STACKx Cybersecurity 2025 | Singapore Government Developer Portal
Have feedback? Please
Programme
Overview
Programme
Speakers
Product Showcase Partners
FAQ
Time Activity
08:00 AM - 09:00 AM Registration & Light Refreshments
09:00 AM - 09:15 AM Opening Address by Mr GOH Wei Boon (CE, GovTech Singapore)
09:15 AM - 09:45 AM [Keynote] Cyber Threat Landscape: 2025 and Beyond
09:45 AM - 10:15 AM [Keynote] Have the Criminals Caught Up with Us Yet? – Uncovering the Modus Operandi Behind Hidden Criminal Networks
10:15 AM - 10:45 AM [Keynote] The Digital Sovereignty Dilemma
10:45 AM - 11:15 AM [Keynote] TBC
11:15 AM - 12:15 PM [Panel Discussion] The Role of CISOs in Managing Emerging Cybersecurity Threats
12:15 PM - 02:00 PM Lunch & Showcase
Breakout Tracks
Track 1: AI x Cybersecurity Track 2: Resilient and Secure Cloud Track 3: CISOs of the Future
02:00 PM - 02:30 PM [Presentation] AI in Cybersecurity: Hype, Reality, and the Shift from Tools to Teammates [Presentation] Building Secure and Resilient Systems through Chaos Engineering [Presentation] The Future CISO: Leading with Innovation, Collaboration and Agility
02:30 PM - 03:00 PM [Presentation] Amazon's Approach to Securing AI [Presentation] Crowdstrike Global Threat Report [Presentation] Unlocking the Value of Bug Bounty: A Strategic Approach for CISOs
03:00 PM - 04:00 PM [Panel Discussion] Cyber Threats and Opportunities Arising from Harnessing AI [Panel Discussion] Powering the Next Era of Cloud Security [Panel Discussion] Managing Modern Cybersecurity Risks Amidst Challenges in the Modern Threat Landscape
04:00 PM - 04:30 PM [Presentation] Agentic AI Red Teaming [Presentation] Securing Sensitive Data in the Cloud: The Rise of Cloud Adoption [Presentation] Modernising Security Operations
04:30 PM - 05:00 PM [Presentation] How the Government is Enabling AI for Cybersecurity [Presentation] From Overload to Overlords: Streamlining Cybersecurity in the Government [Presentation] Hack to Protect: How the Government Adopts a Proactive Approach to Security Testing
05:00 PM Event Ends

Programme

 
Track:

Morning Sessions

Speaker(s)

Speaker Image

Mr GOH Wei Boon
Government Chief Digital Technology Officer,
Ministry of Digital Development and Information
Chief Executive,
GovTech Singapore

 

As we move into 2025 and beyond, the cyber threat landscape is becoming increasingly volatile, driven by rising geopolitical tensions, trade conflicts, and AI-powered threat actors. Nation states are expanding their cyber operations and targeting critical infrastructure, corporate networks, and public information channels with greater stealth and impunity. Chinese APTs continue to escalate their campaigns despite exposure, using large-scale anonymization networks for deniability. To stay ahead, organizations must adopt proactive threat intelligence, automated incident response, and zero-trust architectures to withstand this evolving cyber battlefield.

Track:

Morning Sessions

Speaker(s)

Speaker Image

Mr Jonathan LUFF
Chief of Staff,
Recorded Future

 

Share with the audience, insights on the operations and business models of modern-day criminal networks (e.g. ransomware as a service) and what organisations can do to better prepare themselves for the threats arising from these criminal groups.

Track:

Morning Sessions

Speaker(s)

Speaker Image

Dr Neal Jetton
Cybercrime Director,
INTERPOL

 

Innovation and seizing the opportunities of AI and other disruptive technologies require openness and building on a global tech stack. Yet geopolitical tensions and outright warfare are leading many countries to raise the barricades of digital sovereignty. Luukas will touch upon: - Estonia and Ukraine's experiences at the frontlines of cyber and physical warfare - How to extend previous tech and innovation success into the AI era - How small states like Estonia and Singapore and groupings like Europe can find their footing between the US and China (and some practical considerations for companies stuck in the middle).

Track:

Morning Sessions

Speaker(s)

Speaker Image

Mr Luukas ILVES
Advisor to the Deputy Prime Minister, Ministry of Digital Transformation of Ukraine
Former Government Chief Information Officer and Undersecretary for Digital Transformation of the Republic of Estonia, Ministry of Economic Affairs and Communications of Estonia

 
Track:

Morning Sessions

Speaker(s)

Speaker Image

Mr CHUA Kuan Seah
Deputy Commissioner of Cybersecurity & Deputy Chief Executive (Development),
Cyber Security Agency of Singapore

 
Track:

Morning Sessions

Speaker(s)

Speaker Image

Ms CHUA Ai Qi
Director (Cyber Security),
Centre for Strategic Infocomm Technologies

Speaker Image

Mrs Ann JOHNSON
Corporate Vice President & Deputy Chief Information Security Officer, Customer Security Management Office,
Microsoft

Default Image

Mr Boris HAJDUK
Chief Information Security Officer,
GoTo Gojek Tokopedia

Speaker Image

Mr Daryl PEREIRA
Director & Head of OCISO, APJ,
Google Cloud

Speaker Image

Mr Luukas ILVES
Advisor to the Deputy Prime Minister, Ministry of Digital Transformation of Ukraine
Former Government Chief Information Officer and Undersecretary for Digital Transformation of the Republic of Estonia, Ministry of Economic Affairs and Communications of Estonia

Speaker Image

Mr Justiin ANG (Moderator)
Government Chief Information Security Officer & Assistant Chief Executive (Cybersecurity), GovTech Singapore
Assistant Chief Executive (Development), Cybersecurity Security Agency of Singapore

 
Track:

Track 2: Resilient and Secure Cloud

Speaker(s)

Speaker Image

Mr KIM Kuok Chiang
Principal Security Advisor APJ,
Amazon Web Services

 

This presentation will explore how public sector leaders can balance digital innovation with robust cybersecurity measures to modernise operations and meet citizen expectations. Damien will share lessons from his work in Australia's public sector, focusing on adopting AI and emerging technologies while safeguarding sensitive data. He will also emphasise the importance of collaboration between government agencies, industry partners, and regulators to create transparent governance structures and foster trust. Attendees will learn strategies for aligning innovation with security priorities, ensuring resilience in an increasingly interconnected world.

Track:

Track 3: CISOs of the Future

Speaker(s)

Default Image

Mr Damien MATHIESON
Field Chief Information Security Officer,
Splunk

 

AI is no longer just a tool—it's becoming an essential teammate in cybersecurity. But how real is this transformation? And what does it mean for security teams? In this presentation, we'll cut through the hype to explore AI's tangible impact today—how it accelerates threat detection, automates responses, and augments human defenders. We'll also look at what's next: the rise of autonomous AI security agents capable of hunting threats, patching vulnerabilities, and defending systems in real-time—without human intervention. Imagine a future where cybersecurity is no longer a reactive process but a self-healing, AI-driven ecosystem. How will this reshape security operations? What new skills will engineers need? Join us as we explore how AI is revolutionising cybersecurity and redefining the future of digital defense.

Track:

Track 1: AI x Cybersecurity

Speaker(s)

Speaker Image

Mr Pawan KINGER
Director, Threat Research,
Trend Micro

 

Amazon operates AI solutions in production at massive scale. Learn how Amazon approaches AI Security, how they build and operate AI systems securely at scale, and what you need to know to build secure, reliable and responsible AI solutions.

Track:

Track 1: AI x Cybersecurity

Speaker(s)

Speaker Image

Mr Bryce BOLAND
Head of Security, ASEAN,
Amazon Web Services

 

Today's adversaries have long been accelerating and evolving their operations. CrowdStrike now tracks 257 named adversaries and over 140 emerging activity clusters. To stop these adversaries, it is imperative we understand their behaviors, motivations, and techniques. Cloud environments are under siege: New and unattributed cloud intrusions increased by 26% year-over-year. In this session, findings pertaining to cloud threats from the CrowdStrike 2025 Global Threat Report will be shared along with how organisations need to evolve their Cloud Security strategy and prioritise what matters the most – Applications.

Track:

Track 2: Resilient and Secure Cloud

Speaker(s)

Speaker Image

Mr Jeff DISTASIO
Global Vice President, Cloud Security Sales,
CrowdStrike

 

Bug Bounty is more than just finding vulnerabilities; it is a continuous approach that optimises testing efforts, enhances resilience and provides valuable insights into real-world attack scenarios. This session will break down how CISOs can build a strong business case for Bug Bounty, demonstrating ROI through a cost-effective, pay-per-valid-report model. Learn how to structure a program that aligns with your security maturity, integrate it into your existing security framework and leverage it as a strategic advantage. With examples from successful industry implementations, we’ll explore how to balance risk, cost and other resource constraints for maximum security impact.

Track:

Track 3: CISOs of the Future

Speaker(s)

Speaker Image

Ms Eileen NEO
APAC Team Manager,
YesWeHack

 
Track:

Track 1: AI x Cybersecurity

Speaker(s)

Speaker Image

Ms April CHIN
Chief Executive Officer (Singapore),
Resaro.ai

Speaker Image

Mr Dennis CHUNG
Chief Security Officer,
Microsoft

Speaker Image

Prof Simon CHESTERMAN
Dean, NUS College,
National University of Singapore

Speaker Image

Dr LIU Yang
Executive Director,
CyberSG R&D Programme Office

Speaker Image

Mr WONG Wai Tuck
Head of Labs Engineering,
watchTowr

Default Image

Dr HE Ruimin (Moderator)
Chief AI Officer and Deputy Government Digital Technology Officer,
Ministry of Digital Development and Information

 
Track:

Track 2: Resilient and Secure Cloud

Speaker(s)

Speaker Image

Mr Heng MOK
Head of CISO in Residence - APJ,
Zscaler

Speaker Image

Mr CHEN Jun
Manager, Cloud Domain Consulting (ASEAN, GC & Korea),
Palo Alto Networks

Default Image

Mr Koushik RADHAKRISHNAN
Head of Cloud Security Engineering, APAC,
Check Point Software

Speaker Image

Mr Raju UPPALAPATI
Vice President of Security Products & Engineering,
Oracle Corporation

Speaker Image

Mr Reuben KOH
Director, Cybersecurity Strategy and Technology - APJ,
Akamai Technologies

Speaker Image

Mr Bernard TAN (Moderator)
Director,
GovTech Singapore

 
Track:

Track 3: CISOs of the Future

Speaker(s)

Speaker Image

Mr HOO Chuan Wei
Chief Information Security Officer,
StarHub

Speaker Image

Mr Jonas WALKER
Director, Threat Intelligence,
Fortinet

Default Image

Mr HUANG Shao Fei
Group Chief Information Security Officer,
SMRT Corporation

 

In this presentation, we will delve into the concept of agentic AI red teaming. We will discuss the challenges we encountered during the development of our solution. To address these challenges, we employed a variety of approaches, and we will touch upon them. Additionally, we will explore the current state of the art in agentic AI, highlighting recent advancements and ongoing limitations.

Track:

Track 1: AI x Cybersecurity

Speaker(s)

Speaker Image

Dr Ivan JACOBS
Vice President, Head of AI Capability Development,
ST Engineering

 

How do industry leaders protect their cloud infrastructure? Join Tenable experts from the security field as they share real-world experiences and best practices for securing cloud environments. Whether you're just starting your cloud security journey or looking to enhance your approach, this session provides practical insights into smart CNAPP deployment and strengthening your cloud security strategy. Topics covered: - Actionable deployment strategies and best practices - Efficient ways to streamline cloud security operations across multiple platforms while maintaining comprehensive visibility - Practical approaches for achieving least privilege and responding to zero-day threats in cloud environments

Track:

Track 2: Resilient and Secure Cloud

Speaker(s)

Default Image

Mr Henry ONG
Senior SE Manager, APJ,
Tenable

 

Modern Security Operations Centers (SOCs) face a formidable set of challenges that render traditional security approaches increasingly ineffective. The complexity and heterogeneity of their tool stacks create operational friction, while the sheer volume of alerts leads to debilitating "alert fatigue" among analysts. Compounding these issues is a persistent talent shortage, leaving SOCs understaffed and struggling to keep pace with the ever-evolving sophistication of cyber attackers. These combined pressures demonstrate that the legacy methods of securing organisations are no longer sufficient, necessitating a comprehensive modernisation of the SOC to effectively address today's dynamic threat landscape.

Track:

Track 3: CISOs of the Future

Speaker(s)

Speaker Image

Mr Steve LEDZIAN
Chief Technology Officer, Google Cloud Security & Mandiant, JAPAC,
Google Cloud Security & Mandiant

 

With cyber threats becoming more sophisticated, AI presents both opportunities and challenges for government security operations. This session delves into the practical aspects of AI adoption in public sector cybersecurity - from selecting appropriate use cases and building capabilities to managing AI systems at scale. Learn how government agencies can harness AI to strengthen their security posture while ensuring sustainable, responsible implementation.

Track:

Track 1: AI x Cybersecurity

Speaker(s)

Speaker Image

Mr LEOW Wen Bin
Cybersecurity Engineer,
GovTech Singapore

 

In this talk, we focus on the challenge of security overload within government agencies. We examine how constant alerts and mounting security demands burden teams, risking critical threat oversight. Discover how automation, effective tools, and a comprehensive risk-based compliance framework can empower teams to regain control and transition from overwhelmed responders to confident, overlord-like leaders in cybersecurity.

Track:

Track 2: Resilient and Secure Cloud

Speaker(s)

Speaker Image

Mr Josias TEO
Senior Cybersecurity Engineer,
GovTech Singapore

Speaker Image

Mr CHEW Kin Zhong
Cybersecurity Engineer,
GovTech Singapore

 

In today's world of cybersecurity, waiting for vulnerabilities to be exploited is no longer an option. Instead, the best defense is a good offense, and the Government is taking a proactive approach to security testing — poking holes in our own systems before attackers do. Join us as we pull the curtains back on the various types of security testing done on Government systems, share lessons learnt in our journey, and how we continuously evolve our approach with the ever-changing cyber threat landscape.

Track:

Track 3: CISOs of the Future

Speaker(s)

Speaker Image

Mr Eugene NG
Deputy Director, Engineering Cluster,
GovTech Singapore


*Please note that the programme may be subject to change without prior notice

Last updated 17 March 2025

Send this page via email
Share on Facebook
Share on Linkedin
Tweet this page