool for enhancing cybersecurity defenses and as a potential weapon for malicious actors. Additionally, the rise of quantum computing promises to revolutionize encryption, potentially rendering current systems obsolete. This forecast will address the intersection of these technologies, the cybersecurity risks they pose, and strategies for staying ahead of adversaries in an increasingly interconnected and complex digital world.
Kawin Boonyapreedee, APAC CEO @ Applied Quantum
Breaking Barriers: How Zero Trust and Data-Centric Security
Empower Information Sharing
In today’s digital landscape, security professionals often face the challenge of balancing robust protection with the need for seamless information sharing. Traditionally, security measures can be perceived as barriers—where the instinct is to clamp down and restrict access. However, with the adoption of Zero Trust and Data-Centric Security, security mechanisms can shift from being obstacles to enablers of secure collaboration and information exchange.
This presentation will highlight how Zero Trust and Data-Centric Security not only enhance security but also support greater information sharing and collaboration amongst teams. Join us as we share examples and demonstrate how organisations can create a secure foundation for information exchange, empowering teams while mitigating risks and ensuring compliance with regulatory standards.
Kunal Jha, Regional Director, Asia @ Netskope
Detecting Threat in Early Stage with NetScout Adaptive Threat
Analytics
Attackers are using stealthy techniques to stay under the radar for longer periods as an Advanced Persistent Threat (APT). This entails maintaining undetected access within a victim’s organization to wait for opportunities or to slowly live off the land, move laterally, escalate privileges and exfiltrate information. The challenge is reliably and early detecting the malware when it’s present and stopping it by blocking communication to its C2 infrastructure for further instruction. See how NetScout help
on the Early Detection of Threat and protecting critical data from breaches using Adaptive Threat Analytics based on “Scalable DPI and ML driven DDoS mitigation..
Sushant Pandey, Security Lead @ Netscout
Securing the Future: Addressing AI's Biggest Security Risks
AI is reshaping the landscape of cybercrime, making attacks faster, smarter, and harder to detect. Phishing scams, once crude and easy to spot, now mimic real conversations with uncanny accuracy, slipping past security filters with ease. Nation-state hackers exploit AI to breach crypto platforms, using deepfakes and automated exploits to manipulate trust. Meanwhile, cybercriminals harness AI to fuel espionage, spread disinformation, and develop malware that evolves on its own. Even privacy is under siege, as AI sifts through vast datasets to uncover hidden details. As these threats grow
more sophisticated, the race to defend against them has never been more urgent.
Pasi Koistinen, CISO @ Coinhako
Creating an ‘AI Ready’ Enterprise
- Evolving a primary industry in Singapore from the inside
- Focus on Security tool consolidation
- Moving from best in class security platforms to consolidated
- Risk reduction and digital transformation
- Cultural and the mindset change required to adapt
- Building an AI CoE
- Celebrating success
Damian Leach, Global CIO @ Seaco Global
Commanding Your Attack Surface
With global regulations tightening, organisations in Singapore must have complete visibility into their data and ensure a proactive response strategy. In his session, Rob will delve into the two foundational pillars essential for a robust security program: Visibility and response. This is an opportunity to learn how to strengthen your organisation's resilience, stay secure and meet regulatory requirements.
Rob Dooley, General Manager, Asia Pacific @ Rapid7
Strengthening Cybersecurity and Resilience of Critical
Infrastructure
Synopsis to follow
Christopher Anthony, Director - Critical Information Infrastructure Division @ CSA
From Unknown to Unbreachable: How AI-Driven Data Discovery Enhances Security Posture
As AI-powered cyber threats become more sophisticated, the ability to identify and address risky data practices has never been more important. BigID uses AI-driven discovery and Data Security Posture Management (DSPM) to uncover issues like overexposed sensitive data, misconfigurations, and policy violations—before they turn into breaches. By providing predictive insights and risk scoring, BigID helps security teams focus on the most critical threats, prioritize remediation, and strengthen their overall data security posture. It’s about moving from reactive to proactive protection, ensuring sensitive data stays secure across the entire environment.
Garrick Gan, Regional Sales Manager @ BigID
Panel Discussion: Cybersecurity and Risk Culture
Cover more ground with existing resources: Aligned with the current moody business
outlook and tight security budgets, how do we develop the right risk culture within our
organizations to operate in this tough environment.
Panellists:
Hwee Cher Tan, Group Head of Information Security & Data Governance @ CGS
International Securities
Frankie Shuai, APAC CISO @ Global Financial Service Institution
Sushant Pandey, Security Lead @ Netscout
Moderator:
Tarun Samtani, Asia Advisory Board Member @ IAPP
Practical tips to protect against advanced cyber threats
Cyberattacks are getting more and more sophisticated especially in recent days, fuelled by the convenience and advancements in GenAI. Its evident that traditional security measures are no longer sufficient.
How can we better protect our crown jewels? This talk will explore some of the most innovative ways to address the advanced cyber threats that are usually able to bypass standard security.
Nyan Tun Zaw, CISO @ Athena Dynamics
SPONSORS

Abnormal Security provides the leading behavioral AI-based email security platform that leverages machine learning to stop sophisticated inbound email attacks and dangerous email platform attacks that evade traditional solutions. The anomaly detection engine leverages identity and context to analyze the risk of every cloud email event, preventing inbound email attacks, detecting compromised accounts, and remediating emails and messages—all while providing visibility into configuration drifts across your environment. You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly, with additional protection available for Slack, Teams, and Zoom. More information is available at www.abnormalsecurity.com

BigID is the leader in Data Security Posture Management (DSPM), recognized by CB Insights for its groundbreaking approach to data security. It pioneers cloud-native security for multi-cloud and hybrid cloud environments, offering a comprehensive data-first solution for data visibility and control. As a leader in data security, privacy, compliance, and governance BigID enables organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. Customers use BigID to reduce their data risk, automate security and privacy controls, achieve compliance, and understand their data across their entire data landscape: including multi cloud, hybrid cloud, IaaS, PaaS, SaaS, and on-prem data sources. BigID has been recognized by CNBC as one of the top 25 startups for the enterprise, has been named to the Inc 5000 and Deloitte 500 for two years in a row, and is the leading modern data security vendor in the market today.

ManageEngine is the enterprise IT management division of Zoho Corporation, catering to a wide range of organizations, MSPs and MSSPs. Established and emerging enterprises—including 9 of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has offices worldwide, including in the United States, the United Arab Emirates, the Netherlands, India, Colombia, Mexico, Brazil, Singapore, Japan, China, Australia and the United Kingdom as well as 200+ global partners to help organizations tightly align their business and IT. For more information, please visit manageengine.com.

Netscout Systems, Inc. assures digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility, and insights customers need to accelerate, and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications. Our mission is protecting the global leaders of industry from the risks of disruption, allowing them to solve their most challenging network performance and security problems, ensuring the connected world runs safely and smoothly. visit www.netscout.com

Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.

OffSec is the leading provider of continuous professional and workforce development, training, and education for cybersecurity practitioners. OffSec's distinct pedagogy and practical, hands-on learning help organizations fill the infosec talent gap by training their teams on today’s most critical skills. With the OffSec Learning Library featuring 7,000 hours of content, including over 1,800 videos, and 4,200+ labs. OffSec demonstrates its commitment to empowering individuals and organizations to fight cyber threats with indispensable cybersecurity skills and resources. OffSec also funds and maintains Kali Linux, the leading operating system for penetration testing, ethical hacking, and network security assessments. visit www.offsec.com

Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure to the dark web. We
foster open-source communities and cutting-edge research–using these insights to optimize our products and arm the global security community with the latest in attacker methodology. Trusted by more than 11,000 customers worldwide, our
industry-leading solutions and services help businesses stay ahead of attackers, ahead of the competition, and future-ready for what’s next. visit www.rapid7.com
Venue
ParkRoyal Hotel, 7500 Beach Rd, Singapore 199591
Driving directions From Singapore Changi Airport
-
Take East Coast Parkway (ECP) towards the City and Jurong.
-
Exit at Rochor Road on the left.
-
Keep left on Rochor Road and immediately turn left to Temasek Boulevard.
-
Drive past the fountain and continue along Temasek Boulevard.
-
Turn left at the T-junction to Raffles Boulevard.
-
PARKROYAL COLLECTION Marina Bay, Singapore is on the immediate right.
The hotel is centrally accessible by public transport. The nearest MRT stations are:
-
Promenade Station (Circle Line)
-
Esplanade Station (Circle Line)
-
City Hall Station (interchange for the North-South and East-West Lines)

Join DiCyFor Singapore
