About DiCyFor Security Summit
With the current Cybersecurity landscape constantly evolving, security and risk leaders must become the interceptors, to secure their organisations digital systems. No longer focused solely on defence, the security organization must effectively, anticipate and manage security risks in pursuit of enterprise sustainability.
The DiCyFor Security Summit helps security practitioners and risk management leaders to continuously improve the responsiveness of security risk management & technology to achieve mission-critical objectives.
Join the summit to learn best practices and insights to bring back to your respective teams.
2025 SPEAKERS

EVENT HIGHLIGHTS
20+
SPEAKERS
250+
DELEGATES
10+
EXHIBITORS
∞
BUSINESS OPPORTUNITIES
Topics at a Glance
Have access to industry leaders providing key takeaways, specifically designed to help your security and risk management.
Each session has a particular area of focus to help you deliver on what matters most to you and your infosec teams.
Opening Panel Discussion: The 2025 Cyber Security Climate & the
Rise of AI-Powered Cyber Attacks
Panellists:
Shaofei Huang, Group CISO @ SMRT Corporation Ltd
Audrey Teoh, CISO and Data Protection @ Singpost
Jayapalan K, Director, Business Information Security Officer, Asia Pacific @ Kenvue
Moderator: Tobias Klingel, Head of Information Security @ Aspire
Navigating now and future : responsible GenAI governance
As generative AI rapidly evolves, establishing responsible governance frameworks becomes crucial. The session will cover a multi-pronged governance approach encompassing ethical
principles, data protection, legal compliance, responsible R&D, stakeholder engagement, and robust enforcement mechanisms.
Ray Lay, Global Head of IT Compliance | DPO @ Aspire
Breaking Barriers: How Zero Trust and Data-Centric Security
Empower Information Sharing
In today’s digital landscape, security professionals often face the challenge of balancing robust protection with the need for seamless information sharing. Traditionally, security measures can be perceived as barriers—where the instinct is to clamp down and restrict access. However, with the adoption of Zero Trust and Data-Centric Security, security mechanisms can shift from being obstacles to enablers of secure collaboration and information exchange.
This presentation will highlight how Zero Trust and Data-Centric Security not only enhance security but also support greater information sharing and collaboration amongst teams. Join us as we share examples and demonstrate how organisations can create a secure foundation for information exchange, empowering teams while mitigating risks and ensuring compliance with regulatory standards.
Kunal Jha, Regional Director, Asia @ Netskope
Strengthening Cybersecurity and Resilience of Critical
Infrastructure
Synopsis to follow
Christopher Anthony, Director - Critical Information Infrastructure Division @ CSA
Detecting Threat in Early Stage with NetScout Adaptive Threat
Analytics
Attackers are using stealthy techniques to stay under the radar for longer periods as an Advanced Persistent Threat (APT). This entails maintaining undetected access within a victim’s organization to wait for opportunities or to slowly live off the land, move laterally, escalate privileges and exfiltrate information. The challenge is reliably and early detecting the malware when it’s present and stopping it by blocking communication to its C2 infrastructure for further instruction. See how NetScout help
on the Early Detection of Threat and protecting critical data from breaches using Adaptive Threat Analytics based on “Scalable DPI and ML driven DDoS mitigation..
Sushant Pandey, Security Lead @ Netscout
Securing the Future: Addressing AI's Biggest Security Risks
AI is reshaping the landscape of cybercrime, making attacks faster, smarter, and harder to detect. Phishing scams, once crude and easy to spot, now mimic real conversations with uncanny accuracy, slipping past security filters with ease. Nation-state hackers exploit AI to breach crypto platforms, using deepfakes and automated exploits to manipulate trust. Meanwhile, cybercriminals harness AI to fuel espionage, spread disinformation, and develop malware that evolves on its own. Even privacy is under siege, as AI sifts through vast datasets to uncover hidden details. As these threats grow
more sophisticated, the race to defend against them has never been more urgent.
Pasi Koistinen CISO @ Coinhako
Creating an ‘AI Ready’ Enterprise
- Evolving a primary industry in Singapore from the inside
- Focus on Security tool consolidation
- Moving from best in class security platforms to consolidated
- Risk reduction and digital transformation
- Cultural and the mindset change required to adapt
- Building an AI CoE
- Celebrating success
Damian Leach, Global CIO @ Seaco Global
Commanding Your Attack Surface
With global regulations tightening, organisations in Singapore must have complete visibility into their data and ensure a proactive response strategy. In his session, Rob will delve into the two foundational pillars essential for a robust security program: Visibility and response. This is an opportunity to learn how to strengthen your organisation's resilience, stay secure and meet regulatory requirements.
Rob Dooley, General Manager, Asia Pacific @ Rapid7
Navigating now and future : responsible GenAI governance
As generative AI rapidly evolves, establishing responsible governance frameworks becomes crucial. The session will cover a multi-pronged governance approach encompassing ethical principles, data protection, legal compliance, responsible R&D, stakeholder engagement, and robust enforcement mechanisms.
Senior Representative @ BigID
Panel Discussion: Cybersecurity and Risk Culture
Cover more ground with existing resources: Aligned with the current moody business
outlook and tight security budgets, how do we develop the right risk culture within our
organizations to operate in this tough environment.
Panellists:
Jayapalan K, Director, Business Information Security Officer, Asia Pacific @ Kenvue
Hwee Cher Tan, Group Head of Information Security & Data Governance @ CGS
International Securities
Frankie Shuai, APAC CISO @ Global Financial Service Institution
Moderator:
Beyond the Present: A Roadmap for Future-Ready SOC
We are now in a technological revolution driven by Artificial Intelligence (AI) and generative AI tools like the popular chatbot ChatGPT. As artificial intelligence becomes increasingly sophisticated, it presents both opportunities and challenges in the realm of cybersecurity. In this session, we will delve into the world of Security Operations Centers (SOCs) and explore the key strategies for building a resilient and effective cyber defense and the importance of establishing a proactive and intelligence-driven defense posture to stay ahead of adversaries.
AI Unleashed: Strategies to Elevate AI Security for AI Apps & LLM’s
Are you ready to adopt AI securely? Generative AI and LLMs have brought new risks related to large volumes of unstructured data, making adopting AI safely and responsibly critical. Organizations need to be able to build out policies for data usage and enforce AI governance to audit and inspect the data shared with LLM’s. In this webinar, we’ll explore how organizations can prepare data for AI applications & LLMs and ensure that data is governed, labelled, and compliant with ethical and regulatory standards.
- How to prepare your data for generative AI to reduce data leaks and breaches
- How to build policies and enforce controls to maximize the impact without the risk.
- Best practices for auditing and inspecting data shared with LLMs & AI apps
Kawin Boonyapreedee, APAC CEO @ Applied Quantum
SPONSORS

Abnormal Security provides the leading behavioral AI-based email security platform that leverages machine learning to stop sophisticated inbound email attacks and dangerous email platform attacks that evade traditional solutions. The anomaly detection engine leverages identity and context to analyze the risk of every cloud email event, preventing inbound email attacks, detecting compromised accounts, and remediating emails and messages—all while providing visibility into configuration drifts across your environment. You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly, with additional protection available for Slack, Teams, and Zoom. More information is available at www.abnormalsecurity.com

BigID is the leader in Data Security Posture Management (DSPM), recognized by CB Insights for its groundbreaking approach to data security. It pioneers cloud-native security for multi-cloud and hybrid cloud environments, offering a comprehensive data-first solution for data visibility and control. As a leader in data security, privacy, compliance, and governance BigID enables organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. Customers use BigID to reduce their data risk, automate security and privacy controls, achieve compliance, and understand their data across their entire data landscape: including multi cloud, hybrid cloud, IaaS, PaaS, SaaS, and on-prem data sources. BigID has been recognized by CNBC as one of the top 25 startups for the enterprise, has been named to the Inc 5000 and Deloitte 500 for two years in a row, and is the leading modern data security vendor in the market today.

ManageEngine is the enterprise IT management division of Zoho Corporation, catering to a wide range of organizations, MSPs and MSSPs. Established and emerging enterprises—including 9 of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has offices worldwide, including in the United States, the United Arab Emirates, the Netherlands, India, Colombia, Mexico, Brazil, Singapore, Japan, China, Australia and the United Kingdom as well as 200+ global partners to help organizations tightly align their business and IT. For more information, please visit manageengine.com.

Netscout Systems, Inc. assures digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility, and insights customers need to accelerate, and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications. Our mission is protecting the global leaders of industry from the risks of disruption, allowing them to solve their most challenging network performance and security problems, ensuring the connected world runs safely and smoothly. visit www.netscout.com

Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.

OffSec is the leading provider of continuous professional and workforce development, training, and education for cybersecurity practitioners. OffSec's distinct pedagogy and practical, hands-on learning help organizations fill the infosec talent gap by training their teams on today’s most critical skills. With the OffSec Learning Library featuring 7,000 hours of content, including over 1,800 videos, and 4,200+ labs. OffSec demonstrates its commitment to empowering individuals and organizations to fight cyber threats with indispensable cybersecurity skills and resources. OffSec also funds and maintains Kali Linux, the leading operating system for penetration testing, ethical hacking, and network security assessments. visit www.offsec.com

Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure to the dark web. We
foster open-source communities and cutting-edge research–using these insights to optimize our products and arm the global security community with the latest in attacker methodology. Trusted by more than 11,000 customers worldwide, our
industry-leading solutions and services help businesses stay ahead of attackers, ahead of the competition, and future-ready for what’s next. visit www.rapid7.com
Venue
ParkRoyal Hotel, 7500 Beach Rd, Singapore 199591
Driving directions From Singapore Changi Airport
-
Take East Coast Parkway (ECP) towards the City and Jurong.
-
Exit at Rochor Road on the left.
-
Keep left on Rochor Road and immediately turn left to Temasek Boulevard.
-
Drive past the fountain and continue along Temasek Boulevard.
-
Turn left at the T-junction to Raffles Boulevard.
-
PARKROYAL COLLECTION Marina Bay, Singapore is on the immediate right.
The hotel is centrally accessible by public transport. The nearest MRT stations are:
-
Promenade Station (Circle Line)
-
Esplanade Station (Circle Line)
-
City Hall Station (interchange for the North-South and East-West Lines)

Join DiCyFor Singapore
