CyberSecMalaysia Conference 2023
Kuala Lumpur, Malaysia
Strengthening Cybersecurity Landscape in Malaysia
About the event
CyberSecAsia series events are aligned with the vision of "Cyber Security in the Age of Digital Transformation", it’s designed for security professionals across various sectors to discuss and debate on challenges and solutions of its digitalization.

The CSA roadshow event will gather 300 senior security experts each edition such as CIOs, CSOs, Compliance Officers, Security Architects, IT managers, Cloud architects, and Digital Transformation Directors, from government, education, industrial, public sector, enterprises, consumer businesses, and more. It’s a two-day conference with 40+ speakers and panelists from various backgrounds to share their insights, knowledge, and best practices on various trendy topics such as #Cyber threat intelligence #Data Security in a Zero-Perimeter World #Security of Things #Payment & Transaction Security #Privacy in Digital Age #Security in DevOps. The event format is very innovative and engaging, with essential insights, worked case studies, peer networking, and access to industry-leading suppliers – creating an opportunity for you to engage with them.

There will also be an exhibition with roughly 20 exhibitors showcasing the latest technologies and innovations globally for the security industry. The event is the ideal platform to connect security leaders and to get updated, inspired & marketed in the market. The event is the most critical cyber security innovation-themed gathering for security officers and solutions providers.
Cyber Security in Financing Service / Technology
FinOps / AIOps / ML / FinSecurity
Banking Trojan & Ransomware / Malware Attacks
Leading digital transformation escorting digital finance
IoT and Machine Learning
Cloud Security / Cloud Native & Opensource
Zero Trust Security: Capitalizing on the Adoption Wave
Privileged & Identity Access Management
Adopting a Zero Trust to Cloud Security
Key topics
  • 10,000 +

    Registered Members

  • 77%

    CISOs, IT Head, CIOs, CTOs, DPOs etc.

  • 1,000+


  • 100+


Attendees Breakdown
  • Government & Public Services

  • Manufacturing & Logistics

  • Travel/ Hospitality

  • Healthcare

  • Education/ Entertainment

  • Infrastructural Transportation

  • Construction/ engineering

  • Digital/ ICT/ Data Solutions

  • Banking/financial services

  • Aviation

  • FMCG / retail & eCommerce

  • Healthcare
  • 9.11%
    Banking / Finance
  • 9.3%
    Retail and eCommerce
  • 9.5%
    Public Sector and Infrastructure
  • 17.5%
  • 12.4%
  •  3.94%
  • 3.41%
    Leisure, Hospitality
  • 11.29%
    Payment Cards
  • 5.95%
  • 6.9%
  • 9.11%
    Management (CEO/VP/COO/CTO)
  • 9.3%
    IT and Security Department
  • 9.5%
    Risk Control, Compliance
  • 17.5%
  • 12.4%
  •  3.94%
    Innovations and Digitalization
  • 3.41%
  • 11.29%
  • 5.95%
    Business Development
  • 6.9%
    Research and Consulting
  • Dato’ Ts Dr Haji Amirudin Abdul Wahad
    Cybersecurity Malaysia
  • Ts. Saiful Bakhtiar Osman
    Head of IT - APAC
    (Company confidential)
  • Izzat Aziz
    Director - Technology, Risk and Cybersecurity
  • Dr. Carrine Teoh
    Bond Holdings
  • Suresh Balachandran
    Chief Information Security Officer (CISO)
    Touch n Go
  • Naveen Chantiran
    BIS APAC Information Security Officer
    Air Liquide
  • Tanvinder Singh

    Director - Cyber Security and Privacy - Southeast Asia

    PwC South East Asia Consulting
  • Enoch Rajendran
    Associate Director (Information and Cyber Security) Technical Controls Testing
    Standard Chartered Bank
  • Soumo Mukherjee
    Head of Cyber Security/CISO
  • Joseph Yong
    Head of Technology Information Security Office
    OCBC Bank
  • Toh Shang Yee
    Head of Information Security (CISO)
  • Ruban Bala
    Senior Principal - 5G Security Senior
    Digital Nasional Berhad
  • Nilesh Timbadia
    Chief Information Officer
    Port of Tanjung Pelepas
  • Dr. Manmeet Mahinderjit Singh
    Associate Professor
    Universiti Sains Malaysia
  • Jia Yee Low
    Chief Technology Officer
    Kenanga Group
  • Exhibition

    20+ solutions

    providers technology

    companies from around

    the world gather to display their latest cyber solutions. Additionally, governmental bodies present their cybersecurity programs and initiatives.

  • Conference

    Heads of central banks, gov officials, C-level executives,

    entrepreneurs, experts,

    and other top-tier representatives and officials have a unique opportunity to participate in panels, and stand-alone slots on a variety of topics concerning the retail banking sector

  • One to One Partnering

    Sponsors will receive a

    delegate list one week prior the event with the attendees name and job titles, and selected sponsors are privileged to make a wish-list of their potential clients, we will pre-arrange those one to one meetings and it will be conducted in a private room

  • Networking

    Extensive networking Opportunities at this

    summit including speed dating, gala lunch, tea break session, cocktail party. A Must attend event to connect, engage with your corporate buyers and join discussions about the most relevant trends in cybersecurity.

Running Agenda

09:30 – 09:50 AM
Cybersecurity Landscape of Malaysia
Overview of Malaysia's digital landscape and its importance to the economy
Overview of the National Cyber Security Policy and Strategy
The challenges faced by businesses in implementing effective cyber security measures in Malaysia
The role of public-private partnerships in strengthening cyber security in Malaysia
09:55-10:15 AM
Accelerating Secure Digital Transformation with Zero Trust Architecture
Zero Trust model for larger organizations and complex environments, and the unique challenges this presents.
10:20 - 10:40 AM

Zero Trust Concepts to Achieve Cyber Defense-In-Depth

-Zero Trust security model and its key concepts, as well as the benefits and challenges of implementing it
- Practical guidance for adopting Zero Trust in orgs, which will enable them to achieve a more effective Cyber Defense-In-Depth strategy and protect their valuable asset
11:00 - 11:40 AM
Cloud Transformation: Accelerating the Journey Through Security, Performance and Scalability
Cloud transformation has become an increasingly important focus for organizations looking to modernize their IT infrastructure, improve their agility and flexibility, and gain a competitive edge in the market. This session will discuss security, performance, scalability
11:45-12:05  PM
Panel: Emerging Threats and Best Practices for Cloud Security: Navigating the Evolving Landscape
-Latest trends and threats to cloud security
-Best practices and strategies for protecting cloud infrastructure and data
How organizations can stay ahead of the game to ensure the safety of their assets

13:30 - 13:50 PM

DevSecOps Pipeline: Integrating Security with DevOps Model

- Tips how DevOps and security integration can help to reduce the risk of security breaches, improve code quality, and increase the speed of software development
- Challenges of implementing a DevSecOps pipeline
- The future of DevSecOps, and how it is likely to evolve in response to emerging technologies and changing security threats
13:55 - 14:20 PM
Using Real-Time Data to get to [Mobile] DevSecOps 2.0

- Comprehensive and integrated approach to DevSecOps 2.0 in mobile development

- Importance of using data analytics to identify and mitigate security risks in real time

14:25-14:45 PM
Zero Trust in the Digital Ecosystem: a Human and Machine Strategy
14:50 - 15:30 PM
Panel: Adopting Zero Trust Security Framework for Long Term Cybersecurity
- Components of a Zero Trust framework, such as multi-factor authentication, least privilege access, micro-segmentation, and continuous monitoring
-Challenges that organizations might face when implementing Zero Trust, such as legacy systems, lack of expertise, and resistance to change
-Integration with other security technologies
15:55 - 16:15 PM

Protecting against Lateral Movement and Ransomware Propagation

15:20 - 17:00 PM
Panel: Security Awareness Against Phishing Attacks Panel
09:30 – 09:50 AM

A Cloud Security Journey to Financial Services Business Transformation

- Benefits and risks of cloud computing in finance
- Various security measures that organizations can implement to secire their cloud environments

- Third-party vendor risk management

9:55 - 10:35 AM

Panel: Cyber Security in Financial Services Panel

-Various types of cyber threats faced by the finance industry
-Tips in implementing robust security measures to stay ahead of cyber threats, including stronger encryption, multi-factor authentication, and more frequent security assessments, etc.

-Incident response and business continuity planning for financial institutions

11:00 - 11:20 AM
Achieve Your Cybersecurity Goals with AI, ML, & Data Center Automation
-Overview of the challenges organizations face in achieving their cybersecurity goals nd how AI, ML, and data center automation can help
- Best practices for implementing AI, ML, and data center automation in cybersecurity
11:25 - 12:05 PM

Panel: AI/ML and the Human Factor: Addressing the Cybersecurity Skills Gap

-Navigating the Intersection of AI and Cyber Security to improve resilience
- Collaborative approach to addressing the cybersecurity skills gap, with organizations working together to develop and share best practices and training programs

13:30 - 13:50 PM

Balancing Security and Usability: Strategies for Effective IAM in the Modern Workplace

-Tradeoff between security and usability in IAM

-Balancing security and usability in IAM

-How to implement effective IAM strategies in the modern workplace

13:55 - 14:20 PM

The Human Firewall: Building a Culture of Security Awareness

Strategies for building a culture of security awareness within organizations

The role of employee training and education in promoting social engineering awareness and prevention

14:25 - 14:45 PM

Exposure Management in Enterprise Security Benchmarking your security posture

14:50 - 15:30 PM

Managing the Risks of Legacy IoT Devices

Mitigating IoT security threats in 2023

Risk Management Strategies: device segmentation, network monitoring, and vendor management

15:55 - 16:15 PM

Zero Trust Architecture: The Future of Data Security

16:20 - 17:00 PM

Panel: Ransomware: Prevention, Detection, and Response Strategies

Prevention, detection, and response strategies for ransomware

Registered VIP Delegates from
  • Knowledge sponsor
    NETAND, A complete Identity Management and Privileged Access Management Solution with Global Standards. HIWARE, our IM and PAM solution, will fulfill your privacy requirements and protect against privacy violations, also secure your business from cyber threats and improve engineering productivity.

    Learn more about Netand's solutions:
  • Exhibitor sponsor
    Founded in 2000, Synology creates network-attached storage (NAS), IP surveillance solutions, and network equipment that transform the way users manage data, surveillance systems, and networks in the cloud era. By taking full advantage of the latest technologies, Synology is committed to delivering products with forward-thinking features and best-in-class customer service.

    Learn more about Synology's solutions:
  • Exhibitor sponsor
    At ThriveDX, we're dedicated to addressing the human factor in cybersecurity, by solving the talent shortage and skills gap in the industry. Our mission is to tackle the human risk challenge by providing solutions for reskilling the workforce and upskilling the industry. Through our comprehensive enterprise product suite, we offer end-to-end solutions for cybersecurity education and training, catering to every member of the organization, including general employees, developers and DevOps, IT, security professionals, and executives.

    Learn more about ThriveDX's solutions:
Event partners

As one of the largest B2B Conference Organizers in Asia, Escom Events possess 9 event brands that cover 10+ Asia countries. We do large-scale conferences usually ranging from 200 to 1000 attendees per event. All of our conferences are industry-focused and it is limited only to senior-level business executives and government officials.

CyberSecAsia is the one and only decision makers’ gathering for CISO and information security experts in Asia. It provides in-depth talks and exclusive networking opportunities. Escom has created this platform for developing partnerships and strategies to highlight the latest technologies that are ensuring the safety and security of organizations.
Media Partner

A dedicated media provider for security and technology professionals, as well as end-users across multiple channels.
Media Partner

Connecting security and technology professionals to the latest events, education and technology across a global security domain.
Media partner

ACN Newswire supports Asian companies and organizations with press release distribution to stakeholders in Asia and worldwide -- institutional investors and analysts, individual stakeholders, financial & trade media and the Internet. Today, ACN Newswire is the globally recognized press release distributor from the region, in simplified & traditional Chinese, Korean and Japanese as well as English.
Strategic Partner

Committed to Accelerating Global Digital Transformation Through Technical Standardization
The DAOPS Foundation is a non-profit organization (NPO) committed to accelerating global digital transformation through technical standardization. It was founded in 2018 and is registered in Singapore.
Book My Ticket
End User Pass
Sponsorship Opportunity
CyberSecMalaysia will launch in May 2023. Register now!
Send us a Message

Troy Tao

VP- CyberSec/ DevOps/ Cloud/ Digitalization


Princess Flores
CyberSec Events Producer
Phone: +63 916 680 9756

You can also send us a message via the form on the right.

Your mobile number