{"id":27,"date":"2025-04-30T10:47:30","date_gmt":"2025-04-30T02:47:30","guid":{"rendered":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/?page_id=27"},"modified":"2025-04-30T12:55:03","modified_gmt":"2025-04-30T04:55:03","slug":"programme","status":"publish","type":"page","link":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/","title":{"rendered":"Cybersecurity Summit 2025"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]<div class=\"gt-get-event-content\"><div class=\"gt-event-schedule gt-style-2\"><ul class=\"gt-schedule-tabs nav\" role=\"tablist\"><li><a data-toggle=\"tab\" class=\"active show\" href=\"#gt-event-schedule-1\" role=\"tab\" aria-controls=\"gt-event-schedule-1\" aria-selected=\"true\">Programme Schedule<\/a><\/li><\/ul><div class=\"gt-dropdown\"><div class=\"tab-content\"><div class=\"tab-pane fade active show\" id=\"gt-event-schedule-1\" role=\"tabpanel\" aria-labelledby=\"nav-gt-event-schedule-1-tab\"><div class=\"gt-panel-group\" id=\"event-schedule-accardion-922549\" role=\"tablist\" aria-multiselectable=\"true\"><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-128362\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-128362\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-128362\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">8:30 a.m.<\/div><div class=\"gt-title\">Registration &amp; Networking Breakfast<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-162525\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-162525\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-162525\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">9:00 a.m.<\/div><div class=\"gt-title\">Welcome Address and Opening Remarks<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-87917\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-87917\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-87917\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">9:05 a.m.<\/div><div class=\"gt-title\">Keynote Address: Securing Malaysia\u2019s Digital Economy: Cybersecurity as a Pillar of Growth<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-87917\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-87917\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speaker:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/ir-dr-megat-zuhairy-bin-megat-tajuddin\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Ir Dr Megat Zuhairy bin Megat Tajuddin\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/07\/08082450\/Ir-Dr-Megat-Zuhairy.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Ir Dr Megat Zuhairy bin Megat Tajuddin<\/div><div class=\"gt-profession\">Chief Executive<\/div><div class=\"gt-company\">National Cyber Security Agency, National Security Council (NACSA, NSC)<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-444138\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-444138\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-444138\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">9:20 a.m.<\/div><div class=\"gt-title\">Emerging Threats in the Cyber Landscape: What Malaysian Organisations Need to Know<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-444138\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-444138\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speaker:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/dato-ts-dr-haji-amirudin-abdul-wahab\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Dato&#8217; Ts Dr Haji Amirudin Abdul Wahab\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30163550\/dato-ts-dr-haji-amirudin-abdul-wahab.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Dato&#8217; Ts Dr Haji Amirudin Abdul Wahab<\/div><div class=\"gt-profession\">CEO<\/div><div class=\"gt-company\">CyberSecurity Malaysia<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-369223\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-369223\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-369223\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">10:00 a.m.<\/div><div class=\"gt-title\">From Policy to Practice: Operationalising Cybersecurity Frameworks for Real-World Impact<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-369223\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-369223\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-text\"><div class=\"event-schedule-data\">\n<p class=\"programme-content\">Cybersecurity frameworks and policies form the backbone of a resilient digital environment\u2014but without effective implementation, they remain theoretical. This session delves into how organisations can bridge the gap between compliance and real-world defenses. It also examines why these gaps persist, highlighting broader organisational and operational challenges. Drawing from supervisory assessment findings and local case insights, the session offers practical strategies to operationalise security controls and better align with national cybersecurity priorities. Attendees will leave with a clearer understanding of how to transform frameworks into meaningful, measurable actions.\n<\/p>\n<\/div>\n<\/div><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speaker:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/sarbnedhan-sandhu\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Sarbnedhan Sandhu\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30155356\/sarbnedhan-sandhu.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Sarbnedhan Sandhu<\/div><div class=\"gt-profession\">General Manager - Technology Supervision<\/div><div class=\"gt-company\">Securities Commission Malaysia<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-989561\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-989561\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-989561\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">10:40 a.m.<\/div><div class=\"gt-title\">Tea Break &amp; Networking<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-53142\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-53142\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-53142\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">11:00 a.m.<\/div><div class=\"gt-title\">Panel Discussion: Bridging the Gap: Cybersecurity Talent Development for Malaysia\u2019s Digital Future<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-53142\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-53142\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-text\"><div class=\"event-schedule-data\">\n<p class=\"programme-content\">The pressing cybersecurity skills gap poses a significant challenge for organizations across various industries in Malaysia. As they strive to attract and retain skilled professionals, they encounter numerous obstacles. To address these challenges, effective talent strategies are essential to meet the real-world cybersecurity demands, especially as Malaysia continues to embrace digital transformation.<\/p>\n<\/div>\n<\/div><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speakers:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/ts-ahmad-kamal-hasan-basri\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Ts Ahmad Kamal Hasan Basri\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30160907\/ts-ahmad-kamal-hasan-basri.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Ts Ahmad Kamal Hasan Basri<\/div><div class=\"gt-profession\">Senior Vice President, Head of Group IT<\/div><div class=\"gt-company\">MARA Corporation<\/div><\/div><\/a><\/li><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/dr-peter-leong\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Dr Peter Leong\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30160617\/dr-peter-leong.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Dr Peter Leong<\/div><div class=\"gt-profession\">Business Director<\/div><div class=\"gt-company\">MyCIO Services<\/div><\/div><\/a><\/li><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/mohd-amril-mohd-junid\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Mohd Amril Mohd Junid\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30154316\/mohd-amril-mohd-junid.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Mohd Amril Mohd Junid<\/div><div class=\"gt-profession\">Senior Vice President, Group Human Resources, Admin &amp; Procurement<\/div><div class=\"gt-company\">TalentCorp Malaysia<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Moderator:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/jane-teh\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Jane Teh\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/06\/17101023\/Jane-Teh.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Jane Teh<\/div><div class=\"gt-profession\">Founder &amp; Chief Executive Officer<\/div><div class=\"gt-company\">VortiQx Cybersecurity &amp; AI Security GRC<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-325822\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-325822\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-325822\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">11:50 a.m.<\/div><div class=\"gt-title\">AI-Powered Cyber Threats<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-325822\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-325822\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-text\"><div class=\"event-schedule-data\">\n<p class=\"programme-content\">The impending threats of AI powered cyber-security attacks as well as Adversarial Machine Learning Attacks<\/p>\n<ul class=\"programme-content-bullet\">\n<li>Deepfake AI attacks and mitigations<\/li>\n<li>AML Attacks and mitigations<\/li>\n<\/ul>\n<\/div>\n<\/div><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speaker:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/wo-swee-teck\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Wo Swee Teck\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30155703\/wo-swee-teck.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Wo Swee Teck<\/div><div class=\"gt-profession\">Managing Director<\/div><div class=\"gt-company\">Securemetric Technology Sdn Bhd<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-515299\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-515299\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-515299\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">12:20 p.m.<\/div><div class=\"gt-title\">Lunch<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-84901\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-84901\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-84901\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">1:40 p.m.<\/div><div class=\"gt-title\">Panel Discussion: The Role of AI and Emerging Technologies in Cybersecurity<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-84901\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-84901\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speakers:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/dr-mazlan-abbas\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Dr Mazlan Abbas\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30162100\/dr-mazlan-abbas.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Dr Mazlan Abbas<\/div><div class=\"gt-profession\">CEO &amp; Co-founder<\/div><div class=\"gt-company\">FAVORIOT Sdn Bhd<\/div><\/div><\/a><\/li><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/umang-varma\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Umang Varma\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/05\/19104634\/umang-varma.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Umang Varma<\/div><div class=\"gt-profession\">Head of Customer Engineering<\/div><div class=\"gt-company\">Google Cloud<\/div><\/div><\/a><\/li><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/low-jia-yee\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Low Jia Yee\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30161408\/low-jia-yee.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Low Jia Yee<\/div><div class=\"gt-profession\">CTO<\/div><div class=\"gt-company\">Kenanga Group<\/div><\/div><\/a><\/li><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/meling-mudin\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Meling Mudin\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/05\/19103609\/meling-mudin.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Meling Mudin<\/div><div class=\"gt-profession\">Chief Information Security Officer<\/div><div class=\"gt-company\">Payments Network Malaysia (PayNet) Sdn Bhd<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Moderator:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Thulasy Suppiah\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30154931\/thulasy-suppiah.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Thulasy Suppiah<\/div><div class=\"gt-profession\">Managing Partner<\/div><div class=\"gt-company\">Suppiah &amp; Partners<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-196220\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-196220\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-196220\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">2:30 p.m.<\/div><div class=\"gt-title\">Bridging the Divide: Strategies for Effective IT\/OT Security Convergence<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-196220\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-196220\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speaker:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/tanvinder-singh\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Tanvinder Singh\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/07\/18155606\/tanvinder-singh.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Tanvinder Singh<\/div><div class=\"gt-profession\">Director, Cybersecurity<\/div><div class=\"gt-company\">PwC South East Asia Consulting<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-848282\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-848282\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-848282\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">3:05 p.m.<\/div><div class=\"gt-title\">Safeguarding Tomorrow\u2019s Landscape: Generative AI Risk Mitigation and Governance Frameworks<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-848282\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-848282\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-text\"><div class=\"event-schedule-data\">\n<ul class=\"programme-content-bullet\">\n<li>Identify and evaluate risks associated with generative AI<\/li>\n<li>Develop and implement effective risk management strategies<\/li>\n<li>Navigate regulatory and legal frameworks for AI governance<\/li>\n<\/ul>\n<\/div>\n<\/div><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speaker:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/dr-darron-sun\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Dr Darron Sun\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30161739\/dr-darron-sun.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Dr Darron Sun<\/div><div class=\"gt-profession\">Head of Information Technology<\/div><div class=\"gt-company\">Hong Kong Housing Society<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading hide-collapse\" role=\"tab\" id=\"event-schedule-heading-403922\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-403922\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-403922\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">3:40 p.m.<\/div><div class=\"gt-title\">Tea Break &amp; Networking<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-548099\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-548099\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-548099\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">4:00 p.m.<\/div><div class=\"gt-title\">Panel Discussion: Digital Trust &amp; Resilience: Strengthening Cyber Confidence in Malaysia<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-548099\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-548099\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speakers:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/amal-wickramasinghe\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Amal Wickramasinghe\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/06\/17100001\/Amal-Wickramasinghe.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Amal Wickramasinghe<\/div><div class=\"gt-profession\">Head of Governance Risk and Compliance - Cybersecurity and Data Privacy<\/div><div class=\"gt-company\">Axiata Group<\/div><\/div><\/a><\/li><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/jen-liang\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Jen Liang\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/07\/03124700\/jen-liang.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Jen Liang<\/div><div class=\"gt-profession\">CEO<\/div><div class=\"gt-company\">IDmeta Group<\/div><\/div><\/a><\/li><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/zainol-zainuddin\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Zainol Zainuddin\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30160115\/zainol-zainuddin.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Zainol Zainuddin<\/div><div class=\"gt-profession\">CTO<\/div><div class=\"gt-company\">NTT DATA eCommerce Solutions<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Moderator:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/jaco-benadie\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Jaco Benadie\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30162319\/jaco-benadie.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Jaco Benadie<\/div><div class=\"gt-profession\">Partner, Technology Consulting - Cyber<\/div><div class=\"gt-company\">Ernst &amp; Young Consulting Sdn Bhd<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gt-panel\"><div class=\"gt-panel-heading\" role=\"tab\" id=\"event-schedule-heading-825291\"><a role=\"button\" data-toggle=\"collapse\" data-parent=\"#event-schedule-accardion-922549\" href=\"#event-schedule-collapse-825291\" aria-expanded=\"true\" aria-controls=\"event-schedule-collapse-825291\"><div class=\"gt-inner\"><div class=\"gt-date\">July 24, 2025<\/div><div class=\"gt-time\">4:50 p.m.<\/div><div class=\"gt-title\">Cybersecurity Compliance and Governance: Navigating Malaysia\u2019s Legal Framework<\/div><\/div><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><polyline points=\"6 9 12 15 18 9\"><\/polyline><\/svg><\/a><\/div><div id=\"event-schedule-collapse-825291\" class=\"gt-panel-collapse collapse show\" role=\"tabpanel\" aria-labelledby=\"event-schedule-heading-825291\"><div class=\"gt-panel-body\"><div class=\"stream-event-schedule-full\"><div class=\"stream-event-column-full\"><div class=\"gt-text\"><div class=\"event-schedule-data\">\n<p class=\"programme-content\">This presentation will explore Malaysia's evolving cybersecurity landscape, focusing on key legislative developments such as the Cyber Security Act 2024, which introduces comprehensive regulations for National Critical Information Infrastructure (NCII) and cybersecurity service providers. The discussion will also touch on other relevant laws and initiatives, such as the Communications and Multimedia Act (Amendment) Bill 2024 and emerging trends in data privacy and cybersecurity governance.<\/p>\n<\/div>\n<\/div><div class=\"gt-schedule-speakers custom-schedule-speaker\"><div class=\"gt-title\">Speaker:<\/div><div class=\"gt-list\"><ul><li><a href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/\"><div class=\"gt-image\"><img decoding=\"async\" alt=\"Thulasy Suppiah\" src=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/30154931\/thulasy-suppiah.jpg\" \/><\/div><div class=\"gt-detail\"><div class=\"gt-name\">Thulasy Suppiah<\/div><div class=\"gt-profession\">Managing Partner<\/div><div class=\"gt-company\">Suppiah &amp; Partners<\/div><\/div><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Programme - Cybersecurity Summit 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Programme - Cybersecurity Summit 2025\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Summit 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-30T04:55:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/23082734\/Background_Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/\",\"url\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/\",\"name\":\"Programme - Cybersecurity Summit 2025\",\"isPartOf\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website\"},\"datePublished\":\"2025-04-30T02:47:30+00:00\",\"dateModified\":\"2025-04-30T04:55:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Summit 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website\",\"url\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\",\"name\":\"Cybersecurity Summit 2025\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization\",\"name\":\"Cybersecurity Summit\",\"url\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png\",\"contentUrl\":\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png\",\"width\":220,\"height\":224,\"caption\":\"Cybersecurity Summit\"},\"image\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Programme - Cybersecurity Summit 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/","og_locale":"en_US","og_type":"article","og_title":"Programme - Cybersecurity Summit 2025","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row]","og_url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/","og_site_name":"Cybersecurity Summit 2025","article_modified_time":"2025-04-30T04:55:03+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/23082734\/Background_Image.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/","url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/","name":"Programme - Cybersecurity Summit 2025","isPartOf":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website"},"datePublished":"2025-04-30T02:47:30+00:00","dateModified":"2025-04-30T04:55:03+00:00","breadcrumb":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/programme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Summit 2025"}]},{"@type":"WebSite","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website","url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","name":"Cybersecurity Summit 2025","description":"","publisher":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization","name":"Cybersecurity Summit","url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/","url":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png","contentUrl":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png","width":220,"height":224,"caption":"Cybersecurity Summit"},"image":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/27","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/comments?post=27"}],"version-history":[{"count":3,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/27\/revisions"}],"predecessor-version":[{"id":58,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/27\/revisions\/58"}],"wp:attachment":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/media?parent=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}