top of page

Conference Registration: DICYFOR Singapore

26 February 2025

Venue

*For Vendors, consultants and service providers please register your interest at info@nimatmedia.com

Blue Gradient

Register here

DiCyFOR Security: information

Topics at a Glance

Have access to industry leaders providing key takeaways, specifically designed to help your security and risk management leaders improve and advance security capabilities to support your organisations digital growth. Each session has a particular area of focus to help you deliver on what matters most to you and your infosec teams.

Session 1

Cybersecurity Leadership

With the current Cybersecurity climate as aggressive as ever, leaders must navigate economic uncertainty, important technology decisions, staff shortages and an exponentially expanding attack surface. Learn how Cybersecurity leaders can succeed in their roles in the face of these mission-critical challenges.

Session 2

Cyber and IT Risk Management

This session covers risks relevant to privacy, supply chains and Cybersecurity. Learn how to communicate value and correlate risk data to automate control monitoring and to enable decision making for the right outcomes.

session 3

Infrastructure Security

Explore concepts such as practical zero trust projects, vendor and product consolidation, cybersecurity mesh and security infrastructure configuration management.

 Session 4

Application and Data Security

As always, new technologies mean new threats and an increasing attack surface, not all of which are visible by the responsible teams. This session explores the latest developments, future roadmaps and new approaches to traditional application and data security problems.

Session 5

Infosec Operations

This session helps security and risk management leaders increase business resilience through effective threat and exposure visibility, response planning and risk prioritization for your organization.

Session 6

Technical Insights for Security Practitioners

This session will share experience highlighting the hacker methods and security learnings and the elements necessary to respond. Learn from first-hand experience how to improve protection, detection, and response capabilities against these attacks.

bottom of page