AGENDA

18 June 2025

9AM-5.30PM SGT

SINGAPORE

15 MAY 2024

9AM-4PM (GMT+8 / SGT)

Pan Pacific Singapore

REGISTRATION AND WELCOME COFFEE

8:30 AM

CHAIRPERSON’S OPENING REMARKS

9:00 AM

Innovation & Resilience: Strategizing for Sustainable IT Operations in a Dynamic Geopolitical Environment

  • Harnessing technology to enhance organizational resilience amid geopolitical disruptions
  • Pioneering IT innovations to tackle challenges arising from global political shifts
  • Strengthening international collaborations while mitigating geopolitical risks
  • Future-proofing IT strategies: How CIOs can navigate and thrive in an era of geopolitical uncertainty

9:10 AM

Cloud Continuum: Balancing Scalability, Governance, and Risk Management

  • Developing strategies to align cloud scalability with evolving business priorities
  • Implementing effective governance models to ensure comprehensive control over cloud environments
  • Identifying and mitigating security risks in multi-cloud and hybrid architectures
  • Harnessing automation to enhance resource efficiency while maintaining strong governance and oversight

9:35 am

TECHNOLOGY
HIGHLIGHT

CapEx vs. OpEx: Optimizing IT investments in the XaaS Era

  • Rethinking IT budgeting strategies to align with evolving technology investments
  • Striking the right balance between CapEx and OpEx to meet short-term needs and long-term objectives
  • Anticipating IT infrastructure and service demands while ensuring scalability for future growth
  • Establishing and utilizing KPIs to evaluate the effectiveness of IT investments: proven methodologies and best practices

9:55 am

PANEL
DISCUSSION

Networking Coffee Break

10:25 am

Executive Roundtable Discussion

This dynamic session features CIOs and CISOs to engage in an intimate, interactive discussions foster deep insights and actionable strategies, facilitated by an industry-experts empowering leaders to tackle pressing issues with fresh ideas and collaborative solutions.

Roundtable 1: Maximizing IT Value: Strategic Spending in Hybrid and Multicloud Environments

With the growing adoption of hybrid and multicloud strategies, IT leaders must navigate complex decisions to ensure resources are allocated effectively. This roundtable will delve into best practices for achieving cost efficiency, enhancing performance, and maintaining robust security—all while addressing budget constraints. It will discuss strategies for optimizing workloads across cloud platforms, prioritizing IT investments, and aligning expenditures with overarching business objectives.

Roundtable 2: Defend as One: Harnessing Cross-Company Collaboration for Cybersecurity

In an increasingly interconnected digital world, cyber threats spare no organization. By working together, companies can unlock the potential of collective defense, sharing threat intelligence and fortifying the broader ecosystem. This roundtable delves into the advantages, obstacles, and actionable strategies for building impactful partnerships to tackle cyber risks as a unified front.

Roundtable 3: The Rise of Agentic AI: Navigating Security, Governance, and Compliance Challenges

Gartner predicts that by 2028, 15% of work decisions will be made autonomously by agentic
AI, revolutionizing business operations. This session will explore its potential impact, address security risks, and examine how agentic AI can enhance operational security. We will also outline essential controls, governance, and security measures to ensure its safe and compliant integration.

Roundtable 4: Building the High-Impact IT Team: Driving Innovation, Collaboration, and Leadership for the Future

In the fast-evolving IT landscape, creating a high-impact team demands more than technical proficiency—it calls for nurturing a culture of innovation, teamwork, and agility to meet shifting business goals. This roundtable delves into strategies for structuring IT teams to address complex challenges, embrace creative problem-solving, and implement transformative technologies while ensuring operational efficiency. Attendees will also explore leadership development programs designed to equip the next generation of IT leaders with the skills to navigate change and support seamless succession planning.

Roundtable 5: Enhancing Detection with Threat Intelligence: Leveraging Real-Time Insights for Proactive Security

With cyber threats growing increasingly complex, real-time threat intelligence has become
essential for strengthening detection and response mechanisms. This roundtable discussion will delve into practical approaches for embedding actionable intelligence into security frameworks to anticipate and counter emerging threats. Participants will exchange insights on strategies for leveraging real-time data, addressing operational challenges, and optimizing the role of threat intelligence in enhancing detection and incident response effectiveness.

10:55 am

Key takeaway sharing by Roundtable Discussion Facilitator

11:35 am

Networking Lunch

12:15 pm

From Technical Debt to Digital Resilience: Overcoming Barriers in a Zero- Trust Transformation

  • Migrating legacy systems while ensuring operational stability
  • Fostering alignment and adoption of zero-trust principles
  • Integrating AI and digital-first strategies to minimize technical debt
  • Leveraging cloud-native tools for scalable and secure environments

1:25 pm

TECHNOLOGY
HIGHLIGHT

Bridging the Gap: Tackling Talent Shortages and Skill Gaps in the Age of Digital Transformation

  • Attracting and retaining top IT talent skilled in AI, automation, and cloud
  • Developing internal talent through targeted training and academic partnerships
  • Leveraging AI tools to enhance workforce efficiency and address skill gaps
  • Fostering collaboration and continuous learning for seamless digital transformation

1:45 pm

PANEL
DISCUSSION

Combatting Disinformation in the AI Era: Prevention, Detection, and Response

  • How generative AI is amplifying disinformation and its evolving impact
  • Real-time strategies for detecting and mitigating AI-driven disinformation risks
  • Building responsible AI systems with transparency, fairness, and accountability
  • Preparing for and managing the reputational and financial risks of disinformation attacks

2:10 pm

Sustainable IT Operations: Driving Green Tech Transformation

  • Aligning eco-tech initiatives with ESG goals to deliver business value
  • Overcoming challenges like cost, integration complexity, and the lack of benchmarks
  • Leveraging change management, partnerships, and incentives for a seamless transition
  • Establishing methods to measure and report IT carbon footprints for compliance and transparency

2:35 pm

FIRESIDE CHAT

Doing More With Less: Balancing CISO Future Time and Cybersecurity Resource Allocation

  • Aligning resources with high-risk areas and organizational priorities
  • Ensuring ROI from technology and training for threat resilience
  • Leveraging data insights to anticipate threats and optimize resources
  • Upskilling teams for maximum impact within budget limits

2:55 pm

CASE STUDY

Networking Tea Break

3:20 pm

Maximizing IT Investment Value: A Product-Based Approach to Business Success

  • Foster IT-business collaboration to align priorities and address challenges
  • Use clear metrics to evaluate IT investments and ensure stakeholder transparency
  • Cultivate a culture of co-ownership for IT products to drive organizational success
  • Optimize IT investments through a product-based approach for agility and measurable outcomes

3:50 pm

Measure, Communicate, Eliminate: Building a Proactive Cyber Risk Management Framework

  • Leveraging advanced analytics and frameworks to measure and prioritize risk effectively
  • Translate cyber risk metrics into actionable insights for leaders
  • Identify and address high-risk areas to minimize exposure
  • Integrating continuous monitoring and adaptive responses into cyber risk management to stay ahead of evolving threats

4:10 pm

Future-Proofing IT Operations: CIO and CISO Strategies for 2025

  • Balancing innovation with risk management and security
  • Crafting compelling board proposals for IT investments
  • Maximizing ROI in resource-constrained environments
  • Leveraging disruptive technologies for efficiency, security, and competitive edge

4:45 pm

CLOSING PANEL
DISCUSSION

Closing Remarks

5:15 pm

End of the conference

5:30 pm

CIO TRACK

Navigating businesses for future ready enterprises - Driving commercial success in a digital era

  • Digital transformations in an AI age, accelerating value creation with focus on consumers and unravelling power of data mesh and fabric for accelerated data product development.
  • Building disruptive thinking in approach to enterprise transformations 
  • Digital platform architecture patterns and principles that drive excellence, enabling organization to thrive in the AI and data-driven landscape.
  • Gain insights into the intricacies of digital strategy at core of business DNA


Sudhanshu Duggal,
CIO | Digital and Business Transformation, Forbes Technology Council

1:20pm

CISO TRACK

Missed Alerts: Detecting Lateral Movement in Network Security Synopsis:

Lateral movement is when attackers navigate through a network after breaching its security, often aiming for sensitive data. Sometimes, security systems don’t catch this movement, allowing attackers to explore the network unnoticed. This gap in detection is a serious risk, as it gives attackers more opportunities to harm the network. The presentation will focus on why this happens and how to improve security to spot these threats sooner.

 

Pasi Karjanmaa, APAC Consulting Sales Engineer, Service Provider, Enterprise & Channels, Gigamon

1:20pm

CIO TRACK

PANEL DISCUSSION: Unraveling the IT Talent Puzzle: Winning Tactics for Attraction, Investment and Keeping The Best

  • Recognize the persistent challenges CIOs face in recruiting and retaining IT professionals.
  • Leverage technology and networking to create a continuous pipeline of potential candidates.
  • Cultivate a workplace environment that promotes collaboration, innovation, and employee satisfaction.
  • Develop a long-term strategy to ensure a resilient and adaptable IT workforce

 

Moderator:
Sudhanshu Duggal, CIO | Digital and Business Transformation, Forbes Technology Council

 

Panelist:
Jawwad Zaki, IT Director, Telenor Asia

Abdel Abatouy, Chief Technology and Information Officer, FCM Travel Asia

Lorena Carbajo Gonzalez, Head of Technology Risk, SC Ventures by Standard Chartered

1:45pm

CISO TRACK

FIRESIDE CHAT: Put Security First: Rethinking remote work security to strike a balance between productivity and safety

  • Explore evolving remote work threats and strategies for defense.
  • Discover technologies and best practices for efficient, secure remote work.
  • Balance flexibility and security in your organization.
  • Provide ongoing security training for remote employees, covering phishing, passwords, and reporting suspicious activity.

 

Interviewer:
Shamal De Silva, Senior Director, Head of IT/IS, REC Group

Interviewee:
Varun Srivastava, APAC Head – CSOC, UBS

1:45pm

CIO TRACK

From Tech Delivery to Strategic Impact: Redefining CIO-CxO Partnerships

  • Transform the CIO’s role into a strategic partner, shifting from tech delivery to driving organizational impact.
  • Cultivate collaborative relationships between CIOs and other CxOs (CEOs, CMOs, etc.) to align tech projects with business goals.
  • Establish a shared vision between CIOs and CxOs to ensure technology investments deliver substantial ROI.
  • Promote cross-functional communication and understanding to bridge the IT-business gap.

 

David Tay, CIO, Asia, Lendlease

2:10pm

CISO TRACK

PANEL DISCUSSION: Navigating the Digital Frontier: Cybersecurity in an increasingly connected world

  • Understand the dynamic landscape of cyber risks and vulnerabilities.
  • Develop an effective incident response plan to mitigate and recover from cyber-attacks.
  • Explore the exponential rise in cyber threats with the expanding digital ecosystem.
  • Learn how CISOs can lead the charge in implementing robust cybersecurity strategies.

 

Moderator:
Ken Soh, CEO, Athena Dynamics

 

Panelist:
Danny Chan, Director, Regional Security Officer, Asia Pacific, Mastercard

Manjunath Pasupuleti, Global Head of IT Security (CISO), ENNOVI

Paul Chua, Cybersecurity Officer, Greater Asia, BD

2:10pm

Networking Tea Break

2:40pm

It Starts With People – Combating Data Loss and Insider Risk

  • Addressing the shifting security landscape in the era of remote work.
  • Exploring modern approaches to insider threat detection and prevention.
  • Developing a comprehensive insider risk management strategy
  • Leveraging data analytics and monitoring tools for improved incident detection

 

David Pravinkumar, Head of IT, InfraCo Asia

3:10pm

Closing Fireside Chat: Seamless Integration: Enhancing Security Within IT Operations Through CIO-CISO Partnership

  • Explore how the traditional roles of CIOs and CISOs have evolved to encompass cybersecurity responsibilities.
  • Discuss why security has become a top priority for CIOs in modern organizations.
  • Highlight the importance of communication, shared goals, and mutual understanding in achieving the best security posture for the organization.
  • Examine the benefits of close collaboration between CIOs and CISOs in achieving a robust security posture.

 

Interviewer:
Bruce Leong, Director Technology & Strategy, Mount Alvernia Hospital

 

Interviewee:
Abdel Abatouy, Chief Technology and Information Officer (CTIO), Asia, FCM Travel Asia

3:35pm

Closing Remarks

4:00pm

End of the conference

4:15pm

APPLY TO PARTICIPATE

We curate exclusive C-level events by personally vetting each participant. This meticulous approach ensures a high-quality network, fostering interactions among true peers.

By expressing interest in joining our exclusive C-suite events, you unlock access to future programs.

Recognized by

PArtnerSHIPs

SPONSORS

COMMUNITY MEMBER CRITERIA

To ensure peer connections and conversations at the highest level, members must meet the following criteria:

• C-level or senior most executive for respective function

My contact information is