We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Cybersecurity Summit: SEA 2023

Search

Clear Expand Collapse

Pivoting Technology From Cost Center to Revenue Generator

Discover how CIOs can position technology as a value creator and revenue generator with insights from Santosh Nair and Sourabh Chitrachar. Explore innovations for new revenue models, IT's role beyond enablement, and overcoming challenges in demonstrating IT's value.

Price
Course duration Duration: 25 minutes

Gen AI: Impressive Enough to Be Dangerous

Learn from Gigi Mathew Thomas, Venkatesh Mahadevan, and Awais Ahmad about governance for generative AI, promoting responsible AI use, and enhancing security solutions to combat AI-enabled threats. Explore AI's potential and risks, including deepfakes and cyberattacks.

Price
Course duration Duration: 35 minutes

Hybrid Workplace: Fad or Future

Explore how CIOs empower hybrid workforces with insights from Anil Kumar Saha and Ivan Irawan. Learn about collaboration tools, evolving workforce needs, cybersecurity, and data-driven strategies for productivity and innovation in hybrid models.

Price
Course duration Duration: 30 minutes

Implementing Zero Trust for Resilient Business: CIO's Role

Join James Thang to explore zero trust’s business implications, challenges, and the CIO’s role. Learn how IT and security teams collaborate to balance security posture with user experience and align zero trust with business goals and risk tolerance.

Price
Course duration Duration: 30 minutes

Integrating Cyber Risk Into Enterprise RMF

Learn from Frankie Shuai, Ken Soh, and Rishi Ganiswaran about aligning cyber risk with enterprise frameworks. Explore strategies for integrating cyber risks into decision-making, risk reporting, and effective mitigation within broader operational goals.

Price
Course duration Duration: 30 minutes

How to Operationalize Privacy in the Digital Era

Lt. Col. Francel Padilla-Taborlupa shares insights on privacy challenges CISOs face. Learn about compliance strategies, cross-team collaboration, and adapting privacy strategies to evolving regulations, AI, IoT, and rapid technological advancements.

Price
Course duration Duration: 25 minutes

How Can CIOs Harness AI, Data, and Analytics

Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.

Price
Course duration Duration: 30 minutes

Balancing Agility & Cyber Resilience

Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.

Price
Course duration Duration: 25 minutes

CISOs' Rebalancing Practices

Learn from Matthias Yeo, Mel Migrino, and Jenny Tan about tackling the cybersecurity talent crunch, building resilient offensive strategies, leveraging automation, and weaving cybersecurity accountability across business functions for enhanced defense.

Price
Course duration Duration: 30 minutes

Conquering Software Supply Chain Insecurities

Learn from Christophe Barel about securing supply chains, adopting shift-left strategies, and managing open-source risks. Explore frameworks for secure coding, automated security-by-design, and faster detection and remediation of supply chain attacks.

Price
Course duration Duration: 25 minutes

Establishing Security in a Multi-Cloud Environment

Ali Abdulla Alsadadi shares insights on managing multi-cloud security. Learn about quantifying risks, tackling API complexities, integrating data, and building offensive strategies to mitigate risks in siloed multi-cloud environments.

Price
Course duration Duration: 20 minutes

Wartime CISO: From Battlefield to Boardroom

Joey Fontiveros, Acting Regiment Commander of the Philippines Army, shares insights on building cyber defense capabilities and countermeasures in an increasingly sophisticated threat landscape.

Price
Course duration Duration: 35 minutes

Establishing Privacy & Data Protection in the Digital Era

Dr. Amirudin Abdul Wahab, CEO of CyberSecurity Malaysia, discusses evolving data protection frameworks and the balance between security and privacy in the digital era.

Price
Course duration Duration: 30 minutes

APAC's Decentralized Financial Systems

PayPal's Phoram Mehta, Gojek's Aarthi Sureshkumar and Advance Intelligence Group's Shishir Kumar Singh discuss blockchain's role in securing cross-border payments and CBDC implementation.

Price
Course duration Duration: 25 minutes

CIO & CISO: Collaborate to Defend

Wahyu Agung Prasetyo, Thuraya Al-Harthi and Sujit Christy explore the evolving partnership between CIOs and CISOs in driving business enablement while maintaining robust cybersecurity.

Price
Course duration Duration: 25 minutes

Search

Clear

Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement