AGENDA
18 June 2025
9AM-5.30PM SGT
SINGAPORE
Registration and welcome coffee
08.30 AM
CHAIRPERSON’S OPENING REMARKS
9:00 AM
Innovation & Resilience: Strategizing for Sustainable IT Operations in a Dynamic Geopolitical Environment
- Harnessing technology to enhance organizational resilience amid geopolitical disruptions
- Pioneering IT innovations to tackle challenges arising from global political shifts
- Strengthening international collaborations while mitigating geopolitical risks
- Future-proofing IT strategies: How CIOs can navigate and thrive in an era of geopolitical uncertainty
9:10 AM
Cloud Continuum: Balancing Scalability, Governance, and Risk Management
- Developing strategies to align cloud scalability with evolving business priorities
- Implementing effective governance models to ensure comprehensive control over cloud environments
- Identifying and mitigating security risks in multi-cloud and hybrid architectures
- Harnessing automation to enhance resource efficiency while maintaining strong governance and oversight
9:35 am
CapEx vs. OpEx: Optimizing IT investments in the XaaS Era
- Rethinking IT budgeting strategies to align with evolving technology investments
- Striking the right balance between CapEx and OpEx to meet short-term needs and long-term objectives
- Anticipating IT infrastructure and service demands while ensuring scalability for future growth
- Establishing and utilizing KPIs to evaluate the effectiveness of IT investments: proven methodologies and best practices
9:55 am
Networking Coffee Break
10:25 am
Executive Roundtable Discussion
This dynamic session features CIOs and CISOs to engage in an intimate, interactive discussions foster deep insights and actionable strategies, facilitated by an industry-experts empowering leaders to tackle pressing issues with fresh ideas and collaborative solutions.
Roundtable 1: Maximizing IT Value: Strategic Spending in Hybrid and Multicloud Environments
With the growing adoption of hybrid and multicloud strategies, IT leaders must navigate complex decisions to ensure resources are allocated effectively. This roundtable will delve into best practices for achieving cost efficiency, enhancing performance, and maintaining robust security—all while addressing budget constraints. It will discuss strategies for optimizing workloads across cloud platforms, prioritizing IT investments, and aligning expenditures with overarching business objectives.
Roundtable 2: Defend as One: Harnessing Cross-Company Collaboration for Cybersecurity
In an increasingly interconnected digital world, cyber threats spare no organization. By working together, companies can unlock the potential of collective defense, sharing threat intelligence and fortifying the broader ecosystem. This roundtable delves into the advantages, obstacles, and actionable strategies for building impactful partnerships to tackle cyber risks as a unified front.
Roundtable 3: The Rise of Agentic AI: Navigating Security, Governance, and Compliance Challenges
Gartner predicts that by 2028, 15% of work decisions will be made autonomously by agentic AI, revolutionizing business operations. This session will explore its potential impact, address security risks, and examine how agentic AI can enhance operational security. We will also outline essential controls, governance, and security measures to ensure its safe and compliant integration.
Roundtable 4: Building the High-Impact IT Team: Driving Innovation, Collaboration, and Leadership for the Future
In the fast-evolving IT landscape, creating a high-impact team demands more than technical proficiency—it calls for nurturing a culture of innovation, teamwork, and agility to meet shifting business goals. This roundtable delves into strategies for structuring IT teams to address complex challenges, embrace creative problem-solving, and implement transformative technologies while ensuring operational efficiency. Attendees will also explore leadership development programs designed to equip the next generation of IT leaders with the skills to navigate change and support seamless succession planning.
Roundtable 5: Enhancing Detection with Threat Intelligence: Leveraging Real-Time Insights for Proactive Security
With cyber threats growing increasingly complex, real-time threat intelligence has become essential for strengthening detection and response mechanisms. This roundtable discussion will delve into practical approaches for embedding actionable intelligence into security frameworks to anticipate and counter emerging threats. Participants will exchange insights on strategies for leveraging real-time data, addressing operational challenges, and optimizing the role of threat intelligence in enhancing detection and incident response effectiveness.
10:55 am
Key takeaway sharing by Roundtable Discussion Facilitator
11:35 am
Networking Lunch
12:15 pm
From Technical Debt to Digital Resilience: Overcoming Barriers in a Zero-Trust Transformation
- Migrating legacy systems while ensuring operational stability
- Fostering alignment and adoption of zero-trust principles
- Integrating AI and digital-first strategies to minimize technical debt
- Leveraging cloud-native tools for scalable and secure environments
1:25 pm
Bridging the Gap: Tackling Talent Shortages and Skill Gaps in the Age of Digital Transformation
- Attracting and retaining top IT talent skilled in AI, automation, and cloud
- Developing internal talent through targeted training and academic partnerships
- Leveraging AI tools to enhance workforce efficiency and address skill gaps
- Fostering collaboration and continuous learning for seamless digital transformation
1:45 pm
Combatting Disinformation in the AI Era: Prevention, Detection, and Response
- How generative AI is amplifying disinformation and its evolving impact
- Real-time strategies for detecting and mitigating AI-driven disinformation risks
- Building responsible AI systems with transparency, fairness, and accountability
- Preparing for and managing the reputational and financial risks of disinformation attacks
2:10 pm
Sustainable IT Operations: Driving Green Tech Transformation
- Aligning eco-tech initiatives with ESG goals to deliver business value
- Overcoming challenges like cost, integration complexity, and the lack of benchmarks
- Leveraging change management, partnerships, and incentives for a seamless transition
- Establishing methods to measure and report IT carbon footprints for compliance and transparency
2:35 pm
Doing More With Less: Balancing CISO Future Time and Cybersecurity Resource Allocation
- Aligning resources with high-risk areas and organizational priorities
- Ensuring ROI from technology and training for threat resilience
- Leveraging data insights to anticipate threats and optimize resources
- Upskilling teams for maximum impact within budget limits
2:55 pm
Networking Tea Break
3:20 pm
Maximizing IT Investment Value: A Product-Based Approach to Business Success
- Foster IT-business collaboration to align priorities and address challenges
- Use clear metrics to evaluate IT investments and ensure stakeholder transparency
- Cultivate a culture of co-ownership for IT products to drive organizational success
- Optimize IT investments through a product-based approach for agility and measurable outcomes
3:50 pm
Measure, Communicate, Eliminate: Building a Proactive Cyber Risk Management Framework
- Leveraging advanced analytics and frameworks to measure and prioritize risk effectively
- Translate cyber risk metrics into actionable insights for leaders
- Identify and address high-risk areas to minimize exposure
- Integrating continuous monitoring and adaptive responses into cyber risk management to stay ahead of evolving threats
4:10 pm
Future-Proofing IT Operations: CIO and CISO Strategies for 2025
- Balancing innovation with risk management and security
- Crafting compelling board proposals for IT investments
- Maximizing ROI in resource-constrained environments
- Leveraging disruptive technologies for efficiency, security, and competitive edge
4:45 pm
Closing Remarks
5:15 pm
End of the conference
5:30 pm
APPY TO PARTICIPATE
We curate exclusive C-level events by personally vetting each participant.
This meticulous approach ensures a high-quality network, fostering interactions among true peers.
By expressing interest in joining our exclusive C-suite events, you unlock access to future programs.





