Cyber Security concerns are the Top of Mind for ASEAN Enterprises
ASEAN Cybersecurity Policies | Roadmap
Cyber Security is a key discussion point at AIBP activities
Cybersecurity and Risk Management in Thailand
26 September 2023, Bangkok, Thailand
Key Takeaways:
Taking a Proactive Approach to Cybersecurity: The panel discussion emphasized the utmost importance of integrating security measures into systems right from their inception. This forward-looking strategy is regarded as a catalyst for innovation promotion and vulnerability reduction.
Cybersecurity Talent Shortage & Funding Gap: Additionally, the panel highlighted the pressing need to address the cybersecurity challenge, which encompasses both the significant funding gap and the shortage of cybersecurity talent. To effectively combat cyber threats and vulnerabilities, there is a call to invest in cybersecurity education and training to equip individuals with the necessary knowledge and skills.
Privacy and Security Interdependence: "You cannot have security without privacy and vice versa, you cannot have privacy without security," as mentioned by Togio, Prakorn Chayanuwat, Group Data Protection Officer (Group DPO) Head of Data Governance, PDPA Compliance & DPO/Privacy Office, BDMS Group 2 – BNH Hospital and Samitivej Hospitals Group underscores the interconnected nature of privacy and security. It highlights the importance of considering both aspects in cybersecurity and data management strategies. Reflecting on privacy management is essential in ensuring a holistic approach to cybersecurity and privacy in digital transformation efforts.
Managing Digital Risks in Indonesia
19 September 2023, Jakarta, Indonesia
Key Takeaways:
More Funding for Cybersecurity Needed: Based on the in-conference survey, many Indonesian enterprises recognise the importance of cybersecurity for digital transformation but allocate a relatively small portion of their IT budgets to it. Specifically, 62% believe that more than 20% of their IT budget should be dedicated to cybersecurity, but over 50% currently allocate less than 5% to cybersecurity.
Need for Comprehensive Cybersecurity Approach: The panel discussion highlighted the critical need to incorporate cybersecurity measures into systems from their inception. There is a significant gap in cybersecurity funding, and addressing this gap requires collaborative efforts involving the government, private sector entities, and communities to fortify the cybersecurity ecosystem
Balancing User Experience and Security: Cybersecurity must strike a balance between user experience and security measures to foster adoption. This is especially important considering that employees are a critical part of the cybersecurity defense, and security awareness training and education programs are essential to establish a security-conscious culture. Cybersecurity should be viewed as an enabler of digital transformation and innovation, not as a hindrance.
Balancing Innovation & Security in Vietnam
1 August 2023, Ho Chi Minh City, Vietnam
Key Takeaways:
Cybersecurity as Priority in Vietnam: Organizations in Vietnam prioritize cybersecurity, focusing on securing applications, infrastructure, and end users. Cloud utilization, security integration in software development, and updated software testing are strategies for application security. Employee training, two-factor authentication, and conditional access enhance end-user security.
Balancing Innovation and Security: Balancing innovation with security involves layering security controls within applications for user usability. Government agencies like the National Cyber Security Center (NCSC) collaborate with local firms to secure critical infrastructure, emphasizing cybersecurity awareness and staying updated on threats and practices for innovation.
Holistic Security Approach and Culture: Adopting a comprehensive security approach includes monitoring threats, risk prioritization, and maintaining asset visibility. Organizational mindset shifts towards shared responsibility for security, incorporating initiatives like blocking malicious sites, preventing harmful content, and providing security training to enhance overall security posture.
Readiness of Malaysia's Data and Cybersecurity Ecosystem
4 July 2023, Kuala Lumpur, Malaysia
Key Takeaways:
Budget Gap and Importance of Cybersecurity: Malaysian enterprises believe over 20% of their IT budget should be allocated to cybersecurity, yet most currently allocate less than 5%. This gap highlights the need for increased investment and the significance of integrating security into systems from the outset to enable innovation.
Collaboration for Stronger Cybersecurity Ecosystem: To effectively address cybersecurity challenges, collaboration is essential among government, private sector, and communities. Emerging technologies like 5G, AI, IoT, and cloud computing introduce new risks that require appropriate controls and standards, particularly for critical infrastructure organizations.
Navigating User Experience and Security: Cybersecurity needs to strike a balance between user experience and security measures to foster adoption. Employee awareness and education are crucial, as employees can inadvertently become a weak link. The concept of "zero trust," data encryption, and segregating critical functions from corporate spaces were highlighted as effective cybersecurity strategies.
Prevention, Detection and Response in Thailand’s Cybersecurity Landscape
21 June 2023, Bangkok, Thailand
Key Takeaways:
Multifaceted Cyberthreats and Strategies: Khun Tithirat Siripattanalert, Group Chief Information Security and Data Management Officer, True Digital Group, highlighted the diverse nature of cyberthreats in Thailand, spanning from safeguarding anonymized to sensitive data, necessitating constant vigilance, security automation, and swift threat detection.
Artificial Intelligence and Machine Learning for Enhanced Security: To overcome resource limitations, the adoption of AI and machine learning emerged as crucial for cybersecurity enhancement. These technologies enable real-time responses, blocking malicious access, and identifying abnormal patterns through machine learning algorithms.
User Awareness and Private Sector Responsibility: Organizations prioritize user awareness for cybersecurity, particularly due to personal device adoption and multi-factor authentication's importance. Dr. Virat Chatdarong, Vice President, TPI Polene PLC, emphasized the rising significance of data security as digital data concentration grows.
Building a Safe Secure Digital Future for Vietnam
11 April 2023, Hanoi, Vietnam
Key Takeaways:
Strengthening cyberspace resilience is crucial for both enterprises and government agencies, as cyber threats continue to rise in countries like Vietnam and Malaysia.
A 3-pronged strategy of Processes, People, and Technology can be used to promote cybersecurity transformation and threat deterrence.
The rising prevalence of cybersecurity attacks in the mobile application space highlights the need for stronger platform security, as well as collaboration between banking institutions, government agencies, and higher education institutions to combat cyber threats in Vietnam.
2023 AIBP Malaysia Advisory Board Meeting
21 February 2023, Kuala Lumpur, Malaysia
Key Takeaways:
Cybersecurity is crucial for digital transformation success as organisations become more vulnerable to cyber threats.
Investing in proactive cybersecurity measures is essential for protecting digital assets and infrastructure.
Cybersecurity measures need to evolve in tandem with digital transformation as new technologies and cyber threats emerge.
Cyber Security Leaders Sharing their Insights include:
Together with
Threat Hunter, National Cybersecurity Center of Vietnam (NCSC)
Cybersecurity / Deputy Data Protection Officer, Philippine Amusement and Gaming Corporation
Head of Digitalization & Technology, Alam Flora Sdn Bhd
Head, Innovation & Industry Development Department, Cyberview
Assistant Vice President, Security, CIMB
Deputy Superintendant, Anti-ICT crimes Special task forces, Royal Thai Police
Chief Technology Officer, AXA Mandiri Financial Services
...and more
Knowledge Sharing & Networking Activities
Knowledge Sharing and Networking co-hosted with The Royal Thai Police
28 September 2023, Bangkok, Thailand
Networking Lunch and Knowledge Sharing co-hosted with CrowdStrike
26 September 2023, Bangkok, Thailand
Networking Lunch and Knowledge Sharing co-hosted with CrowdStrike
19 September 2023, Jakarta, Indonesia
Networking Lunch and Knowledge Sharing co-hosted with Zscaler
3 July 2023, Kuala Lumpur, Malaysia
Access the Full AIBP Content Hub
Get access to the entire library of content including videos, reports, focus group discussions, and invitations to innovation-focused networking events throughout ASEAN
Connect with Us!
Cybersecurity Trade Mission - Indonesia
Sharing Session :
- Ministry of Communication and Information Technology (KEMKOMINFO) - Introduction to Indonesia, overview and advice on doing business in local market
- National Cyber and Crypto Agency (BSSN) - Indonesia’s Cyber Security Policy and Regulation Landscape
- Indonesian Chamber of Commerce and Industry (KADIN) - Overview of KADIN & Latest developments on cybersecurity policies, developments
- Sharing of Telkom Indonesia’s Cyber Security Business Solutions
- Sharing of Astra Financial’s IT Priorities
- PLN ICON + - Discussion on Cybersecurity Priorities for Indonesia’s Critical Infrastructure
- Jakarta Smart City - Sharing on e-government and Digitalisation for Public Services in Indonesia
Axiata Group: Navigating Cyber Risks in a Fast- Changing Digital Landscape
In this episode, Mr. Suresh Sankaran Srinivasan, Group Head of Cybersecurity & Data Privacy, discusses Axiata's approach to structuring cybersecurity functions and selecting solutions based on risk-based methodology. He also explores the risks posed by emerging technologies in the cybersecurity landscape.
27 Jun 2024, Singapore
AIBP ASEAN B2B Growth Podcast
21 Nov, Kuala Lumpur, Malaysia
Key Takeaways:
Roundtable Workshop with
CyberSecurity Malaysia
Building Cyber Resilience: Strategies for Cybersecurity Preparedness and Recovery
- In the dynamic landscape of cybersecurity, the responsibility for safeguarding an organisation's digital assets transcends traditional boundaries. While rooted in the IT domain, cybersecurity is not solely the purview of technology professionals. Instead, it has evolved into a shared responsibility that spans across the entire business landscape.
- Effective cybersecurity demands a collaborative approach, where IT professionals and business leaders work hand-in-hand to create a robust defence strategy. It necessitates a shared understanding of risks, proactive measures to fortify digital infrastructure, and a commitment to fostering a cybersecurity-aware culture throughout the organisation.
- Despite governmental initiatives, the collective effort remains imperative to forge a cyber-resilient society. Holistic cyber hygiene practices, continuous learning, collaboration, and information sharing are vital components of this collective endeavour.
Managing Risks in the Digital Age, Thailand
Panel Discussion and Private workshop on Cyber Resilience
17 July, Bangkok Thailand
Key Takeaways:
- Organisations must prepare not only for protection but also for response and recovery, including managing social media misinformation.
- Gaining business leaders' support and financial commitment for cybersecurity initiatives is essential but often challenging.
- Simple policies, procedures, governance, communication, and awareness can be as effective as expensive tools in reducing risk.
- Cybersecurity should be justified and implemented based on business risk rather than just technical risk.
Panelists (From Left to Right)
- Athikom Kanchanavibhu, Executive VP of Digital & Technology Transformation, CISO, DPO, Mitr Phol
- Dr. Chalee Vorakulpipat, Principal Researcher, Information Security Research Team, National Electronics and Computer Technology Center (NECTEC)
- Chatchawat Asawarakwong, CISO, KASIKORNBANK (KBank)
- Noppachai Tungsinpulchai, Risk & Compliance Advisory, NXZ Group
Managing Risks in the Digital Age, Indonesia
17 August, Jakarta, Indonesia
Key Takeaways:
- There’s a demand for "cybersecurity excellence" to maintain customer trust and minimise business disruption
- Open banking APIs can serve as a platform to enhance data integrity and transparency
- Industry-wide collaboration and national-level initiatives are necessary to enable secure implementation of any projects
Panelists (From Left to Right)
- Raditio Ghifiardi, Vice President - Head of IT Security Strategy & Architecture, Indosat Ooredoo Hutchison
- Fachry Rozy Oemar, Deputy Director of Information System Planning, Indonesia National Single Window Agency, Ministry of Finance
- Sigit Budiono, Head of Information Security, Bank Woori Saudara
- Krisna Kurniawan, VP Operational & IT Risk Management, KB Bank
Managing Risks in the Digital Age, Malaysia
Panel Discussion and Private workshop on Cyber Resilience & the Latest Cybersecurity Act
5 Sept, Kuala Lumpur, Malaysia
Key Takeaways:
- Embed Cybersecurity in Strategy: Cybersecurity should be a core part of the organisation’s strategy, not an afterthought.
- Transparency with Customers: It is vital to keep customers informed about the reasons behind increased security measures.
- Industry-Wide Collaboration: Cybersecurity requires coordinated efforts across industries and authorities to effectively manage evolving threats.
Panelists (From Left to Right)
- Dr. Chalee Vorakulpipat, Principal Researcher, Information Security Research Team, National Electronics and Computer Technology Center (NECTEC)
- Irfan Amer, CISO, AEON Bank
- Dato Dr Amirudin Abdul Wahab Dato' Dr Amirudin Abdul Wahab, Chief Executive Officer, CyberSecurity Malaysia
- Aishah Farha Mohd Raih , CISO, Permodalan Nasional Berhad
- Ts. Saiful Bakhtiar Osman, Head of IT - Shared Services, PNB Commercial
Navigating Digital Risks in the Philippines
18 Sept, Manila, Philippines
Key Takeaways:
- Banks are leveraging technologies like AI and biometrics to enhance security in digital services.
- The healthcare sector faces unique challenges in balancing rapid digitalization with cybersecurity needs.
- Finding the right balance between stringent security controls and operational efficiency is crucial across industries.
- Adaptive security measures, powered by AI and behavioral analytics, are becoming increasingly important in managing evolving cyber risks.
Panelists (From Left to Right)
- Jed Kenley Chua ,Chief Information Security Officer, Asia United Bank
- Jojo Nufable, CISO, St. Luke's Medical Center
- Carlos Tengkiat, CISO, Rizal Commercial Banking Corporation (RCBC)
- Albert (Abet) Dela Cruz, Head of Enterprise Security Architecture, Security Bank
Axiata Group: Driving Digital Innovation
with a Robust Risk Strategy
In this episode, Mr. Abid Adam, Chief Risk and Compliance Officer at Axiata Group, shares his journey from South Africa to Malaysia. He discusses the concept of Ubuntu and his role in leading digital transformation, cybersecurity, data privacy, and ESG initiatives.
AIBP ASEAN B2B Growth Podcast
Future Proofing Cyber Defense & Sentinels: Mastering Tomorrow's Threat
27 November , Manila, Philippines
Key Takeaways:
Cloud Adoption and Security: A Delicate Balance
- Cloud adoption offers scalability and flexibility but introduces new security challenges and may not guarantee long-term cost savings. Regulatory constraints often necessitate a hybrid approach, combining cloud and on-premise resources. This complexity underscores the need for a dedicated cloud security strategy and specialized expertise to manage third-party configurations effectively.
The Rising Importance of Identity Security
- The rise of cloud environments has elevated identity-related threats to a primary cybersecurity concern. Organizations must prioritize identity security by implementing zero-trust models to prevent unauthorized access. Managing identity security demands a sophisticated blend of technology, processes, and expertise, along with constant vigilance against evolving threats.
AI In Cybersecurity: A Double- Edge Sword
- Artificial Intelligence is transforming cybersecurity, offering enhanced threat detection and response capabilities while also presenting new challenges. While AI improves security measures, it requires human oversight for accuracy and context. Simultaneously, adversaries are leveraging generative AI to create more sophisticated social engineering attacks and efficient malware, highlighting the evolving nature of cybersecurity threats.
Building AI Driven Cyber Resilience in Malaysia and the Philippines
4 February 2025
Key Takeaways:
Cyber Security Talent Gaps
- Both Malaysia and the Philippines face shortages of skilled professionals, prompting government-led initiatives to train thousands in AI-driven threat detection, cloud security, and digital trust.
AI in Cyber Resilience
- AI is streamlining security operations by automating log analysis, enhancing digital forensics, and improving real-time threat detection, but concerns over ethical deployment and governance remain.
Regulatory Challenges and Compliance
- Malaysia’s Cyber security Act 2024 and the Philippines’ data sovereignty policies are reshaping compliance requirements for businesses, particularly in cloud security and AI adoption.
Emerging Cyber Threats
- Fraud, deepfakes, and AI-powered cyberattacks are rising, pushing enterprises to invest in AI/ML-based security solutions to enhance detection and response capabilities.
Digital Trust and AI Governance
- Strengthening digital trust is a key priority, with governments focusing on certification programs, AI security testing, and regulatory frameworks to balance innovation with risk mitigation.
Hybrid Workshop with Cybersecurity Malaysia, National Cybersecurity Agency Malaysia
1 July
Unlocking Cybersecurity Opportunities in Malaysia
Focus group discussion with Singapore cybersecurity companies and Malaysia industry leaders, about the opportunities and challenges of doing business in Malaysia
AIBP ASEAN Innovation Retreat
1 July , Singapore
I Knew You Were Trouble: Cyber Resilience Workshop
Key Takeaways:
- Cybersecurity Solutions: Choosing the Right Approach
- AI in Cybersecurity: Challenges and Opportunities
- The Different Worlds of IT and Security
- Security vs. Budget: Striking a Balance
Cyber Armour: How AI and Multi Vendor Strategies Shield Against Evolving Threats
4 December 2024, Cybersecurity Malaysia, Kuala Lumpur
Key Takeaways:
Multi-Vendor Approaches and Vendor Transparency
- In today's complex cyber threat landscape, a multi-vendor approach is crucial. It enhances resilience but requires careful integration. Vendor transparency is key - challenge them to simulate real attacks during evaluations for better decision-making and stronger defenses.
The Role of AI In Cybersecurity
- AI is becoming a game-changer in cybersecurity, enhancing threat intelligence, anomaly detection, and operational efficiency. It's particularly effective in combating alert fatigue and adapting to rapidly evolving attack vectors. However, the adoption of AI isn't without challenges, as it introduces new concerns around securing AI models and maintaining data integrity.
Incident Response and Recovery
- In today’s threat landscape, organisations must assume breaches will occur and focus on developing robust response and recovery plans.
Building Resilience in a Dynamic Threat Landscape
- In today's dynamic threat landscape, cyber resilience requires a multi-faceted approach. Key strategies include multi-vendor solutions, AI integration, proactive incident response, and addressing skills gaps. Staying aware of geopolitical factors is crucial. This tech-driven, collaborative approach helps organizations defend against current threats and adapt to future challenges
Fortifying the Digital Fortress: Strategies for Cyber Resilience
4 December 2024, Cybersecurity Malaysia, Kuala Lumpur
Key Takeaways:
Talent Shortages in Cybersecurity
- A live poll with leaders from Malaysian enterprises identified the lack of cyber security talent ( voted by 56%) as a critical barrier to effective risk management. Participants emphasised the need for public-private collaboration to attract, develop, and retain talent. Proactive strategies included investments in Security Operations Centres (SOCs) and partnerships with external cybersecurity experts to close the skills gap.
Complexity of Cloud Security
- As businesses increasingly migrate to cloud-based environments, managing cyber security has become more complex (as indicated by 53%). Leaders emphasised the need for a comprehensive security fabric that can protect data across multiple platforms and service providers. The discussion highlighted the importance of implementing a hybrid approach, combining on-premises and cloud-based security solutions to create a robust defense against cyber threats.
Standardising Practices for Resilience
- A recurring theme throughout the discussion was the urgent need for standardised cyber security practices across industries. Participants agreed that collaboration between public and private sectors is crucial for developing effective strategies to combat cyber threats. The recent implementation of the Cyber Security Act 2024 in Malaysia was cited as a significant step towards establishing a unified framework for cyber security governance.
Building a Unified and Resilient Ecosystem
- As cyber threats continue to evolve, proactive collaboration between industries is crucial. By fostering partnerships, standardising best practices, and adopting cutting-edge technologies, organisations can effectively mitigate risks and enhance resilience. The workshop served as a vital platform for knowledge sharing, bringing together diverse perspectives to address one of the most pressing challenges in today’s digital economy.
The Evolution of Digital Trust in the Age of AI
6 February 2025
Key Takeaways:
- AI as an Enabler and a Challenge
AI is transforming IAM, fraud detection, and threat intelligence by automating risk analysis and detecting anomalies, but concerns over ethical AI deployment remain. - Mitigating Human-Centric Cybersecurity Risks
Human errors remain a major vulnerability. A "trust by design" approach and continuous security education are essential for reducing risks like phishing and insider threats. - Transparency and Privacy as Pillars of Digital Trust
Companies must proactively communicate data practices and comply with evolving regulations to strengthen consumer trust and ethical AI governance - Integrating Cybersecurity with Business Strategy
Embedding cybersecurity into business strategy helps mitigate financial losses, protect brand reputation, and prevent operational disruptions from cyber threats. - Navigating a Complex Threat Landscape
Businesses must invest in quantum-resistant encryption, agile security frameworks, and continuous monitoring to stay ahead of emerging cyber threats. - The Role of Collaborative Ecosystems in Strengthening Digital Trust
Information sharing and joint threat intelligence initiatives will enhance cybersecurity resilience, requiring stronger partnerships across industries and governments.
𝗘𝗺𝗽𝗼𝘄𝗲𝗿𝗶𝗻𝗴 𝗖𝘆𝗯𝗲𝗿 𝗘𝘅𝗽𝗮𝗻𝘀𝗶𝗼𝗻: 𝗧𝗵𝗲 𝗠𝗮𝗹𝗮𝘆𝘀𝗶𝗮 𝗖𝘆𝗯𝗲𝗿 𝗘𝘅𝗽𝗼𝗿𝘁 𝗣𝗹𝗮𝘆𝗯𝗼𝗼𝗸
6 February 2025
In collaboration with CyberSG TIG Collaboration Centre and SGTech, AIBP launched the 𝗠𝗮𝗹𝗮𝘆𝘀𝗶𝗮 𝗖𝘆𝗯𝗲𝗿 𝗘𝘅𝗽𝗼𝗿𝘁 𝗣𝗹𝗮𝘆𝗯𝗼𝗼𝗸 at the Malaysia Playbook Clinic—a fresh guide for Singapore-based cyber security companies looking to explore Malaysia’s market. We covered updates on the 𝘊𝘺𝘣𝘦𝘳 𝘚𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘈𝘤𝘵 2024, 𝘉𝘶𝘥𝘨𝘦𝘵 2025, and the 𝘪𝘮𝘱𝘭𝘪𝘤𝘢𝘵𝘪𝘰𝘯𝘴 𝘰𝘧 𝘑𝘰𝘩𝘰𝘳 𝘚𝘪𝘯𝘨𝘢𝘱𝘰𝘳𝘦 𝘚𝘱𝘦𝘤𝘪𝘢𝘭 𝘌𝘤𝘰𝘯𝘰𝘮𝘪𝘤 𝘡𝘰𝘯𝘦.
Zero Trust: From Buzzword to Best Practice for the Modern Enterprise
14 May 2025
Our recent workshop co-hosted with Cybersecurity Malaysia on Zero Trust, addressed the following themes:
-
- Understanding the core principles of Zero Trust security
- Implementing Zero Trust across different IT environments, including cloud and on-premises
- Addressing common Zero Trust implementation challenges such as legacy system integration, user training and transparency in data practices
- Measuring the effectiveness of a Zero Trust strategy
Securing Digital Future: Cyber Security and Resilience in the AI Era
27 February 2025
Key Takeaways:
- Securing Emerging Technologies: Leveraging AI for predictive threat detection and flexible security solutions protects emerging technologies
- Building Cyber Resilience: Adopting continuous monitoring, agile incident response, and integrated IT-OT security measures enables organisations to quickly recover from disruptions and maintain operational continuity.
- Strengthening Identity & Access Management: Implementing a zero-trust approach with multi-factor authentication and AI-driven risk analysis minimises internal vulnerabilities and secures both employee and customer identities.
- Looking Ahead: Embedding cyber security into core business strategies through strategic investments and collaborative partnerships drives agile decision-making and sustainable growth.
Cybersecurity in ASEAN: Navigating the Evolving Threat Landscape
6 March 2025
This report highlights the critical cybersecurity focus areas for ASEAN businesses. Some findings include:
- From 2018 to 2023, there has been a substantial rise in the number of organisations that have fully implemented digital transformation initiatives, growing from 35.8% to 63.2%.
- Phishing attacks (42.9%), malware and ransomware attacks (37.0%), and a shortage of cybersecurity talent (37.0%) are among the top concerns.
- Over the next two years, organisations plan to focus on digital transformation and security (45.4%), intelligence and awareness (40.3%), and cloud security and infrastructure protection (38.7%).
- 46.2% of organisations plan to increase their cybersecurity budgets in the next 12 months, although a significant portion of organisations are currently spending less than they believe is necessary.
As ASEAN organisations rapidly advance in digital maturity, they must strategically prepare for escalating cybersecurity challenges. Success in this digital era hinges on aligning security measures with business objectives and emerging threats. By prioritizing robust cybersecurity strategies and adequate resource allocation, ASEAN enterprises can safeguard their digital assets, ensure business continuity, and drive growth in an increasingly complex threat landscape.
Securing Access in Southeast Asia:
Identity Access Management & Privileged Access Management Trends and Strategies
27 February 2925
This report highlights key Identity Access Management (IAM) and Privileged Access Management (PAM) strategies for businesses in Southeast Asia
- Cybersecurity threats in Southeast Asia and the growing need for IAM and PAM
- Key benefits of IAM and PAM in protecting identities and privileged accounts
- Compliance insights: Meeting regional regulations like Singapore’s Cybersecurity Act and Malaysia’s Personal Data Protection Act
- Enhancing security for multi-cloud and hybrid environments in Southeast Asia
- Real-world case studies from regional enterprises
Cybersecurity in the Philippines
27 Nov 2024
Cyber Security in the Philippines: AI Enhanced Security through PlatformsThis report highlights the critical aspects of cyber security in the context of ASEAN's economic growth and digital transformation, specifically focusing on the Philippines:
- Understanding the interplay between economic -growth and cybersecurity needs
- Identifying key challenges and emerging trends in cybersecurity
- Evaluating budget allocation strategies for effective cybersecurity measures
- Comparing platform solutions with best-of-breed approaches
- Assessing the current state of cybersecurity implementation in the Philippines
- Prioritising areas for improvement in cybersecurity practices
- Modernising cybersecurity frameworks to meet evolving threats
- Recognising key drivers for the adoption of Secure Access Service Edge (SASE) technology
As ASEAN continues to advance digitally, it is imperative for businesses to prioritize robust cybersecurity strategies that align with their growth objectives. This report underscores the importance of addressing vulnerabilities and enhancing defenses to safeguard digital assets. By focusing on comprehensive assessments and strategic investments, organizations in the Philippines can strengthen their cybersecurity posture, ensuring resilience and competitiveness in an increasingly interconnected landscape.
Responsible AI, Strategic Readiness, and Cyber Resilience in Focus
With the rapid evolution of generative AI, the nature of cyber threats is becoming more complex. Experts warned that conventional security measures are no longer sufficient against AI driven threats such as adaptive malware and highly sophisticated phishing campaigns. To build resilience, organisations must adopt multi-layered defence strategies, invest in upskilling cybersecurity teams, and deploy advanced monitoring systems capable of real time threat detection and mitigation. Cyber resilience now demands not only technical sophistication but also proactive risk management and the agility to respond to an ever changing threat landscape.
9 July 2025, Kuala Lumpur, Malaysia
Sustainable, Secure, and Skilled: Building Malaysia's Digital Future
The panel highlighted the evolving cybersecurity challenges across critical sectors like energy, finance, and utilities. Key insights included the growing complexity of cyber threats, particularly in operational technology (OT) systems with legacy infrastructure, and the potential of AI to enhance threat detection and security operations. The panelists from PETRONAS, PNB, and TNB emphasized the importance of the new Cybersecurity Act, which sets baseline standards, and stressed the need for a holistic approach to cybersecurity that includes top-down organizational support, continuous threat hunting, and talent development. They discussed the blurring lines between IT and OT systems, the risks of dormant malware, and the critical role of AI in simplifying security analyst tasks and detecting sophisticated attacks that traditional tools might miss.Panellists reinforced that frameworks such as Zero Trust architecture and exposure management must become standard practice, particularly as ASEAN nations scale their Industry 4.0 and smart grid initiatives.
10 July 2025, Kuala Lumpur, Malaysia
17 July 2025, Bangkok Thailand
Cybersecurity Leaders Align on Resilience, Identity & Governance Amid Emerging Threats
Key Takeaways
- Identity is the new perimeter. Threat actors are increasingly bypassing MFA protocols and targeting mobile endpoints. As a result, device-based and context-aware identity management is becoming a critical line of defense.
- Sector-specific risk requires tailored strategies. Effective cybersecurity cannot be one-size-fits-all. Organizations must adapt their protection models to fit the operational realities of each business unit, geography, and threat environment—often balancing global standards like NIST with local regulations.
- Governance, risk, and compliance (GRC) at scale is a major challenge. Organizations with diverse business portfolios face the complex task of applying centralized security standards while enabling decentralized execution. Striking this balance is key for both agility and accountability.
- IAM maturity is foundational to resilience. Retrofitting identity architecture late in the game carries high cost and risk. Modern best practices demand federated, pluggable IAM frameworks and embedded mobile app protections as standard.
- Resilience isn’t just IT—it’s business strategy. Building resilience means having strong asset visibility, clear risk prioritization, and well-rehearsed cross-functional response capabilities. Empowering business units through training and cyber drills enhances organizational response beyond the IT perimeter.
- AI brings significant opportunity—and risk. As GenAI and other technologies accelerate, organizations that haven’t laid a foundation in identity security, cyber hygiene, and data governance may struggle to use AI securely and effectively.
21 August 2025, Jakarta, Indonesia
Facing Digital Threats: Indonesia's Stategy for Cybersecurity
Key Takeaways
- AI-powered, highly personalized phishing and social engineering remain top evolving threats — this is consistent with reports referencing AI-driven cyberattacks targeting Indonesia.
- For banks and mining, emphasis on robust recovery plans, regular backups, and continuous cyber awareness aligns with sector-specific resilience discussions in the transcript.
- Resource constraints for SMEs needing priority-focused, right-sized cybersecurity measures is a recurring topic in Indonesia’s market due to limited budgets and skilled staff.
- Lasting resilience grounded in basics like data governance, security testing, and zero trust principles matches the transcript’s focus on fundamentals rather than chasing every new tech trend.
- Collaboration, public education, talent development, and protecting vulnerable groups as pillars of collective resilience also strongly echo the government and private sector partnership emphasis within the transcript.
24 Sept 2025, Manila, Philippines
Key Takeaways
- Rising Cyber Threats: The Philippines continues to face increased ransomware incidents, phishing, and AI-powered social engineering attacks, particularly targeting SMEs, BPOs, finance, and healthcare sectors.
- Data Breaches: Significant breaches affecting financial services, healthcare, and digital payment systems highlight supply chain vulnerabilities and cloud misconfigurations as ongoing risks.
- Identity and Network Resilience: Organizations are focusing on strengthening identity intelligence and network resilience, with AI playing a growing role in risk-based access and behavior anomaly detection.
- Regulatory and Market Growth: With accelerating digital adoption, the cybersecurity market in the Philippines is expected to grow substantially, driven by government regulations, increased cloud use, and demand for robust security services.
- Talent and Awareness: Cybersecurity workforce development and awareness remain critical as complex attacks require skilled professionals and informed users.
- Collaboration and Vendor Partnerships: Emphasis on selecting the right cybersecurity partners to tailor solutions to local market needs and protect business continuity.