bermix-studio-wJ7atxTNeQE-unsplash (1).jpg



23rd May 2022 (Mon) - 25th May 2022 (Wed)

1:00 - 2:00 PM



Yellow Magenta Black White Neon Scifi YouTube Channel Art.png

Learn how to survive a critical data breach from leading cybersecurity experts

According to IBM case study in 2018, on average, companies take about 197 days

to identify and 69 days to contain a breach * When a company experiences a data breach,

one critical mistake is not following their incident-response plan or worse yet not having

a plan in place.

The first 48 hours after the discovery of a data breach are critical, and pre planning allows

many vital tasks to be put immediately into action. Often, it’s not what happens in the

first 48 hours of a data breach, it is what a company has done in advance to prepare and

understand the actions to take when a data breach occurs.

Stevenson Huréca and jointly with our Principal Thinking Dimension Global, are proud

to present a mini-series of thought-leadership lunch-bite forum on Incident Response

Management capability in response to Cybersecurity attacks and social engineering scams.


(* Source:  2018 Cost of Data Breach Study: Impact of Business Continuity Management).


Be inspired by our speakers made up of key industry figures and thought leaders.

anthony-lim-removebg-preview (2)_edited.



Fellow, SUSS

Anthony has nearly 25 years professional experience as a cybersecurity pioneering professional, advocate, consultant, instructor, auditor and business leader in the Asia Pacific region, and is competent in many various aspects of cybersecurity, his recent and current pursuits being application security, cloud security, OT security and Smart/Safe cities. 

Anthony is a long-time popular public speaker and content contributor at many business, industry, academic and government conferences and media (print, broadcast, internet) in the region, and interviewed often on Singapore TV News.  

Anthony has sat on several government cybersecurity committees in the region, has an MBA in International Economics and is a life alumnus of the University of Illinois, Urbana-Champaign.

Other qualifications and appointments:

Advocate,; Director,

Fellow, cybersecurity & governance, school of business, Singapore University of Social Science Adjunct Instructor, Specialist Diploma in Cyber-security Management (graduate program) ISC2 CCSP (cloud security professional technical certification) Devt Committee & first AP Instructor ISC2 CSSLP (software security professional technical certification) first AP holder & evangelist ISO-27001 Lead Auditor; ITIL, CCSK, CCAK



Senior Advisor, CCIS

Director of Cybersecurity,

Nanyang Technological University

Christopher Lek has over 20 years of professional experience spanning across the telecommunication, financial sector as well as global conglomerates. He held different roles from governance, risk management, security architecture to cyber defense. He was recognized as one of the top 30 Cyber Security executives for driving business value, leadership and influencing change in the inaugural CSO30 ASEAN awards 2021.

Christopher is currently the director of cyber security in Nanyang Technological University. He is an adjunct lecturer in a local tertiary institution and an authorized instructor with (ISC)². He is certified in CCISO, CISSP, PMP, CIPM, CDPSE and ITIL.


In addition, he held several technical certifications in digital forensic and incident response, malware analysis, and industrial control security.



23rd May 2022 (Mon)

1:00 - 2:00 PM

Welcome and Introduction

CISO: Is Your IRM Working ?

Q & A 

Sharing his past experiences from consulting many large clients on why many large clients failed in their Incident Response Management (IRM) in spite of investing millions in formulating Standard Operating Procedures (SOP) and process.

anthony-lim-removebg-preview (2)-modified.png


 Fellow, SUSS


25th May 2022(Wed)

Welcome and Introduction

1:00 - 2:00 PM

THE “HACKS” In The First 48 Hours (Post Cyber-attack)

Q & A 

Sharing past case studies from his many Cyber & IT Operation experiences on failure and best practices

(the “Hacks”)



Senior Advisor, CCIS
Director of Cybersecurity, Nanyang Technological University



Organized By


Global Strategic Partner


Powered By