CyberSecMY Conference 2025

Shaping a Future Built on Digital Resilience
May 28 - 29, 2025 | W Hotel Kuala Lumpur
#CSMY2025
Days
Hours
Minutes
Seconds
Building Resilience, Fortifying Defenses

CyberSecMY Conference 2025 (CSMY2025) is a premier event tailored for security
professionals across various sectors in Malaysia. The conference serves as a pivotal platform for in-depth discussions, addressing challenges, and sharing the best practices in the rapidly evolving landscape of the security industry.

With over 40+ distinguished speakers and panelists hailing from diverse
backgrounds, CSMY2025 guarantees in-depth understanding of the most recent
cybersecurity trends, threats, and solutions.

CSMY2025 is expected to attract more than 400 senior security experts from varioussectors in the country. Representatives from diverse fields such as financial institutions, retail, IT, healthcare, public sector, enterprises, and consumer
businesses will converge to share insights and expertise.

Additionally, there will be an exhibition area hosting approximately 20 exhibitors,
presenting the latest technologies and innovations in the global security industry.

Event Highlights - CyberSecMY 2024 Conference

The CyberSecMY 2024 Conference, held on May 29 & 30, 2024, in KLCC, gathered 400+ attendees, 40+ speakers, 10+ sponsors and exhibitors, and 20+ sessions.

Delegate Breakdown
  • 50+
    Speakers
  • 300+
    Attendees
  • 50+
    CISO, CTO, CIO, IT Directors, VP of IT etc.
  • 50+
    Information Technology Officers
  • 70%
    C-level Executives
  • 25+
    Solutions Providers

CyberSecMY Running Agenda

Shaping a Future Built on Digital Resilience

08:30 AM
Opening Remarks
08:40 AM
Keynote Speech
Facing The Quantum Threat: Malaysia's Path to Post-Quantum Resilience
Keynote Speaker: Ir. Dr.Megat Zuhairy Megat Tajuddin, Chief Executive at National Cyber Security Agency (NACSA)
9:00 AM
Solo Speaking
Cyber Resilience Begins with Identity: Real-World Lessons from the Frontline
Speaker: Sivachanthiran Belasamy, Founder & CEO at Falaina
In today’s threat landscape, identity is the battleground — and often the weakest link. From credential-based attacks to privileged misuse and lateral movement, adversaries are exploiting the very foundation of enterprise trust: access. For modern organisations, especially those in regulated sectors, securing identity is no longer optional — it's the starting point for building true cyber resilience.

In this session, Sivachanthiran Belasamy, Founder & CEO of Falaina, shares real- world frontline lessons from defending enterprises against increasingly sophisticated identity-based threats. Drawing from practical case studies, he outlines how leading organizations are rearchitecting their Identity and Access Management (IAM) and Privileged Access Management (PAM) programs to harden defenses, shrink the attack surface, and improve governance and
oversight.

Attendees will gain insights into how a converged identity approach enhances visibility across users, systems, and hybrid cloud environments — enabling earlier threat detection, adaptive access control, and seamless compliance with regulatory frameworks such as RMiT and other regional standards.
9:35 AM

Solo Speaking

High Risk Users & Where To Find Them

Speaker: Garrett O’Hara, Senior Director of Sales Engineering at Mimecast
Despite advancements in cybersecurity tools, human error remains the leading cause of breaches, with phishing attacks, insider threats, and credential misuse continuing to dominate the threat landscape. Independent research highlight 68% of cyber incidents stem from human error, reinforcing Mimecast’s human-risk research revealing that almost 10% of employees account for 80% of security incidents.

My session will explore the factors contributing to user vulnerabilities that lead to certain individuals being classed as high-risk.

You will gain insights into measuring user risk effectively and implementing tailored strategies to enhance cybersecurity across their organizations. My session will also highlight how a personalized and adaptive security approach can provide customized security measures for each user. By focusing on these high-risk individuals, organizations can safeguard their workforce while maintaining operational productivity.
10:00 AM
Solo Speaking
Security Beyond Silos with Continuous Threat Exposure Management
Speaker: Kannan Velayutham, Senior Security Engineer at Tenable
  • How unified visibility, seamless workflows, and automated threat management accelerate decision-making.
  • Discover best practices for improving collaboration between teams, streamlining security operations
  • How to align security objectives with business priorities, ensuring a proactive, risk-driven approach to cybersecurity.
10:25 AM
Networking break
10:50 AM
Solo Speaking
Managing the Changing Attack Surface with Intelligence-Led Zero Trust Security
Speaker: Adam Biviano, Senior Director, Sales Engineering at Recorded Future
The modern attack surface changes faster than traditional security approaches can keep up. This presentation shows how embedding cybersecurity intelligence into Zero Trust architectures boosts the ROI of existing controls and personnel, improves operational efficiency, and equips defenders to meet attackers head-on—shrinking detection windows and cutting false positives. Attendees will learn the benefits of cybersecurity intelligence extend beyond simple threat feeds and how to achieve tangible business outcomes with an integrated view of different risk types such as brand abuse, cyber-threats, system vulnerabilities, third-party, malware, geopolitical, identity and payment fraud.
11:10 AM
Solo Speaking
From Evidence to Execution - The Future of Cloud Security Defense
Speaker: Vignesh Kannan, Head of Global Solution Architects – Strategic Solutions Engineering for APJ at SentinelOne
11:35 AM
Solo Speaking
Elevating Data Security Strategy with AI: Transforming Protection in the Digital Age
Speaker: Terrence Tan, Security Consultant at Forcepoint
In today’s rapidly evolving digital landscape, traditional data security methods are increasingly challenged by sophisticated cyber threats, data breaches, and compliance pressures. Artificial Intelligence (AI) offers a transformative approach to enhance data security strategies, enabling organizations to proactively protect their sensitive information while adapting to new and emerging risks.
This session will explore how AI can elevate and modernize data security strategies, providing both automation and intelligence for threat detection, data policy enforcement, risk assessments and AI-Mesh content recognition that help organizations detect threats faster, respond more effectively, and predict vulnerabilities before they can be exploited.
11:55 AM
Panel Discussion
Reinventing Identity and Data Security for Next-Gen Financial Cyber Threats
Panel Moderator:
  • Tanvinder Singh, Cyber Security & Privacy Director at PwC Malaysia

Panelists:
  • Sivachanthiran Belasamy, Founder & CEO at Falaina
  • Malini Kanesamoorthy, Chief Information Security Officer at Ambank
  • Ts. Dr. Ismamuradi Abdul Kadir, Chief Information Security Officer at Bank Muamalat
  • Chee Lung Yuen, CISO, Technology Risk Management & BCM at AIA Malaysia
12:35 PM
Lunch Break
1:40 PM
Panel Discussion
Email Threats and Human Risk: Building Cyber Resilience in the Digital Era
Panel Moderator:
  • BK Soon,Asia Vice Chair at CREST

Panelists:
  • Garrett O’Hara, Senior Director of Sales Engineering at Mimecast
  • G Saravanan, Group CIO at Thomson Hospital Kota Damansara
  • Ruban Bala, Head of Infrastructure and Application Security Risk at YTL Sea Digital Bank
  • Toh Shang Yee, Head of Information Security (CISO) at MCIS Berhad
  • Amir Abdul Samad, Head, Cyber Security (CISO) at Petronas
2:25 PM
Solo Speaking
Fortifying Against the Rising Tide: Leveraging MDR to Combat the Evolving Ransomware Threat
Speaker: Kevin Goh, Senior Sales Engineer at Sophos
Ransomware remains a severe cyber threat with significant impacts. The average cost to remediate an attack surged to $2.73 million—a 50% increase from the previous year. Prolonged recovery times highlight the urgent need for comprehensive response strategies. Sophisticated attacks continue to strain security teams, with 95% reporting significant operational challenges. These findings emphasize the critical importance of reinforcing ransomware defenses and strengthening recovery plans.

Robust endpoint protection is essential. Sophos Managed Detection and Response (MDR) provides 24/7 support to strengthen your security, helping to reduce costs, minimize recovery time, and ensure business continuity against this formidable threat.
2:50 PM

Solo Speaking

WE ARE SASE

Speaker: Arthur Ng, Regional Sales Director at CATO Networks
Cato SASE (Secure Access Service Edge) is a cloud-native platform that converges networking and security into a single solution. It simplifies IT infrastructure by combining SD-WAN, network security (like firewall, secure web gateway, and zero trust access), and global connectivity into one unified service. Delivered from a global cloud backbone, Cato SASE provides secure, optimized access to applications and data—whether users are in the office, at home, or on the move.
3:10 PM
Networking Break
3:35 PM

Solo Speaking

From Endpoint to Ecosystem - Bespoke Security Solutions for Adaptive, Integrated Cybersecurity
Speaker: Michal Chovančík, Country Manager at ESET
4:00 PM
Panel Discussion
Transformative Cloud Security Strategies for the Modern Enterprise: Challenges and Innovations
Panel Moderator:
  • Fabian Hoo, Executive Director at EC-Council Global Services
Panelists:
  • Kannan Velayutham, Senior Security Engineer at Tenable
  • Nazaruddin Adha Md Noor, Deputy Chief Technology Officer at Takaful Malaysia
  • Irfan Ismail, Chief Information Secuerity Officer at AEON Bank
  • Baljit Singh, Head Strategy, Planning and Architecture at Digital Nasional Berhad
5:00 PM
End of Conference
09:00 AM
Keynote Speech
Strengthening Cyber Defenses: Strategic Imperatives for National Cyber Security in the Malaysia
Keynote Speaker: Wan Roshaimi Wan Abdullah, Chief Technology Officer (CTO) at CyberSecurity Malaysia
09:25 AM
Solo Speaking
Combating Fraud: Deepfakes in the Era of AI
Speaker: Johan Fantenberg, Director of Product Marketing at Ping Identity
Can we trust what we see and hear?

Increasingly sophisticated, well equipped and well-informed adversaries are creative and innovative in how fraud campaigns are designed and executed. The proliferation of AI adoption, in combination with access to personal data from open sources, such as social media and data breaches, boosted attacks on our identities with laser sharp precision and in very convincing ways. The use of advanced deepfake generation tools and powerful compute resource challenges our senses, our realities, and therefore, impede our digital defence stance.

Join this session to learn tested considerations for multi-layered identity security solutions, including using AI/ML, to stand a chance against deepfake attacks.
9:50 AM

Solo Speaking

Jumpstart 2025: AI-Powered Connectivity Cloud Security in Critical Infrastructure Protection

Speaker: Jeremy Jorrot, Regional SASE Specialist at Cloudflare ASEAN
10:15 AM
Solo Speaking
Redefining Protection: Strategies for Securing ICS / Operation Technology
Speaker: Eric Tan, Regional Sales Engineer at Txone
Explore innovative strategies to bolster ICS and OT security against modern threats. The session will walk you through the practical strategies on how to enhancing cyber security for Operational Technologies. Embrace a redefined and proactive defence approach to securing industrial operations and to ensure resilience and security.
10:35 AM
Networking Break
11:00 AM
Solo Speaking
Topic: To be Announced
Speaker: Kimyoung Kim, Partner Account Director & Worldwide Sales, Enterprise Security Group, Broadcom
  • Understanding Gen AI why and how it helps business.
  • Understanding user’s malicious usage of Gen AI, what is the new risk
  • How we adopt this new technology with caution.
  • How Symantec helps
11:25 AM
Solo Speaking
Protecting your Digital Future: Advanced AI & API Security with F5
Speaker: Ron Ho, Senior Manager, Solutions Engineering, F5
11:50 AM
Panel Discussion
Securing Critical Infrastructure in the Age of AI and Cloud Connectivity
Panel Moderator:
  • Prof. Dr. Ho Chin Kuan, Vice Chancellor, Asia Pacific University of Technology and Innovation
Panelists:
  • Jeremy Jorrot, Regional SASE Specialist at Cloudflare ASEAN
  • Bapu Shinde, Vice President – Sr. Principal Cyber Security Consultant at Standard Chartered Bank
  • Sina Manavi, Global Head of Cloud Security at DHL IT Services
12:30
Lunch Break
1:30 PM
Panel Discussion
Generative AI in Cyber Defense:Navigating Opportunites and Safeguarding Against Emerging Threats
Panel Moderator:
  • Arivindran Saidoo, Partner – Technology, Risk and Cyber Security Advisory at KPMG Malaysia

Panelists:
  • Johan Fantenberg, Director of Product Marketing at Ping Identity
  • Dominic Yew, Chief Information Security Officer at OCBC Bank
  • Aishah Farha Mohd Raih, Chief Information Security Officer at Permodalan Nasional Berhad
  • Nasrin Abg Omar, Head of Cyber Security at Tenaga Nasional Berhad
2:25 PM
Solo Speaking
From Shield to Spear: Bitdefender’sLeap from Endpoint Defense to Offensive Cyber Ops
Speaker: Mohd Hafizul Bin Borhan, Senior PreSales Manager at Bitdefender
2:50 PM

Solo Speaking

Protect your crown jewels with AI-powered Cybersecurity and Resilience Quest Solutions

Speaker: Ronino Tabanan, Solutions Consultant at Quest Software
In today’s threat landscape, no one is immune to ransomware attacks, nation-state actors, or AI-generated fraud tactics. The primary targets? Weakly defended identities, endpoints, and backup systems. So, where should you begin in mitigating these risks?

Join this session to learn how to prioritize your cybersecurity efforts using the Hierarchy of Cybersecurity Needs, and discover proven, risk-reducing safeguards powered by Quest’s AI-driven Cybersecurity and Resilience Solutions—designed to help you strengthen your defenses and significantly reduce your exposure to evolving threats.”
3:15 PM
Solo Speaking
Building Digital Resilience with the SOC of the Future
Speaker: Tengku Shahrizam, Strategic Security Advisor, Asia Region at Splunk
3:40 PM
Panel Discussion
Cyber Hygiene: IoT Cybersecurity Strategies for Enterprise Environments
Panel Moderator:
  • Jaco Benadie, Partner at Ernst & Young Consulting Sdn Bhd

Panelists:
  • Mohd Hanapi Bisri, Head of Group IT at Petra Energy
  • Dr. Manmeet Mahinderijit Singh, Associate Professor at Universiti Sains Malaysia
  • Zainol Zainuddin, CTO - eCommerce Solutions at NTT DATA Payment Services
  • Akmal Nizam, IT Director and Digital Transformation Strategist at Lembaga Tabung Angkatan Tentera (LTAT)
4:30 PM
Networking Session

CyberSecMY Esteemed Speakers

Shaping a Future Built on Digital Resilience

Don't Miss these Exciting Sessions!

CyberSecMalaysia 2025 Sponsors

Shaping a Future Built on Digital Resilience

  • Title Sponsor
  • Diamond Sponsor
  • Diamond Sponsor
  • Diamond Sponsor
  • Platinum Sponsor
  • Platinum Sponsor
  • Platinum Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Gold Sponsor
  • Exhibitor
  • Exhibitor
  • Exhibitor
  • Exhibitor
  • Exhibitor
  • Exhibitor
  • Exhibitor
  • Exhibitor
  • Exhibitor
  • Exhibitor
  • Exhibitor
  • Attending Specialist
  • Key Supporter
  • Lanyard Sponsor
CyberSecMalaysia Series
Registered VIP Delegates
Book Ticket Now
Organizer will be approving your event ticket
after verifying your online booking completion within 24 hours
Event Attendee Pass
$ 498
One (1) participant pass to 2-day event session

Business Matching Networking opportunities

Business lunch, tea breaks, and refreshments
Book my ticket
Sponsorship
Contact Us
Speaking Slot

Exhibition Booth

One to One Meeting

Leads Generation
Contact us
Co-presented by
Get in touch with us

Contact Person

Troy K. Tao | VP- Business Growth

Email: troy.tao@escom-events.com

Princess Flores | Events Producer
E-mail: princess.flores@escom-events.com

You can also send us a message via the form below

REGISTER