0800 hrs
Arrival of Guests and Delegates, Registration
Breakfast
0845 hrs
National Anthem
Doa Recital
0900 hrs
OPENING AND LAUNCHING OF PSCC 2018

YBhg. Datuk Seri Dr. Ismail bin Hj. Bakar
Chief Secretary to the Government of Malaysia
0950 hrs
POWER TALK

CIO’s of the Future: Generalists or Specialists?
  • Redefining the Role of Chief Information Officers in the age of Transformation and Disruption – CIO’s as Enabler-in-Chief
  • CIO’s as the catalysts, integrators and orchestrators of the digital age
  • Cultivating digital leadership mindsets and behaviours in your teams
  • Emphasining the needs of the customers (citizens,other agencies) first rather than technology itself
  • Aligning the IT objectives with the business priorities of your organisations and creating a culture which embraces innovation and change
Moderator:

Mohit Sagar
Group Managing Director & Editor in Chief
OpenGov Asia

Panellists:

Aleksi Grym
Head of Digitalisation
Bank of Finland

Frans Rijkers
Strategic Advisor Innovation & Identity -
National Office for Identity Data
Ministry for the Interior and
Kingdom Relations, The Netherlands

Janek Rozov
Chief Digital Officer & Government Deputy
Chief Information Officer
Ministry of Economic Affairs and Communications,
Estonia

Chris Buxton
Chief Digital Officer
Statistics New Zealand
1025 hrs
MORNING COFFEE BREAK
1055 hrs
KEYNOTE PRESENTATION - INTERNATIONAL

A Future with Innovation
  • How technology will be disrupting the future economy
  • Role of Artificial Intelligence and Robotics
  • Effect on future job markets
Dr Omar Hatamleh
Chief Innovation Officer, Engineering NASA JSC
National Aeronautics & Space Administration
Executive Director – Space Studies Program
International Space University
1110 hrs
TECHNOLOGY CASE STUDY

Open Source Innovation in Public Sector


With digitalisation, open source technology is gaining momentum and governments are increasingly embracing open source solutions. In open government initiatives, open source has led to greater citizen participation and contribution. Exciting new technology concepts such as containers, cloud computing, and big data offer multiple avenues for governments and federal agencies to improve operational efficiencies and mission performance. As the world moves faster and becomes more ambiguous, our ability to predict the future is becoming less and less. Particularly in the public sector where the project scope is more large-scale, a more agile approach is needed — one that not surprisingly is very similar to the DevOps model for software development, and specifically open source

This session will explore ideas and give examples of :
  • How different governments across Asia has made a difference with open source solutions
  • Why Enterprise open source is economical, powerful and capable of driving innovation
  • How It avoids lock-in and provides the freedom to explore and move when technology changes
Tan Meng Wai
Director of Solution Architecture,
Asian Growth and Emerging Markets
Red Hat Asia Pacific
1125 hrs
KEYNOTE PRESENTATION - INTERNATIONAL

Adopting “Cloud-First” Strategy to Boost Digital Economy and Deliver Digital Transformation
  • Understanding how cloud is fundamental to an organisation's digital transformation
  • Enabling the government to rapidly deliver innovative public-sector services without incurring high levels of capital expenditure
  • Would compliance with regulations pose a significant impediment to cloud adoption?
Mark Bowry
Radio & Regional Business Lead – Technology
Australian Broadcasting Corporation
1140 hrs
TECHNOLOGY CASE STUDY

Digital Government Development Strategy
  • Building a resilient economy, secure and modern government in harmony embracing industry 4.0 technology
  • Smarter digital edge and e-gov ICT modernisation
  • Best practice government policy enables four distinctive critical areas of the “smart customs”
John Lockhart
Digital Cities Projects Director, Asia Pacific South
Dell EMC
1155 hrs
KEYNOTE PRESENTATION - INTERNATIONAL

Connected Government and Connected Citizens
  • Driving public sector transformation and realise connected government with demonstrable benefits
  • Using e-Governance as a tool to provide seamless integrated services to its citizens
  • Enhancing citizen-centricity, responsiveness, inclusiveness and citizen engagement as essential ingredients of good governance
N. Balasubramanyam
Chief Executive Officer
e-Pragati Authority, India
1210 hrs
TECHNOLOGY CASE STUDY

Securing the Multi-Cloud


Many organisations are choosing multi-cloud as their cloud strategy, but few understand how to integrate visibility, and security into the cloud environment. How are workloads communicating? Who are they communicating with? One of the key challenges facing customers is how do they provide a secure infrastructure for applications without compromising agility

Join this session to hear about:
  • How you can enable holistic workload protection & forensics for Multi-Cloud data centers by providing the capability to reduce attack surface and proactive detection of anomalous behaviours
  • In this session you will learn how the solution enables these capabilities and allows you to build a more secure Multi-Cloud environment
Eric Liew
Data Center Product Sales Manager
Cisco
1225 hrs
KEYNOTE PRESENTATION - INTERNATIONAL

Human Factors in Cyber Security and Privacy
  • Understanding and changing behavioural influences to help protect infrastructure, cloud, network systems and data
  • Designing and implementing educational tools, technology and methodologies to increase cyber security awareness
  • Using gaming technology to help protect computer users against phishing attackst
Dr Nalin Asanka Gamagedara Arachchilage
Lecturer - Cyber Security
University of New South Wales
1240 hrs
TECHNOLOGY CASE STUDY

Fraud Prevention - Are you Doing Enough to Protect Your Business and Your Clients


Businesses have already gone far beyond traditional services providing their customers with access to their personal accounts via online channels and mobile devices. Digital transformation brings new opportunities, customers and of course, more revenue. On the other hand, it opens the doors to fraudsters with new sophisticated schemes, cross-channel attacks both on the user’s device and account.
  • Learn how to provide seamless user verification for legitimate clients
  • Enable cross-channel detection of money laundering and related activities
  • Detect account takeovers
Stefanus Natahusada
Presales Manager - SEA
Kaspersky Lab
1255 hrs
THE GREAT DEBATE

Is the Public Sector Ready to Let the Citizens Drive Decisions on Public Policies and Services?


Let us debate on the pros and cons. What are its implications, risks and potentials?
  • Tapping on to the power of social media, and the IoT to let the users’ preferences drive the content of policies and services
  • How would these initiatives impact public sector performance and broader policy outcomes?
  • What are its implications, risks and potentials for the public sector?
Moderator:

Mohit Sagar
Group Managing Director & Editor in Chief
OpenGov Asia

Proposition

Glenn Ashe
Former Government Chief Information Officer
Federal Attorny - General’s Department
Canberra, Australia

N. Balasubramanyam
Chief Executive Officer
e-Pragati Authority, India

Opposition

Klaus Felsche
Former Director – Analytics Innovation
Department of Immigration and Border
Protection

Dr Andy Chun
Associate Professor & Former Chief
Information Officer
City University of Hong Kong
1310 hrs
LUNCH AND NETWORKING BREAK

Parallel Session

MyGOSCON

Harnessing the Potential of Opensource, Sharing Latest Trends, Addressing Upcoming Challenges and Identifying new Opportunities for a Successful Digital Journey
1430 hrs MYGOSCON - KEYNOTE PRESENTATION

Providing a Standardised, Secured and Innovative Way to Produce and Consume Services – Case Study on Estonia’s X-Road Open Source Data Exchange Layer
  • Allowing nation’s various public and private sector e-service databases to link up and function in harmony
  • Ensuring confidentiality, integrity and interoperability between data exchange parties
  • Focusing on practical collaboration, sharing of experience and promoting innovation
Janek Rozov
Chief Digital Officer & Government Deputy
Chief Information Officer
Ministry of Economic Affairs and Communications
Estonia
1450 hrs MYGOSCON - TECHNOLOGY CASE STUDY

Are Truly Open Clouds possible?


The industry is full of buzz around private cloud, public cloud, hybrid cloud & multi-cloud. Traditionally, governments have shied away from public clouds due to security and data residency concerns. However, much has evolved and hybrid cloud / multi-cloud architectures are becoming the norm

This session explores how open source help:
  • To mitigate the risk of cloud silos as more and more workloads are moving into the cloud
  • Technologies like containers and serverless are also getting a lot of attention but are these silver bullets?
Tan Meng Wai
Director of Solution Architecture,
Asian Growth and Emerging Markets
Red Hat Asia Pasific
1505 hrs MYGOSCON - KEYNOTE PRESENTATION

Cyber Security and Privacy in Mobile Wireless Environments
  • Deploying new and advanced security and privacy-preserving measures
  • Focusing on collaborative intrusion detection networks to allow intrusion detection system nodes to exchange data with each other
  • Importance of providing authentication, confidentiality, access control and non-repudiation
Maslina Binti Daud
Senior Vice President, Cyber Security
Proactive Services Division
CyberSecurity Malaysia
1520 hrs MYGOSCON - KEYNOTE PRESENTATION

Towards the Next Generation of Public Services – Cloud Enables Better Governance Models
  • Realising tangible operational and financial benefits and reduced costs
  • Improving organisational agility and transformation in service delivery
  • Decreasing project roll out timeframe, administrative costs and improve asset utilisation
Assoc. Prof. Dr Nurhizam Shafie Mohd Safar
Deputy Dean (Industry & Community Partnership and Income generation)
Faculty of Information Science and Technology
Universiti Kebangsaan Malaysia
1535 hrs MYGOSCON - TECHNOLOGY CASE STUDY

Full Stack Cloud Solution, Inspires Digital Enterprises


The OpenStack story is part of the larger global shift towards Cloud Systems and Solutions. As OpenStack is able to constantly evolve and constantly improve due of its open-source nature, it means that whenever situations change or needs arises, one can leverage on a large active community to quickly respond with innovative solutions:
  • Risk vs Reward on the migration to OpenStack
  • How do decide on the OpenStack Cloud Solution to use
  • How to mitigate the impact on the existing infrastructure
Patrick Low Beng Chee
Principal Architect Enterprise Business Group
Southern Pacific Region
Huawei Technologies
1550 hrs MYGOSCON - PANEL DISCUSSION

Secure Cloud Strategy - Enhance Collaboration, Improve Responsiveness and Increase Innovation Across the Public Service
  • Making risk-based decisions when applying cloud security
  • Taking full advantage of cloud automation practices and design services for the cloud
  • Create opportunities to reuse and share capabilities through increased collaboration
Moderator:

En Harisfadzillah Jamel

Panellists:

En Mohd Syukor Abdul
Information Technology Officer
Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT)
Ministry of Foreign Affairs, Malaysia

Ahmad Bin Osman
ICT consultant (Data center management)
Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)

Mohd Rafiq Mohamed Hashim
Director - Information Security
GiTN

Azih Yusof
ICT Consultant, System Development
Malaysian Administrative and Modernisation Planning Unit (MAMPU)
1610 hrs MYGOSCON - KEYNOTE PRESENTATION

How Governments are using Open Source to Serve the Citizens
  • Utilising open source as key driver of government digital transformation
  • Using open model to design and evaluate public policy
  • Engaging with the citizens and participating in open source communities to solve citizens' problems
Frans Rijkers
Strategic Advisor Innovation & Identity
National Office for Identity Data
Ministry for the Interior and
Kingdom Relations, The Netherlands
1630 hrs MYGOSCON - KEYNOTE PRESENTATION

Adopting Digital Transformation in Public Schools and Campuses
  • Education industry is amongst top 5 digitally disrupted hence generating notable trends in education
  • There are challenges that hinders 21st CLD aspirations
  • TM perspective on Education Stakeholders’ journey helps to ensure the effectiveness of 21st CLD in public schools and campuses
Badrul Hisham Besri
Senior Director
TM One
1645 hrs MYGOSCON - NETWORKING SESSION AND END OF DAY 1
DigiTech - Digital Transformation

Accelerating Government's Capability and Use of Digital Transformation Tools
1430 hrs DIGITECH - KEYNOTE PRESENTATION – INTERNATIONAL

New Zealand’s Integrated Data Infrastructure - Strategies, Implementation, Successes, Challenges and Road Ahead
  • Integrated Data as an enabler for research, allowing insights into complex issues and offering opportunities across multiple government agencies
  • Providing the insights government agencies need to improve social and economic outcomes for New Zealanders
  • Securing the data whilst maintaining privacy and confidentiality
Chris Buxton
Chief Digital Officer
Statistics New Zealand
1445 hrs DIGITECH - TECHNOLOGY CASE STUDY

Digital Government Development Strategy – Cornerstone Building Blocks
  • Digitally transforming and adaptation for future longevity
  • Revisit the e-government design
  • Digital city architecture – e-government, e-citizen, and integrated IOT
John Lockhart
Digital Cities Projects Director, Asia Pacific South
Dell EMC
1500 hrs DIGITECH - KEYNOTE PRESENTATION – INTERNATIONAL

The Digitisation of the Australian Broadcasting Corporation

From microphones to podcasts and iView, and everything in between. Discussing:
  • The changes at the ABC and our move from one-way broadcast via AM radio to fully interacting with our audience on social media
  • Our ongoing efforts to remain a trusted and relevant part of Australians lives, both here and overseas
  • Pioneering forms of content distribution
Mark Bowry
Radio & Regional Business Lead – Technology
Australian Broadcasting Corporation
1515 hrs DIGITECH - TECHNOLOGY CASE STUDY

Empowering Government Transformation


Meet the demands of today’s modern citizens with a secure cloud platform that eliminates data silos & fragile P2P integrations
  • How a complete cloud offers agencies a modern approach to cutting-edge service delivery
  • Meet evolving threats with cloud security
  • Embracing modern technologies to engage with constituents
Troy Latter
Defence & National Security Innovation Advisor
Oracle JAPAC
1530 hrs DIGITECH - KEYNOTE PRESENTATION – INTERNATIONAL

The Rise of Artificial Intelligence: What does the Future Look Like and What are We Seeing Now
  • Delving into the concept of AI
  • What are some of the challenges for effective AI
  • What are the promises of AI in the short term, over the next 3-5 years and then beyond
Dr Andy Chun
Associate Professor & Former Chief
Information Officer
City University of Hong Kong
1545 hrs DIGITECH - TECHNOLOGY CASE STUDY

The Changing Face of Communications: How Cloud Changes Unified Communications


Video conferencing transforms government by offering easy and affordable ways to collaborate
  • Crisis Communication: The Power of Video During Uncertain Times
  • Video collaboration promotes flexible schedules without the old struggles to communicate over email or phone
  • Government agencies go digital to increase efficiency, and to improve collaboration
Bryan Lee
Video Collaboration Business Lead & Category Manager (ASEAN)
Logitech Video Collaboration
1600 hrs DIGITECH - KEYNOTE PRESENTATION

The Fourth Industrial Revolution - Challenges and Opportunities
  • Fourth Industrial Revolution - IoT and i4.0 : What is their relationship
  • Overcoming future issues & challenges
  • What is the way forward
Siew Wai Yoong
Senior Manager - National Strategic Initiative
MIMOS Berhad
1615 hrs DIGITECH - TECHNOLOGY CASE STUDY

The Advent of Autonomous Networks: Are you Ready to Give up Control?


Intent-based networking has the promise of aligning and enforcing network lifecycle management to business intent, while the ever- increasing need for network security may get some much-needed help from machine learning and artificial intelligence. Autonomous networks and workflow automation technologies can help us keep up with the growth of IoT and complexity of modern networks, but are we ready to give up control? Network analytics and business intelligence can deliver operational efficiencies and monetization opportunities for enterprises by bringing together insights from the vast amount of disparate data sources scattered throughout the network. The session will look at how we may design, deploy and operate networks in the future
  • Workflow Automation, to counter complexity & keep up with IoT growth
  • Operational efficiency to monetise opportunities from Disparate Data Sources
  • Designing and operating Networks of the Future
Andrew Kernebone
Regional SE Director
Extreme Networks
1630 hrs DIGITECH - TECHNOLOGY CASE STUDY

Avoid a Business Continuity Planning at Your Own Risk


Most businesses have some sort of plan for how they would respond to a major disruption or attack, however, very few are realistically prepared. At most organisation, these plans are fragmentary, primitive, and don’t account for all possible situations and causes. This is unsafe, and possibly due to ignorant. No organisation is invincible or exempt from outside attacks. As CIO, it’s up to you to:
  • Develop a careful and comprehensive business continuity plan that ensures your organisation is not ruined and demolished under the weight of uncontrollable circumstances
  • Implement robust Business continuity practices in your organisation to ensure stability and future health of your organisation
Kavitha Muthy
Security Architect of Governance, Risk Management and Compliance
Prestariang Systems Sdn. Bhd
1645 hrs DIGITECH - END OF DAY 1
SecureTech – Cyber & Physical Security

Interconnectedness of Physical and Digital Security
1430 hrs SECURETECH - KEYNOTE PRESENTATION – INTERNATIONAL

Need For A Paradigm Shift In Cybersecurity


With level of sophistication of cyberthreats rising, governments and businesses need to up their ante, how do we work towards decreasing our vulnerabilities?
  • Developing practical techniques in offensive and defensive cyber operations
  • What are the best practices in mitigating reputational and financial risks?
  • Building Cyber-resilience as an enterprise risk management strategy
  • Adopting multi stakeholder approach to face next tier, multifaceted cyberthreats successfully
Dr Nalin Asanka Gamagedara Arachchilage
Lecturer - Cyber Security
University of New South Wales
1445 hrs SECURETECH - TECHNOLOGY CASE STUDY

Threat Management & Defence: Our answer to Cybersecurity Risk Mitigation in an era of Complex Threats


As more and more organisations embark on their digital transformation, so too have the threat actors. We are in the era of complex threats
  • Predict – Know the threats and threat actors before they attack you
  • Detection – Continuous monitoring for rapid threat discovery
  • Respond – How can you effectively investigate and respond to the attack if it hits
Stefanus Natahusada
Presales Manager - SEA
Kaspersky Lab
1500 hrs SECURETECH - KEYNOTE PRESENTATION

Future cyber security threats and challenges: Are you ready for what's coming?
  • How do we predict the exact nature of future threats and how to combat them?
  • Are the legacy governmental and regulatory policies proving to be counterproductive?
  • Importance of collaboration between government and the private sector to deal with the scope and scale of cyber threats
Shariffah Rashidah Binti Syed Othman
Director Cyber Security Policy and
International Cooperation Division
National Cyber Security Agency (NACSA)
1515 hrs SECURETECH - TECHNOLOGY CASE STUDY

Understanding Threat Key to Good Cyber Defence


One indirect result of the SingHealth Cyberbreach in which digital records of 1.5 million patients were stolen has been that there is now growing realisation within South-east Asia that data breaches and cyber attacks do not happen only in the West. Feedback from security researchers suggest that in South-east Asia, there has been, till now, less awareness about the nature of the global cyberthreat. The SingHealth breach has in fact helped to highlight the danger to the region
  • It is necessary to understand the nature of the threat so as to be able to take appropriate defensive measures
  • Good defence can mitigate a lot of the dangers that cyber criminals pose
  • It’s imperative to understand hackers (or threat actors) are not one homogenous group , various motives drive different groups of hackers and their targets and modus operandi vary
Mandar Bale
Solutions Architect
FireEye, Asia Pacific
1530 hrs SECURETECH - KEYNOTE PRESENTATION – INTERNATIONAL

Harnessing the Potential of Blockchain Technology to Boost Cyber Security
  • How blockchain can help protect data from cyber attacks
  • Implementing blockchain technology to prevent DDoS attacks
  • Offering strong authentication and resolving single point of attack at the same time
Asst. Prof. Suthee Chantrapunth
Deputy Director
Defence Technology Institute
Thailand
1545 hrs SECURETECH - TECHNOLOGY CASE STUDY

Building a resilience security architecture with lower TCO


As the volume and speed of network data increases, security tools are unable to keep up, resulting in security tool sprawl, performance degradation, inefficiencies and unnecessary expenditures. All of this leads to increased time to threat detection and response and a higher risk of a breach – despite massive spending on security tools.

The solution is to build an efficient network security architecture that copes with increasing network speeds today and in the future, improving the return on investment of security tools while reducing complexity, cost and tool overload across physical, virtual or cloud infrastructure.

Security tools get the right data at the right time and speed. Threats are more visible across cloud, hybrid and on-premises environments, resources can be deployed faster and security tools perform at higher levels.
  • Improving your security architecture with added network resiliency
  • Preparing for the next Generation network architecture
  • Hybrid Cloud security monitoring blueprint
Gwen Lee
Country Manager - South East Asia
Gigamon
1600 hrs SECURETECH - KEYNOTE PRESENTATION

A Security Rethink for Public Services: Plugging the Physical Breaches as these may pose even more risk to government computer systems than cyber intrusions, because physical access opens so many more channels of attack
  • Exploring ways to better link cyber and physical defence
  • Detecting physical manifestations of cyber events to prevent infiltration in information and communication technologies, systems, and networks
  • Adopting micro-segmentation as a multi-layered defensive mechanism
Dato’ Mohd Nor Bin Hassan
Chief ICT Consultant
Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)
1615 hrs SECURETECH - TECHNOLOGY CASE STUDY

Cyber Exposure – A New Discipline for Reducing Cyber Riskk


Digital transformation and an explosion of security data have created massive blind spots around cyber risk. Yet that overload of information has made it nearly impossible to know what to focus on. Cyber Exposure, a new discipline built on vulnerability management, is helping organisations measure and reduce cyber risk by providing visibility across assets and insight on what matters most. Learn how Cyber Exposure is helping organisations prioritise effectively to reduce cyber risk
  • Today’s CISO is under more pressure than ever to keep the organisation secure, but is the only measure of ‘success’ the avoidance of a data breach and bad press?
  • How can we measure the effectiveness of our Cyber Security programs and know if our security posture is getting better or worse over time?
  • Learn how you can best understand and reduce your organisation’s Cyber Risk and gain solid benchmarking information about the effectiveness of your cyber security program against those of your industry peers
Sugiarto Koh
Regional Director - Southeast Asia
Tenable
1630 hrs SECURETECH - KEYNOTE PRESENTATION

Developing the Cyber Skills of the Future
  • Creating centres for cyber excellence within your agencies
  • Upskilling existing staff to meet the skills gap
  • Coordinating with universities to provide the future workforce
Dato’ Dr. Haji Amirudin Bin Abdul Wahab
Chief Executive Officer
CyberSecurity Malaysia
1645 hrs SECURETECH - END OF DAY 1
0800 hrs
Arrival of Guests and Delegates
Breakfast
0900 hrs
KEYNOTE PRESENTATION

Responding to the Digital Expectations of Citizens: Innovating Public Service Delivery

Dr Suhazimah Dzazali

Deputy Director General – Information and Communication Technology
Malaysian Administration Modernisation and Management Planning Unit (MAMPU)
0915 hrs
PANEL DISCUSSION

Cyber Security and Data Privacy in the Digital Age – What Does The Future Look Like and What Do We Need To Do?


Cyber Security and Data Privacy has a symbiotic relationship. What can agencies do to protect themselves from the threats of data breach and cyber threats in the digital age?
  • Agencies are requiring enhanced security, but are we doing enough to enable a modern workforce to function securely in the digital age?
  • Examining some of the recent attacks and what the response to these have been
  • Developing and implementing an effective privacy and data protection compliance program while reducing data breach and cybersecurity risks
Moderator:

Mohit Sagar
Group Managing Director & Editor in Chief
OpenGov Asia

Panellists:

Dato’ Dr. Haji Amirudin Bin Abdul Wahab
Chief Executive Officer
CyberSecurity Malaysia

Harme Mohamed
Director Cyber Security Technology
Division
National Cyber Security Agency (NACSA)

Dr Nalin Asanka Gamagedara Arachchilage
Lecturer - Cyber Security
University of New South Wales

Susie Dorai Raj
Director - ICT Consultancy Division
Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)
0940 hrs
TECHNOLOGY CASE STUDY

Digitising the SMEs: The Pivotal Role of The Government and Tech Providers
  • Limitations of SMEs in doing business due to lack of knowledge and applications using technology – how it’s deterring SMEs to propel to greater heights
  • Challenges: Why SMEs are reluctant in using technology and how current government initiatives are not directly addressing this matter
  • Suggestions for improvement
Ms Nuraslina Zainal Abidin
Group Managing Director
Genaxis Sdn Bhd
CEO
Innovations Associates Consulting
0955 hrs
KEYNOTE PRESENTATION - INTERNATIONAL

Digital Identity in The Blockchain Era – Creating a ‘Self-Sovereign’ Digital Identity
  • Building a digital ecosystem and discussing how collaboration is key to delivering truly citizen-centric services
  • Providing an executable trust framework for governments to implement citizen identification whilst protecting and preserving the privacy
  • Highlighting how blockchain platforms are being used to improve people’s access to self-sovereign identities
  • Role of international collaboration in creating self-sovereign digital identity
  • Empowering citizens to control the formalisation of their identity, manage their digital personas, and actively monetise their personal data
Frans Rijkers
Strategic Advisor Innovation & Identity -
National Office for Identity Data
Ministry for the Interior and
Kingdom Relations, The Netherlands
1010 hrs
TECHNOLOGY CASE STUDY

Packet Intelligence for Actionable Network Visibility & Security


In Today’s Converging IT Ecosystem, Why NPM is Critical Across Wired, Wireless & Unified Communications Operations
  • Thorough Network Forensic where The Truth Is in the Packets
  • Sustainability & Scalability for Business Planning & Continuity
  • Complete Visibility via SNMP, Netflow & Packet Inspection
Mark Kirwan
Head of Sales, EMEA
Savvius
1025 hrs
NETWORKING AND MORNING COFFEE
1055 hrs
KEYNOTE PRESENTATION – INTERNATIONAL

Estonia's Experience in the Digital Transformation of Government Services


Today, in Estonia’s public sector we have a complicated overview of the services that the state offers. This entails for the end user time and money spent on finding out who, where and how offers certain services. The task of the service owner is the search for possibilities to make services more convenient, financially rational and the realisation of these goals, based on the value generated through the provision of services. We in Estonia have created the Public Service Portfolio with more than 1500 public services described both in human and machine readable format. Each service with each channel has fields for mapping KPIs. In the future state will get an overview of the quality and net price of the services it offers.
  • Responsibility for service quality
  • Service catalogue mapping and management tool
  • Service quality basic indicators
Janek Rozov
Chief Digital Officer & Government Deputy
Chief Information Officer
Ministry of Economic Affairs and Communications
Estonia
1110 hrs
TECHNOLOGY CASE STUDY

Data Centre of the Future


ML/AI driven Network Planning & Operations

Enterprise IT architects are facing a deluge of information from DC and Cloud infrastructure and associated tools which makes it humanly impossible to draw quick insights and be proactive in their operations. Innovations in ML/AI based approaches can help Enterprise IT to regain control of their operations

This session will:
  • Walk through the emerging use of these ML/AI techniques in DC operations and
  • Usage beyond DC in wired and wireless networks
Andrew Kernebone
Regional SE Director
Extreme Networks
1125 hrs
KEYNOTE PRESENTATION – INTERNATIONAL

Digitalisation in Finance and Road to Cashless Society – A Finnish Experience
  • Embracing innovation and disruption
  • Deploying new technology to improve the quality, pricing, and convenience of products
  • Generating a better financial system for customers and citizens in the future
Aleksi Grym
Head of Digitalisation
Bank of Finland
1140 hrs
DEBATE SESSION

Future of AI – Boon or Doom?


Stephen Hawking had said that "The development of full artificial intelligence could spell the end of the human race.”

Do you agree? Let us debate this

Moderator:

Glenn Ashe
Former GCIO
Attorney-General's Department

Proposition:

Dr Omar Hatamleh
Chief Innovation Officer, Engineering NASA JSC
National Aeronautics & Space Administration
Executive Director
Space Studies Program
International Space University

Chris Buxton
Chief Digital Officer
Statistics New Zealand

Opposition:

Klaus Felsche
Former Director - Analytics Innovation
Department Of Immigration And Border
Protection - Canberra, Australia

Mark Bowry
Radio & Regional Business Lead – Technology
Australian Broadcasting Corporation
1200 hrs
Closing Remarks

Dato' Dr. Mazlan Yusoff
Director General
Malaysian Administrative Modernisation and Management Planning Unit (MAMPU)
1210 hrs
LEARNING JOURNEY COMPETITION
1245 hrs
NETWORKING LUNCH AND END OF DAY 2