Learn how to survive a critical data breach from leading cybersecurity experts
According to IBM case study in 2018, on average, companies take about 197 days
to identify and 69 days to contain a breach * When a company experiences a data breach, one critical mistake is not following their incident-response plan or worse yet not having a plan in place.
The first 48 hours after the discovery of a data breach are critical, and pre planning allows
many vital tasks to be put immediately into action. Often, it’s not what happens in the
first 48 hours of a data breach, it is what a company has done in advance to prepare and
understand the actions to take when a data breach occurs.
Stevenson Huréca and jointly with our Principal Thinking Dimension Global, are proud
to present a mini-series of thought-leadership lunch-bite forum on Incident Response
Management capability in response to Cybersecurity attacks and social engineering scams.
(* Source: 2018 Cost of Data Breach Study: Impact of Business Continuity Management).
Be inspired by our speakers made up of key industry figures and thought leaders.
Risk and Insurance Management Association of Singapore (RIMAS).
A Cloud Business Leader, Enterprise Risk Management Leader (FERM), Board Member (MInstD, MAICD) with special interest in Mentoring, Social Sciences and Artificial Intelligence Governance
Served as Chairman of IT Committee from 2014 to 2018 for RIMAS, Andeed participates actively in proposing IT-Risk related topics for members. Andeed is also a Key Opinion Leader in spaces of reputational risk and emerging technologies for productivity, incident management, crisis management, IT Governance, Risk and Compliance (IT GRC), Enterprise Risk Management and more to bring people and process closer together. He is a regular speaker and a tough leader contributor to a niche Enterprise Risk Management Community focusing on Advanced Technologies as an enabler and Cyber Security Risk.
Andeed joined RIMAS in 2010 as an ordinary member through a Business Continuity event. In 2014, he was elected to the Council and elected to be President from 20 February 2020. He is presently the Operation Director in a major Technology company.
Anthony has nearly 25 years professional experience as a cybersecurity pioneering professional, advocate, consultant, instructor, auditor and business leader in the Asia Pacific region, and is competent in many various aspects of cybersecurity, his recent and current pursuits being application security, cloud security, OT security and Smart/Safe cities.
Anthony is a long-time popular public speaker and content contributor at many business, industry, academic and government conferences and media (print, broadcast, internet) in the region, and interviewed often on Singapore TV News.
Anthony has sat on several government cybersecurity committees in the region, has an MBA in International Economics and is a life alumnus of the University of Illinois, Urbana-Champaign.
Other qualifications and appointments:
Advocate, ISC2chapter.sg; Director, CSCIS.org
Fellow, cybersecurity & governance, school of business, Singapore University of Social Science Adjunct Instructor, Specialist Diploma in Cyber-security Management (graduate program) ISC2 CCSP (cloud security professional technical certification) Devt Committee & first AP Instructor ISC2 CSSLP (software security professional technical certification) first AP holder & evangelist ISO-27001 Lead Auditor; ITIL, CCSK, CCAK
Senior Advisor, CCIS
Director of Cybersecurity,
Nanyang Technological University
Christopher Lek has over 20 years of professional experience spanning across the telecommunication, financial sector as well as global conglomerates. He held different roles from governance, risk management, security architecture to cyber defence. He was recognised as one of the top 30 Cyber Security executives for driving business value, leadership and influencing change in the inaugural CSO30 ASEAN awards 2021.
Christopher is currently the director of cyber security in Nanyang Technological University. He is an adjunct lecturer in a local tertiary institution and an authorized instructor with (ISC)². He is certified in CCISO, CISSP, PMP, CIPM, CDPSE and ITIL. In addition, he held several technical certifications in digital forensic and incident response, malware analysis, and industrial control security.
12:00 - 2:00 PM
Welcome and Introduction
Why is Cyber IRM a Critical Aspect of GRC?
Cyber risk and data protection have catapulted to the forefront of late, as the pandemic accelerated homeworking, online transactions, and ecommerce. Rise of Social Engineering scams are making situation more acute. Companies need to take their Incident Response Management (IRM) seriously and to ensure it is working well. Today, it is an essential element of a comprehensive GRC and cyber strategy in view of the symbiotic relationship between cybersecurity and GRC.
Risk and Insurance Management Association of Singapore (RIMAS)
CISO: Is Your IRM Working ?
Sharing his past experiences in consulting many large clients on why many large clients failed in their Incident Response Management (IRM) in spite of investing millions in formulating Standard Operating Procedures (SOP) and process.
THE “HACKS” In The First 48 Hours (Post Cyber-Attack)
Sharing case studies from his many Cyber & IT Operation experiences on failure and best practises (the “Hacks”)