CYBERSEC TECHX

Securing emerging technology. Securing your business. Cybersecurity is intrinsically linked with emerging commercial technologies. Quite simply, if you don’t have a solid cybersecurity strategy in place, you’re in trouble. In addition to exploring the specific impact of cybersecurity on resources operations, this theme will pervade throughout the entire TECHX event.

 

 

 

CyberTECHX, Wednesday 6 September 2017

OPENING KEYNOTE PLENARY

09:10

Dyson & Singapore: Fostering technology innovation together

09:30

A digitally-enabled autonomous future: How technology will change the way we think and work

09:50

Making sense of the real use cases for emerging technology: What does the future hold?

10:10

Reserved for Title Sponsor

10:40

Speed Networking

11:00

Exhibition Visit & Networking Refreshments

12:50

Exhibition Visit & Networking Lunch

16:10

Exhibition Visit & Networking Refreshments

CLOSING KEYNOTE PLENARY

17:00

It all starts with data: How can you make yours work for you?

17:30

Blockchain: Disruptor, Enabler or All-talk-no-action?

18:00

Networking Drinks Reception

last published: 27/Mar/17 04:17

 

CyberTECHX, Thursday 7 September 2017

OPENING KEYNOTE PLENARY

08:50

Chair’s opening remarks

09:00

Drone delivery: Will we see true commercial deployment?

09:40

Reserved for Platinum Sponsor

10:00

Exhibition Visit & Networking Refreshments

10:50

Roundtable Discussion Session

Now’s your chance to get really interactive, simply pick a table and join the debate. Each table will run for two iterations, giving you the chance to enjoy two roundtables.
12:20

Exhibition Visit & Networking Lunch

CYBERSECURITY & RESOURCES

CyberTECHX
14:40

Preventing e- espionage in the resources industry

•    The critical importance of setting up cyber security measures
•    Balancing the need for better connectivity and increased vulnerability to cyber attacks 
•    Simple cyber security strategies to protect your operations and your data
CyberTECHX
15:00

Securing mine production processes to prevent breakdowns and bottlenecks

•    Keeping out phishing and social engineering attacks
•    Setting up secured M2M communication framework to build connected, yet secure, autonomous mining operations
•    Keeping your business up-to-date with the latest technology without compromising security 
CyberTECHX
15:20

Overcoming the limitations of Industrial Control System (ICS)

•    Discovering common infection techniques 
•    Developing comprehensive plans to mitigate operational risk
•    Case study: Protecting exposed ICS devices on the internet
15:40

Exhibition Visit & Networking Refreshments

Close of TECHX 2017

last published: 27/Mar/17 04:18

 

 

 

 

For speaking opportunities, contact Emily Chong Emily.chong@terrapinn.com or +65 6322 2339