{"id":76,"date":"2025-04-30T15:51:36","date_gmt":"2025-04-30T07:51:36","guid":{"rendered":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/?post_type=speaker&#038;p=76"},"modified":"2025-04-30T15:51:37","modified_gmt":"2025-04-30T07:51:37","slug":"thulasy-suppiah","status":"publish","type":"speaker","link":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/","title":{"rendered":"Thulasy Suppiah"},"content":{"rendered":"<p><strong>Thulasy Suppiah<\/strong> is a lawyer specialising in cybersecurity, artificial intelligence (AI), datacentres, and emerging technologies.<\/p><p>With a background in Computer Engineering from the National University of Singapore and prior experience at Oracle Corporation (Singapore), she brings a rare blend of technical insight and legal expertise to her practice.<\/p><p>As Managing Partner of her firm, Thulasy provides strategic legal counsel to businesses navigating the complexities of an ever-evolving tech landscape. She works closely with clients to address the socio-economic implications of AI and helps them proactively prepare for technological shifts that could redefine their industries.<\/p>","protected":false},"excerpt":{"rendered":"<p>Thulasy Suppiah is a lawyer specialising in cybersecurity, artificial intelligence (AI), datacentres, and emerging technologies. With a background in Computer Engineering from the National University of Singapore and prior experience at Oracle Corporation (Singapore), she brings a rare blend of&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"speaker-category":[],"speaker-tags":[],"location":[],"class_list":["post-76","speaker","type-speaker","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Thulasy Suppiah - Cybersecurity Summit 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Thulasy Suppiah - Cybersecurity Summit 2025\" \/>\n<meta property=\"og:description\" content=\"Thulasy Suppiah is a lawyer specialising in cybersecurity, artificial intelligence (AI), datacentres, and emerging technologies. With a background in Computer Engineering from the National University of Singapore and prior experience at Oracle Corporation (Singapore), she brings a rare blend of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Summit 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-30T07:51:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/23082734\/Background_Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/\",\"url\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/\",\"name\":\"Thulasy Suppiah - Cybersecurity Summit 2025\",\"isPartOf\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website\"},\"datePublished\":\"2025-04-30T07:51:36+00:00\",\"dateModified\":\"2025-04-30T07:51:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Speakers\",\"item\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Thulasy Suppiah\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website\",\"url\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\",\"name\":\"Cybersecurity Summit 2025\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization\",\"name\":\"Cybersecurity Summit\",\"url\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png\",\"contentUrl\":\"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png\",\"width\":220,\"height\":224,\"caption\":\"Cybersecurity Summit\"},\"image\":{\"@id\":\"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Thulasy Suppiah - Cybersecurity Summit 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/","og_locale":"en_US","og_type":"article","og_title":"Thulasy Suppiah - Cybersecurity Summit 2025","og_description":"Thulasy Suppiah is a lawyer specialising in cybersecurity, artificial intelligence (AI), datacentres, and emerging technologies. With a background in Computer Engineering from the National University of Singapore and prior experience at Oracle Corporation (Singapore), she brings a rare blend of...","og_url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/","og_site_name":"Cybersecurity Summit 2025","article_modified_time":"2025-04-30T07:51:37+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/23082734\/Background_Image.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/","url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/","name":"Thulasy Suppiah - Cybersecurity Summit 2025","isPartOf":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website"},"datePublished":"2025-04-30T07:51:36+00:00","dateModified":"2025-04-30T07:51:37+00:00","breadcrumb":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/thulasy-suppiah\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/"},{"@type":"ListItem","position":2,"name":"Speakers","item":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/speaker\/"},{"@type":"ListItem","position":3,"name":"Thulasy Suppiah"}]},{"@type":"WebSite","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#website","url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","name":"Cybersecurity Summit 2025","description":"","publisher":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#organization","name":"Cybersecurity Summit","url":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/","url":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png","contentUrl":"https:\/\/media-conference.thestar.com.my\/wp-content\/uploads\/sites\/5\/2025\/04\/29042623\/bigtech-logo.png","width":220,"height":224,"caption":"Cybersecurity Summit"},"image":{"@id":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/speaker\/76","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/speaker"}],"about":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/types\/speaker"}],"author":[{"embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/comments?post=76"}],"version-history":[{"count":1,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/speaker\/76\/revisions"}],"predecessor-version":[{"id":79,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/speaker\/76\/revisions\/79"}],"wp:attachment":[{"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/media?parent=76"}],"wp:term":[{"taxonomy":"speaker-category","embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/speaker-category?post=76"},{"taxonomy":"speaker-tags","embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/speaker-tags?post=76"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/conference.thestar.com.my\/cybersecuritysummit\/wp-json\/wp\/v2\/location?post=76"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}