0800 hrs
Arrival of Guests and Delegates, Registration
Breakfast
0845 hrs
National Anthem
Doa Recital
0855 hrs
OPENING AND LAUNCHING OF PSCC 2018
Opening ceremony by KSN (TBC)

Launching:
  1. Open Source  Development and Capabilities Programme (OSDeC)
  2. Government Central Data Exhange (MyGDX)
 
 
1000 hrs
POWER TALK

What Does the CIO of the Future Look Like? Do we need Generalists or Specialists ? Are we Ready to
take the Leap From Operations to Transformations?
  • Redefining the Role of Chief Information Officers in the age of Transformation and Disruption – CIO’s as Enabler-in-Chief
  • CIO’s as the catalysts, integrators and orchestrators of the digital age
  • Cultivating digital leadership mindsets and behaviours in your teams
  • Emphasining the needs of the customers (citizens,other agencies) first rather than technology itself
  • Aligning the IT objectives with the business priorities of your organisations and creating a culture which embraces innovation and change
Moderator:

Mohit Sagar
Group Managing Director & Editor in Chief
OpenGov Asia

Panellists:

Aleksi Grym
Head of Digitalisation
Bank of Finland

Frans Rijkers
Strategic Advisor Innovation & Identity -
National Office for Identity Data
Ministry for the Interior and
Kingdom Relations, The Netherlands

Janel Rozov
Chief Digital Officer & Government Deputy
Chief Information Officer
Ministry of Economic Affairs and Communications,
Estonia

Chris Buxton
Chief Digital Officer
Statistics New Zealand
1025 hrs
MORNING COFFEE BREAK
1055 hrs
KEYNOTE PRESENTATION - INTERNATIONAL 1

A Future with Innovation
  • How technology will be disrupting the future economy
  • Role of Artificial Intelligence and Robotics
  • Effect on future job markets
Dr Omar Hatamleh
Chief Innovation Officer, Engineering NASA JSC
National Aeronautics & Space Administration
Executive Director – Space Studies Program
International Space University
1110 hrs
TECHNOLOGY CASE STUDY 1

Open Source Innovation in Public Sector


With digitalisation, open source technology is gaining momentum and governments are increasingly embracing open source solutions. In open government initiatives, open source has led to greater citizen participation and contribution. Exciting new technology concepts such as containers, cloud computing, and big data offer multiple avenues for governments and federal agencies to improve operational efficiencies and mission performance. As the world moves faster and becomes more ambiguous, our ability to predict the future is becoming less and less. Particularly in the public sector where the project scope is more large-scale, a more agile approach is needed — one that not surprisingly is very similar to the DevOps model for software development, and specifically open source

This session will explore ideas and give examples of :
  • How different governments across Asia has made a difference with open source solutions
  • Why Enterprise open source is economical, powerful and capable of driving innovation
  • How It avoids lock-in and provides the freedom to explore and move when technology changes
Tan Meng Wai
Director of Solution Architecture,
Asian Growth and Emerging Markets
Red Hat
1125 hrs
KEYNOTE PRESENTATION - INTERNATIONAL 2

Adopting “Cloud-First” Strategy to Boost Digital Economy and Deliver Digital Transformation
  • Understanding how cloud is fundamental to an organisation's digital transformation
  • Enabling the government to rapidly deliver innovative public-sector services without incurring high levels of capital expenditure
  • Would compliance with regulations pose a significant impediment to cloud adoption?
Mark Bowry
Radio & Regional Business Lead – Technology
Australian Broadcasting Corporation
1140 hrs
TECHNOLOGY CASE STUDY 2

Digital Transformation and Multi-Cloud
  • Define various Cloud operating models such as IaaS and PaaS, and differences of Hybrid and Multi-Cloud
  • Understand how Multi-Cloud supports digital transformation and benefits for its choice
  • Know the Pros and Cons of Public Cloud
  • Examine trends and examples of companies moving to Cloud and others moving back from Public Cloud
John Lockhart
Digital Cities Projects Director, Asia Pacific South
Dell EMC
1155 hrs
KEYNOTE PRESENTATION - INTERNATIONAL 3

Building Trusted and Secure Digital Government
  • User experience - the good, bad and ugly
  • Who and what are we protecting?
  • Preparedness and mutual responsibility in an increasingly complex world
  • The importance of risk-based leadership
Dr Maria Milosavljevic
Government Chief Information Security Officer
NSW Department of Finance, Services and Innovation
1210 hrs
TECHNOLOGY CASE STUDY 3

Securing the Multi-Cloud


Many organisations are choosing multi-cloud as their cloud strategy, but few understand how to integrate visibility, and security into the cloud environment. How are workloads communicating? Who are they communicating with? One of the key challenges facing customers is how do they provide a secure infrastructure for applications without compromising agility

Join this session to hear about:
  • How you can enable holistic workload protection & forensics for Multi-Cloud data centers by providing the capability to reduce attack surface and proactive detection of anomalous behaviours
  • In this session you will learn how the solution enables these capabilities and allows you to build a more secure Multi-Cloud environment
Eric Liew
Data Center Product Sales Manager
Cisco
1225 hrs
KEYNOTE PRESENTATION - INTERNATIONAL 4

Cloud meets Government -The Need for Secure infrastructure is Imperative
  • Enabling trusted government services delivered from secured cloud environments
  • Designing the clouds to be secure from the ground up
Dr Nalin Asanka Gamagedara Arachchilage
Lecturer - Cyber Security
University of New South Wales
1240 hrs
TECHNOLOGY CASE STUDY 4

New Realities in Cyber Threats


We take a look at the malware explosion in the current cyber threat landscape and from there understand the evolution of threats and actors to provide a big picture of how threat landscape is changing Wiper attacks on the rise - under the guise of ransomware, along with attacks involving fileless (hidden) malware
  • Politically-motivated threats continue to increase
  • Supply chains remain an easily exploitable route into business networks and will be the key issue in the near future, as well as infection of legitimate software
Our data shows that such attacks have measurable impact on operations, revenue, customers and reputation

Leonard Sim
Head of Presales - APAC
Kaspersky Lab
1255 hrs
THE GREAT DEBATE

Is the Public Sector Ready to Let the Citizens Drive Decisions on Public Policies and Services?


Let us debate on the pros and cons. What are its implications, risks and potentials?
  • Tapping on to the power of social media, and the IoT to let the users’ preferences drive the content of policies and services
  • How would these initiatives impact public sector performance and broader policy outcomes?
  • What are its implications, risks and potentials for the public sector?
Moderator:

Mohit Sagar
Group Managing Director & Editor in Chief
OpenGov Asia

Proposition

Glenn Ashe
Former Government Chief Information Officer
Federal Attorny - General’s Department
Canberra, Australia

Opposition

Susie Dorai Raj
Director - ICT Consultancy Division
Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)
1310 hrs
LUNCH AND NETWORKING BREAK

Parallel Session

MyGOSCON

Harnessing the Potential of Opensource, Sharing Latest Trends, Addressing Upcoming Challenges and Identifying new Opportunities for a Successful Digital Journey
1430 hrs KEYNOTE PRESENTATION 1

Open Source, Emerging Standards, and Quantum Computing
  • Overview of Quantum Computing and its impact on how we compute
  • Combining with key open source initiatives
  • How does the future look like?
Janek Rozov
Chief Digital Officer & Government Deputy
Chief Information Officer
Ministry of Economic Affairs and Communications
Estonia
1450 hrs TECHNOLOGY CASE STUDY 1

Are Truly Open Clouds possible?


The industry is full of buzz around private cloud, public cloud, hybrid cloud & multi-cloud. Traditionally, governments have shied away from public clouds due to security and data residency concerns. However, much has evolved and hybrid cloud / multi-cloud architectures are becoming the norm

This session explores how open source help:
  • To mitigate the risk of cloud silos as more and more workloads are moving into the cloud
  • Technologies like containers and serverless are also getting a lot of attention but are these silver bullets?
Tan Meng Wai
Director of Solution Architecture,
Asian Growth and Emerging Markets
Red Hat
1505 hrs KEYNOTE PRESENTATION 2

Cyber Security and Privacy in Mobile Wireless Environments
  • Deploying new and advanced security and privacy-preserving measures
  • Focusing on collaborative intrusion detection networks to allow intrusion detection system nodes to exchange data with each other
  • Importance of providing authentication, confidentiality, access control and non-repudiation
Pn. Maslina Binti Daud
Senior Vice President, Cyber Security
Proactive Services Division
CyberSecurity Malaysia
1520 hrs KEYNOTE PRESENTATION 3

Towards the Next Generation of Public Services – Cloud Enables Better Governance Models
  • Realising tangible operational and financial benefits and reduced costs
  • Improving organisational agility and transformation in service delivery
  • Decreasing project roll out timeframe, administrative costs and improve asset utilisation
Assoc. Prof. Dr Nurhizam Shafie Mohd Safar
Deputy Dean (Industry & Community Partnership and Income generation)
Faculty of Information Science and Technology
Universiti Kebangsaan Malaysia
1535 hrs TECHNOLOGY CASE STUDY 2

Full Stack Cloud Solution, Inspires Digital Enterprises


The OpenStack story is part of the larger global shift towards Cloud Systems and Solutions. As OpenStack is able to constantly evolve and constantly improve due of its open-source nature, it means that whenever situations change or needs arises, one can leverage on a large active community to quickly respond with innovative solutions:
  • Risk vs Reward on the migration to OpenStack
  • How do decide on the OpenStack Cloud Solution to use
  • How to mitigate the impact on the existing infrastructure
Patrick Low Beng Chee
Principal Architect Enterprise Business Group
Southern Pacific Region
Huawei Technologies
1550 hrs PANEL DISCUSSION 2

Secure Cloud Strategy - Enhance Collaboration, Improve Responsiveness and Increase Innovation Across the Public Service
  • Making risk-based decisions when applying cloud security
  • Taking full advantage of cloud automation practices and design services for the cloud
  • Create opportunities to reuse and share capabilities through increased collaboration
Moderator:

En Harisfadzillah Jamel

Panellists:

En Mohd Syukor Abdul
Information Technology Officer
Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT)
Ministry of Foreign Affairs, Malaysia

Ahmad Bin Osman
ICT consultant (Data center management)
Malaysian Administrative Modernisation
and Management Planning Unit (MAMPU)

Assoc. Prof. Dr. Johari Abdullah
Dean
Faculty of Computer Science & IT
UNIMAS, Sarawak

Mohd Rafiq Bin Mohamed Hashim
GiTN
1610 hrs KEYNOTE PRESENTATION 4

How Governments are using Open Source to Serve the Citizens
  • Utilising open source as key driver of government digital transformation
  • Using open model to design and evaluate public policy
  • Engaging with the citizens and participating in open source communities to solve citizens' problems
Aleksi Grym
Head of Digitalisation
Bank of Finland
1630 hrs KEYNOTE PRESENTATION 5

Inclusive m-Government: Defining the Vision and Exploring the New Opportunities
  • Enabling ubiquitous governments, sustain public sector innovation and transform public service delivery through mobile government platforms and applications
  • Benefits and outcomes of m-government
  • Understanding m-government adoption
Badrul Hisham Besri
Senior Director
TM One
1645 hrs NETWORKING SESSION AND END OF DAY 1
DigiTech - Digital Transformation

Accelerating Government's Capability and Use of Digital Transformation Tools
1430 hrs KEYNOTE PRESENTATION – INTERNATIONAL 1

New Zealand’s Integrated Data Infrastructure - Strategies, Implementation, Successes, Challenges and Road Ahead
  • Integrated Data as an enabler for research, allowing insights into complex issues and offering opportunities across multiple government agencies
  • Providing the insights government agencies need to improve social and economic outcomes for New Zealanders
  • Securing the data whilst maintaining privacy and confidentiality
Chris Buxton
Chief Digital Officer
Statistics New Zealand
1445 hrs TECHNOLOGY CASE STUDY 1

Practical Strategy for Multi-Cloud

Make your multi-cloud strategy real:
  • Application modernisation
  • Operational alignment
  • Multi-cloud Infrastructure
Kishor Bhagwat
Director - Cloud Platform Specialist APJ
Dell EMC
1500 hrs KEYNOTE PRESENTATION – INTERNATIONAL 2

Building Smart Services Through Data, Collaboration Between Agencies and IoT
  • Capitalise on the power of data to more effectively drive decision-making and increase efficiencies
  • Design and deliver: How to drive data-centric transformation of the welfare services
  • Strategies to motivate stakeholders to ensure data analytics is integral to everyday business decision making
Frans Rijkers
Strategic Advisor Innovation & Identity -
National Office for Identity Data
Ministry for the Interior and
Kingdom Relations, The Netherlands
1515 hrs TECHNOLOGY CASE STUDY 2

Empowering Government Transformation


Meet the demands of today’s modern citizens with a secure cloud platform that eliminates data silos & fragile P2P integrations
  • How a complete cloud offers agencies a modern approach to cutting-edge service delivery
  • Meet evolving threats with cloud security
  • Embracing modern technologies to engage with constituents
Troy Latter
Defence & National Security Innovation Advisor
Oracle JAPAC
1530 hrs KEYNOTE PRESENTATION – INTERNATIONAL 3

The Rise of Artificial Intelligence: What does the Future Look Like and What are We Seeing Now
  • Delving into the concept of AI
  • What are some of the challenges for effective AI
  • What are the promises of AI in the short term, over the next 3-5 years and then beyond
Dr Andy Chun
Associate Professor & Former Chief
Information Officer
City University of Hong Kong
1545 hrs TECHNOLOGY CASE STUDY 3

The Changing Face of Communications: How Cloud Changes Unified Communications


Video conferencing transforms government by offering easy and affordable ways to collaborate
  • Crisis Communication: The Power of Video During Uncertain Times
  • Video collaboration promotes flexible schedules without the old struggles to communicate over email or phone
  • Government agencies go digital to increase efficiency, and to improve collaboration
Bryan Lee
Video Collaboration Business Lead & Category Manager (ASEAN)
Logitech Video Collaboration
1600 hrs KEYNOTE PRESENTATION – INTERNATIONAL 4

e-governance and Artificial Intelligence – Ushering the next stage of e- government
  • Role of AI in developing proactive services where citizens don’t have to interact with the government
  • How to legalise Artificial Intelligence? What are the implications involved?
  • How will AI create a faster, more responsive government?
  • What is the extent of AI in creating a smarter and cost effective public sector?

Dr Omar Hatamleh
Chief Innovation Officer, Engineering NASA JSC
National Aeronautics & Space Administration
Executive Director – Space Studies Program
International Space University
1615 hrs TECHNOLOGY CASE STUDY 4

The Advent of Autonomous Networks: Are you Ready to Give up Control?


Intent-based networking has the promise of aligning and enforcing network lifecycle management to business intent, while the ever- increasing need for network security may get some much-needed help from machine learning and artificial intelligence. Autonomous networks and workflow automation technologies can help us keep up with the growth of IoT and complexity of modern networks, but are we ready to give up control? Network analytics and business intelligence can deliver operational efficiencies and monetization opportunities for enterprises by bringing together insights from the vast amount of disparate data sources scattered throughout the network. The session will look at how we may design, deploy and operate networks in the future
  • Workflow Automation, to counter complexity & keep up with IoT growth
  • Operational efficiency to monetise opportunities from Disparate Data Sources
  • Designing and operating Networks of the Future
Andrew Kernebone
Regional SE Director
Extreme Networks
1630 hrs TECHNOLOGY CASE STUDY 5

Avoid a Business Continuity Planning at Your Own Risk


Most businesses have some sort of plan for how they would respond to a major disruption or attack, however, very few are realistically prepared. At most organisation, these plans are fragmentary, primitive, and don’t account for all possible situations and causes. This is unsafe, and possibly due to ignorant. No organisation is invincible or exempt from outside attacks. As CIO, it’s up to you to:
  • Develop a careful and comprehensive business continuity plan that ensures your organisation is not ruined and demolished under the weight of uncontrollable circumstances
  • Implement robust Business continuity practices in your organisation to ensure stability and future health of your organisation
Kavitha Muthy
Security Architect of Governance, Risk Management and Compliance
Prestariang Systems Sdn. Bhd
1645 hrs END OF DAY 1
SecureTech – Cyber & Physical Security

Interconnectedness of Physical and Digital Security
1430 hrs KEYNOTE PRESENTATION – INTERNATIONAL 1

Need For A Paradigm Shift In Cybersecurity


With level of sophistication of cyberthreats rising, governments and businesses need to up their ante, how do we work towards decreasing our vulnerabilities?
  • Developing practical techniques in offensive and defensive cyber operations
  • What are the best practices in mitigating reputational and financial risks?
  • Building Cyber-resilience as an enterprise risk management strategy
  • Adopting multi stakeholder approach to face next tier, multifaceted cyberthreats successfully
Dr Nalin Asanka Gamagedara Arachchilage
Lecturer - Cyber Security
University of New South Wales
1445 hrs TECHNOLOGY CASE STUDY 1

Threat Management & Defence: Our answer to Cybersecurity Risk Mitigation in an era of Complex Threats


As more and more organisations embark on their digital transformation, so too have the threat actors. We are in the era of complex threats
  • Predict – Know the threats and threat actors before they attack you
  • Detection – Continuous monitoring for rapid threat discovery
  • Respond – How can you effectively investigate and respond to the attack if it hits
Leonard Sim
Head of Presales
APAC Kaspersky Lab
1500 hrs KEYNOTE PRESENTATION 1

Future cyber security threats and challenges: Are you ready for what's coming?
  • How do we predict the exact nature of future threats and how to combat them?
  • Are the legacy governmental and regulatory policies proving to be counterproductive?
  • Importance of collaboration between government and the private sector to deal with the scope and scale of cyber threats
Shariffah Rashidah Binti Syed Othman
Director Cyber Security Policy and
International Cooperation Division
National Cyber Security Agency (NACSA)
1515 hrs TECHNOLOGY CASE STUDY 2

Understanding Threat Key to Good Cyber Defence


One indirect result of the SingHealth Cyberbreach in which digital records of 1.5 million patients were stolen has been that there is now growing realisation within South-east Asia that data breaches and cyber attacks do not happen only in the West. Feedback from security researchers suggest that in South-east Asia, there has been, till now, less awareness about the nature of the global cyberthreat. The SingHealth breach has in fact helped to highlight the danger to the region
  • It is necessary to understand the nature of the threat so as to be able to take appropriate defensive measures
  • Good defence can mitigate a lot of the dangers that cyber criminals pose
  • It’s imperative to understand hackers (or threat actors) are not one homogenous group , various motives drive different groups of hackers and their targets and modus operandi vary
Steve Ledzian
Senior Technical Director, Asia
FireEye
1530 hrs KEYNOTE PRESENTATION – INTERNATIONAL 2

South Korea's Cyber Security Strategy


With level of sophistication of cyberthreats rising, governments and businesses need to up their ante, how do we work towards decreasing our vulnerabilities?
  • Understanding global cyber-attack trends
  • A sneak peek into South Korea's cyber security policy
  • Establishing Multi-layer incident response system
Sei Young Lee
Director of Information Security Policy Division,
Ministry of the Interior and Safety, South Korea
1545 hrs TECHNOLOGY CASE STUDY 3

Building a resilience security architecture with lower TCO


As the volume and speed of network data increases, security tools are unable to keep up, resulting in security tool sprawl, performance degradation, inefficiencies and unnecessary expenditures. All of this leads to increased time to threat detection and response and a higher risk of a breach – despite massive spending on security tools.

The solution is to build an efficient network security architecture that copes with increasing network speeds today and in the future, improving the return on investment of security tools while reducing complexity, cost and tool overload across physical, virtual or cloud infrastructure.

Security tools get the right data at the right time and speed. Threats are more visible across cloud, hybrid and on-premises environments, resources can be deployed faster and security tools perform at higher levels.
  • Improving your security architecture with added network resiliency
  • Preparing for the next Generation network architecture
  • Hybrid Cloud security monitoring blueprint
Gwen Lee
Country Manager - South East Asia
Gigamon
1600 hrs KEYNOTE PRESENTATION 2

A Security Rethink for Public Services: Plugging the Physical Breaches as these may pose even more risk to government computer systems than cyber intrusions, because physical access opens so many more channels of attack
  • Exploring ways to better link cyber and physical defence
  • Detecting physical manifestations of cyber events to prevent infiltration in information and communication technologies, systems, and networks
  • Adopting micro-segmentation as a multi-layered defensive mechanism
Dato’ Mohd Nor Bin Hassan
Chief ICT Consultant
Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)
1625 hrs 1615 hrs TECHNOLOGY CASE STUDY 4

Cyber Exposure – Discover, Measure & Reduce Your Cyber Risk


Digital transformation and an explosion of security data have created massive blind spots around cyber risk. Yet that overload of information has made it nearly impossible to know what to focus on. Cyber Exposure, a new discipline built on vulnerability management, is helping organisations measure and reduce cyber risk by providing visibility across assets and insight on what matters most. Learn how Cyber Exposure is helping organisations prioritise effectively to reduce cyber risk
  • Today’s CISO is under more pressure than ever to keep the organisation secure, but is the only measure of ‘success’ the avoidance of a data breach and bad press?
  • How can we measure the effectiveness of our Cyber Security programs and know if our security posture is getting better or worse over time?
  • Learn how you can best understand and reduce your organisation’s Cyber Risk and gain solid benchmarking information about the effectiveness of your cyber security program against those of your industry peers
Sugiarto Koh
Regional Director - Southeast Asia
Tenable
1630 hrs KEYNOTE PRESENTATION 3

Developing the Cyber Skills of the Future
  • Creating centres for cyber excellence within your agencies
  • Upskilling existing staff to meet the skills gap
  • Coordinating with universities to provide the future workforce
Dato’ Dr. Haji Amirudin Bin Abdul Wahab
Chief Executive Officer
CyberSecurity Malaysia
1645 hrs END OF DAY 1
0800 hrs
Arrival of Guests and Delegates
Breakfast
0900 hrs
Keynote Presentation
Responding to the Digital Expectations of Citizens: Managing the Internal Challenges of Innovation, Risk and Governance

Dr Suhazimah Dzazali

Deputy Director General – Information and Communication Technology
Malaysian Administration Modernisation and Management Planning Unit (MAMPU)
0915 hrs
PANEL DISCUSSION

Cyber Security and Data Privacy in the Digital Age – What Does The Future Look Like and What Do We Need To Do?


Cyber Security and Data Privacy has a symbiotic relationship. What can agencies do to protect themselves from the threats of data breach and cyber threats in the digital age?
  • Agencies are requiring enhanced security, but are we doing enough to enable a modern workforce to function securely in the digital age?
  • Examining some of the recent attacks and what the response to these have been
  • Developing and implementing an effective privacy and data protection compliance program while reducing data breach and cybersecurity risks
Moderator:

Mohit Sagar
Group Managing Director & Editor in Chief
OpenGov Asia

Panellists:

Dato’ Dr. Haji Amirudin Bin Abdul Wahab
Chief Executive Officer
CyberSecurity Malaysia

Shariffah Rashidah Binti Syed Othman
Director Cyber Security Policy and
International Cooperation Division
National Cyber Security Agency (NACSA)

Dr Nalin Asanka Gamagedara Arachchilage
Lecturer - Cyber Security
University of New South Wales
0940 hrs
TECHNOLOGY CASE STUDY 5

Digitising the SMEs: The Pivotal Role of The Government and Tech Providers
  • Limitations of SMEs in doing business due to lack of knowledge and applications using technology – how it’s deterring SMEs to propel to greater heights
  • Challenges: Why SMEs are reluctant in using technology and how current government initiatives are not directly addressing this matter
  • Suggestions for improvement
Ms Nuraslina Zainal Abidin
Group Managing Director
Genaxis Sdn Bhd
CEO
Innovations Associates Consulting
0955 hrs
KEYNOTE PRESENTATION

Digital Identity in The Blockchain Era – Creating a ‘Self-Sovereign’ Digital Identity
  • Building a digital ecosystem and discussing how collaboration is key to delivering truly citizen-centric services
  • Providing an executable trust framework for governments to implement citizen identification whilst protecting and preserving the privacy
  • Highlighting how blockchain platforms are being used to improve people’s access to self-sovereign identities
  • Role of international collaboration in creating self-sovereign digital identity
  • Empowering citizens to control the formalisation of their identity, manage their digital personas, and actively monetise their personal data
Frans Rijkers
Strategic Advisor Innovation & Identity -
National Office for Identity Data
Ministry for the Interior and
Kingdom Relations, The Netherlands
1010 hrs
TECHNOLOGY CASE STUDY 6

Packet Intelligence for Actionable Network Visibility & Security


In Today’s Converging IT Ecosystem, Why NPM is Critical Across Wired, Wireless & Unified Communications Operations
  • Thorough Network Forensic where The Truth Is in the Packets
  • Sustainability & Scalability for Business Planning & Continuity
  • Complete Visibility via SNMP, Netflow & Packet Inspection
Mark Kirwan
Head of Sales, EMEA
Savvius
1025 hrs
NETWORKING AND MORNING COFFEE
1055 hrs
KEYNOTE PRESENTATION – INTERNATIONAL 6

Driving the Future of Digital Government – Collaborative, Innovative, Trust Worthy, Citizen-Centric and Citizen-Driven
  • Empowering citizen driven government through collaboration and service delivery
  • How are digital innovations and changing demographics are redefining government by the people and for the people?
  • Improving citizen outcomes by instilling a culture of service excellence and accountability
Janek Rozov
Chief Digital Officer & Government Deputy
Chief Information Officer
Ministry of Economic Affairs and Communications
Estonia
1110 hrs
TECHNOLOGY CASE STUDY 7

Data Centre of the Future


ML/AI driven Network Planning & Operations

Enterprise IT architects are facing a deluge of information from DC and Cloud infrastructure and associated tools which makes it humanly impossible to draw quick insights and be proactive in their operations. Innovations in ML/AI based approaches can help Enterprise IT to regain control of their operations

This session will:
  • Walk through the emerging use of these ML/AI techniques in DC operations and
  • Usage beyond DC in wired and wireless networks
Andrew Kernebone
Regional SE Director
Extreme Networks
1125 hrs
KEYNOTE PRESENTATION – INTERNATIONAL

Government at Your Service Anywhere Anytime - Korea’s e-government Development Experiences


Sharing a vision of innovative administration through the application of e-government
Korea’s e-gov development and success factors
Human-oriented future e-Government

Hoe Soo Kim
Director, Regional Informatization Division
e-Government Bureau, Ministry of Interior, South Korea
1140 hrs
DEBATE SESSION

Future of AI – Boon or Doom?


Stephen Hawking had said that "The development of full artificial intelligence could spell the end of the human race.”

Do you agree? Let us debate this

Moderator:

Glenn Ashe
Former GCIO
Attorney-General's Department

Proposition:

Dr Omar Hatamleh
Chief Innovation Officer, Engineering NASA JSC
National Aeronautics & Space Administration
Executive Director
Space Studies Program
International Space University

Dr Andy Chun
Associate Professor & Former Chief
Information Officer
City University of Hong Kong

Opposition:

Klaus Felsche
Former Director - Analytics Innovation
Department Of Immigration And Border
Protection - Canberra, Australia

Frans Rijkers
Strategic Advisor Innovation & Identity - National Office for Identity Data
Ministry for the Interior and Kingdom Relations
1200 hrs
Closing Remarks

Dato' Dr. Mazlan Yusoff
Director General
Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)
1210 hrs
LEARNING JOURNEY COMPETITION
1245 hrs
NETWORKING LUNCH AND END OF DAY 2