{"id":4919,"date":"2026-03-13T18:22:51","date_gmt":"2026-03-13T10:22:51","guid":{"rendered":"https:\/\/conference.thestar.com.my\/cloudtech\/?post_type=event&#038;p=4919"},"modified":"2026-03-31T12:03:59","modified_gmt":"2026-03-31T04:03:59","slug":"workshop","status":"publish","type":"event","link":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/","title":{"rendered":"Building Operational Cyber Resilience: From SOC to Cloud Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;&#8221;]<span style=\"font-weight: 400;\">6 hours.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s all the time your organisation may have to report a cyber incident under Act 854.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In complex hybrid and cloud environments, delayed detection or fragmented response isn\u2019t just a risk, it\u2019s a liability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This hands-on workshop focuses on real-world strategies to strengthen operational cyber resilience, bridging the gap between SOC, governance, and cloud security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaways:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> Readiness for NACSA\u2019s 6-hour reporting requirement<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Zero Trust implementation for hybrid environments<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Meaningful metrics: MTTD &amp; MTTC<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Protecting what matters most\u2014your critical assets<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Join the session and be prepared when it counts.<\/span><\/p>\n<p>Secure your spot today. This workshop is 100% HRD Corp claimable.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;&#8221;]Prices are as follows:[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJldmVudC1wcmljZS10YWIlMjIlM0UlMEQlMEElMDklM0NkaXYlMjBjbGFzcyUzRCUyMnRpdGxlLWNvbHVtbiUyMiUzRSUwRCUwQSUwOSUwOSUzQ2gzJTIwY2xhc3MlM0QlMjJwbGFuLXRpdGxlJTIyJTNFTm9ybWFsJTIwUHJpY2UlM0MlMkZoMyUzRSUwRCUwQSUwOSUwOSUzQ3NwYW4lM0UlMjZuYnNwJTNCJTNDJTJGc3BhbiUzRSUwRCUwQSUwOSUwOSUzQyUyMS0tJTNDcCUyMGNsYXNzJTNEJTIycGxhbi1kZXNjcmlwdGlvbiUyMiUzRSUyOGVuZHMlMjBvbiUyMDUlMjBKdW5lJTIwMjAyNSUyOSUzQyUyRnAlM0UtLSUzRSUwRCUwQSUwOSUzQyUyRmRpdiUzRSUwRCUwQSUwOSUzQ2RpdiUyMGNsYXNzJTNEJTIycHJpY2UtY29sdW1uJTIyJTNFJTBEJTBBJTA5JTA5JTNDZGl2JTIwY2xhc3MlM0QlMjJwcmljZS1jb250YWluZXIlMjIlM0UlMEQlMEElMDklMDklMDklM0NzdXAlMjBjbGFzcyUzRCUyMmN1cnJlbmN5JTIyJTNFUk0lM0MlMkZzdXAlM0UlMEQlMEElMDklMDklMDklM0NzdHJvbmclMjBjbGFzcyUzRCUyMnByaWNlJTIyJTNFMSUyQzYwMCUzQyUyRnN0cm9uZyUzRSUwRCUwQSUwOSUwOSUzQyUyRmRpdiUzRSUwRCUwQSUwOSUwOSUzQyUyMS0tJTNDZGl2JTIwY2xhc3MlM0QlMjJidXR0b24lMjIlM0UtLSUzRSUwRCUwQSUwOSUwOSUzQyUyMS0tJTA5JTNDYSUyMGhyZWYlM0QlMjJodHRwcyUzQSUyRiUyRmZvcm1zLmdsZSUyRkpIMkNlRE1zQjJ5SGJRaEVBJTIyJTIwdGFyZ2V0JTNEJTIyYmxhbmslMjIlMjBjbGFzcyUzRCUyMmJ1eS1ub3ctYnRuJTIyJTNFQnV5JTIwTm93JTNDJTJGYSUzRS0tJTNFJTBEJTBBJTA5JTA5JTNDJTIxLS0lM0MlMkZkaXYlM0UtLSUzRSUwRCUwQSUwOSUzQyUyRmRpdiUzRSUwRCUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: center;\">*Prices are exclusive of service charges<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_id=&#8221;single-page-tab-section&#8221;][vc_column][vc_empty_space][vc_tta_tabs active_section=&#8221;1&#8243; el_id=&#8221;single-programme-tabs&#8221; el_class=&#8221;event-1 programme-tab workshop&#8221;][vc_tta_section title=&#8221;Programme&#8221; tab_id=&#8221;Programme&#8221; el_class=&#8221;tabs-btn-programme&#8221;]<div class=\"gt-get-event-content\"><div class=\"gt-event-schedule gt-style-1\"><ul class=\"gt-schedule-tabs nav\" role=\"tablist\"><li><a data-toggle=\"tab\" class=\"active show\" href=\"#gt-event-schedule-1\" role=\"tab\" aria-controls=\"gt-event-schedule-1\" aria-selected=\"true\">Day 1<\/a><\/li><\/ul><div class=\"gt-dropdown\"><div class=\"tab-content\"><div class=\"tab-pane fade active show\" id=\"gt-event-schedule-1\" role=\"tabpanel\" aria-labelledby=\"nav-gt-event-schedule-1-tab\"><div class=\"gt-panel-group\" id=\"event-schedule-accardion-74615\" role=\"tablist\" aria-multiselectable=\"true\"><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-283712\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-283712\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-283712\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">8.30am<\/div><div class=\"gt-title\">Registration &amp; Networking Breakfast<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-442279\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-442279\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-442279\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">9.00am<\/div><div class=\"gt-title\">Opening Remarks &amp; Workshop Overview<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-987541\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-987541\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-987541\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">9:15am<\/div><div class=\"gt-title\">Session 1: Modern Cyber Threat Landscape<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-157451\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-157451\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-157451\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">10:00am<\/div><div class=\"gt-title\">Session 2: SOC Operations &amp; Incident Response Fundamentals<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-665171\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-665171\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-665171\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">11.00am<\/div><div class=\"gt-title\">Tea Break &amp; Networking<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-806990\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-806990\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-806990\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">11.15am<\/div><div class=\"gt-title\">Session 3: Case Study Analysis: Triple Extortion &amp; Insurance<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-980374\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-980374\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-980374\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">12.30pm<\/div><div class=\"gt-title\">Lunch<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-650871\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-650871\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-650871\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">2:00pm<\/div><div class=\"gt-title\">Session 4: Cloud Security 101<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-373511\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-373511\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-373511\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">2:45pm<\/div><div class=\"gt-title\">Session 5: Endpoint Security + Zero Trust Basics<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-297210\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-297210\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-297210\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">3:30pm<\/div><div class=\"gt-title\">Tea Break &amp; Networking<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-488234\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-488234\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-488234\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">3:45pm<\/div><div class=\"gt-title\">Session 6: Prioritising Exposure over Patch Count<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-201976\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-74615\" href=\"#event-schedule-collapse-201976\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-201976\"><div class=\"gt-inner\"><div class=\"gt-date\">May 5, 2026<\/div><div class=\"gt-time\">4:45pm<\/div><div class=\"gt-title\">Session 7: Communicating Cyber Resilience to the Board<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>[\/vc_tta_section][vc_tta_section title=&#8221;Trainer&#8221; tab_id=&#8221;Trainer&#8221; el_class=&#8221;tabs-btn&#8221;]<div class=\"gt-get-event-content\"><div class=\"gt-speakers gt-columns gt-column-3 gt-column-space-30\"><div class=\"gt-col\"><div class=\"gt-inner\"><div class=\"gt-speaker gt-style-1\"><div class=\"gt-image\"><a href=\"https:\/\/conference.thestar.com.my\/cloudtech\/speaker\/ts-dr-johari-jalaludin\/\"><img decoding=\"async\" alt=\"Ts Dr Johari Jalaludin\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/2\/2026\/03\/26141851\/Johari-1.jpg\" \/><\/a><\/div><div class=\"gt-content\"><div class=\"gt-name\"><a href=\"https:\/\/conference.thestar.com.my\/cloudtech\/speaker\/ts-dr-johari-jalaludin\/\">Ts Dr Johari Jalaludin<\/a><\/div><div class=\"gt-profession\">Head of Cybersecurity \/ CISO<\/div><div class=\"gt-company\">National Critical Infrastructure \u2013 Transportation Sector (Malaysia)<\/div><\/div><\/div><\/div><\/div><\/div><\/div>[\/vc_tta_section][vc_tta_section title=&#8221;Buy Tickets&#8221; tab_id=&#8221;BuyTickets&#8221; el_class=&#8221;tabs-btn tabs-btn-register&#8221;][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;&#8221;]6 hours. That\u2019s all the time your organisation may have to report a cyber incident under Act 854. In complex hybrid and cloud environments, delayed detection or fragmented response isn\u2019t just a risk, it\u2019s a liability. This hands-on workshop&#8230;<\/p>\n","protected":false},"author":4,"featured_media":925,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"eventcat":[],"organizer":[],"event_tags":[],"location":[],"class_list":["post-4919","event","type-event","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Building Operational Cyber Resilience: From SOC to Cloud Security - Cloudtech &amp; Datacentre Conference 2.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building Operational Cyber Resilience: From SOC to Cloud Security - Cloudtech &amp; Datacentre Conference 2.0\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;&#8221;]6 hours. That\u2019s all the time your organisation may have to report a cyber incident under Act 854. In complex hybrid and cloud environments, delayed detection or fragmented response isn\u2019t just a risk, it\u2019s a liability. This hands-on workshop...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloudtech &amp; Datacentre Conference 2.0\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T04:03:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.thestar.com.my\/cloudtech\/wp-content\/uploads\/sites\/2\/2018\/12\/schedule-5.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"525\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/\",\"url\":\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/\",\"name\":\"Building Operational Cyber Resilience: From SOC to Cloud Security - Cloudtech &amp; Datacentre Conference 2.0\",\"isPartOf\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.thestar.com.my\/cloudtech\/wp-content\/uploads\/sites\/2\/2018\/12\/schedule-5.jpeg\",\"datePublished\":\"2026-03-13T10:22:51+00:00\",\"dateModified\":\"2026-03-31T04:03:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#primaryimage\",\"url\":\"https:\/\/conference.thestar.com.my\/cloudtech\/wp-content\/uploads\/sites\/2\/2018\/12\/schedule-5.jpeg\",\"contentUrl\":\"https:\/\/conference.thestar.com.my\/cloudtech\/wp-content\/uploads\/sites\/2\/2018\/12\/schedule-5.jpeg\",\"width\":525,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.thestar.com.my\/cloudtech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Event\",\"item\":\"https:\/\/conference.thestar.com.my\/cloudtech\/event\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Building Operational Cyber Resilience: From SOC to Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/#website\",\"url\":\"https:\/\/conference.thestar.com.my\/cloudtech\/\",\"name\":\"CloudTech\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.thestar.com.my\/cloudtech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/#organization\",\"name\":\"CloudTech\",\"url\":\"https:\/\/conference.thestar.com.my\/cloudtech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/2\/2024\/05\/30114739\/cropped-Favicon-1-1.jpg\",\"contentUrl\":\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/2\/2024\/05\/30114739\/cropped-Favicon-1-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"CloudTech\"},\"image\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cloudtech\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Building Operational Cyber Resilience: From SOC to Cloud Security - Cloudtech &amp; Datacentre Conference 2.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/","og_locale":"en_US","og_type":"article","og_title":"Building Operational Cyber Resilience: From SOC to Cloud Security - Cloudtech &amp; Datacentre Conference 2.0","og_description":"[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;&#8221;]6 hours. That\u2019s all the time your organisation may have to report a cyber incident under Act 854. In complex hybrid and cloud environments, delayed detection or fragmented response isn\u2019t just a risk, it\u2019s a liability. This hands-on workshop...","og_url":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/","og_site_name":"Cloudtech &amp; Datacentre Conference 2.0","article_modified_time":"2026-03-31T04:03:59+00:00","og_image":[{"width":525,"height":350,"url":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-content\/uploads\/sites\/2\/2018\/12\/schedule-5.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/","url":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/","name":"Building Operational Cyber Resilience: From SOC to Cloud Security - Cloudtech &amp; Datacentre Conference 2.0","isPartOf":{"@id":"https:\/\/conference.thestar.com.my\/cloudtech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#primaryimage"},"image":{"@id":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-content\/uploads\/sites\/2\/2018\/12\/schedule-5.jpeg","datePublished":"2026-03-13T10:22:51+00:00","dateModified":"2026-03-31T04:03:59+00:00","breadcrumb":{"@id":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#primaryimage","url":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-content\/uploads\/sites\/2\/2018\/12\/schedule-5.jpeg","contentUrl":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-content\/uploads\/sites\/2\/2018\/12\/schedule-5.jpeg","width":525,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/workshop\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.thestar.com.my\/cloudtech\/"},{"@type":"ListItem","position":2,"name":"Event","item":"https:\/\/conference.thestar.com.my\/cloudtech\/event\/"},{"@type":"ListItem","position":3,"name":"Building Operational Cyber Resilience: From SOC to Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/conference.thestar.com.my\/cloudtech\/#website","url":"https:\/\/conference.thestar.com.my\/cloudtech\/","name":"CloudTech","description":"","publisher":{"@id":"https:\/\/conference.thestar.com.my\/cloudtech\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.thestar.com.my\/cloudtech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conference.thestar.com.my\/cloudtech\/#organization","name":"CloudTech","url":"https:\/\/conference.thestar.com.my\/cloudtech\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.thestar.com.my\/cloudtech\/#\/schema\/logo\/image\/","url":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/2\/2024\/05\/30114739\/cropped-Favicon-1-1.jpg","contentUrl":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/2\/2024\/05\/30114739\/cropped-Favicon-1-1.jpg","width":512,"height":512,"caption":"CloudTech"},"image":{"@id":"https:\/\/conference.thestar.com.my\/cloudtech\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/event\/4919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/types\/event"}],"author":[{"embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/comments?post=4919"}],"version-history":[{"count":10,"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/event\/4919\/revisions"}],"predecessor-version":[{"id":4988,"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/event\/4919\/revisions\/4988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/media\/925"}],"wp:attachment":[{"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/media?parent=4919"}],"wp:term":[{"taxonomy":"eventcat","embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/eventcat?post=4919"},{"taxonomy":"organizer","embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/organizer?post=4919"},{"taxonomy":"event_tags","embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/event_tags?post=4919"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cloudtech\/wp-json\/wp\/v2\/location?post=4919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}