Close this search box.

We are creating some awesome events for you. Kindly bear with us.

The Power of Zero Trust and AI: Strengthening Malaysia’s Security Posture



A Platform For Collaboration

OpenGov Asia is pleased to extend an invitation to an exclusive 9th Annual Malaysia OpenGov Leadership Forum dedicated to empowering the workforce – including IT leaders and heads of departments – to drive future work innovations seamlessly

Meet Our Distinguished Speakers

William Song
Group Chief Information Security Officer
Alliance Bank Malaysia Berhad

Dominic Yew
CISO & Head of Information Security and Digital Risk Management
OCBC Bank (Malaysia) Berhad

Heng Mok
Chief Information Security Officer, APJ

Karen Chong
Regional Vice President, Asean & GCR

Mohit Sagar
CEO & Editor-in-Chief
OpenGov Asia

Harnessing Zero-Trust Security and Artificial Intelligence for A Secure Digital Future

Malaysia’s cybersecurity landscape stands at a critical juncture, marked by both challenges and advancements. As a nation rapidly embracing digital transformation across sectors, including financial services, healthcare, and government services, Malaysia faces escalating cyber threats ranging from ransomware attacks to sophisticated state-sponsored intrusions.  

To counter these threats, the Malaysian government has been actively bolstering its cybersecurity posture through initiatives such as the National Cyber Security Policy and the establishment of CyberSecurity Malaysia, a key agency tasked with coordinating cybersecurity efforts nationwide. Despite these efforts, ongoing vigilance and continuous adaptation to evolving cyber threats remain imperative to safeguard Malaysia’s digital assets and sustain its economic growth trajectory in the digital age.  

A prominent strategy for enhancing security involves the implementation of zero trust. According to Zscaler, a top provider of cloud security solutions, over 90% of IT executives who have initiated their transition to the cloud have either adopted, are in the process of adopting, or are considering adopting a zero-trust security framework.  

The zero-trust approach revolutionises traditional security paradigms by advocating for the constant verification of every user and device attempting to access an organisation’s network resources, irrespective of their location or perceived trustworthiness. By eliminating the inherent trust previously granted to users and devices within the network perimeter, zero-trust models significantly reduce the attack surface and mitigate the risk of lateral movement by malicious actors.  

More importantly, zero trust aligns closely with Malaysia’s cybersecurity strategy. This approach resonates with Malaysia’s emphasis on proactive risk mitigation and real-time threat detection, as outlined in its National Cyber Security Policy, thus enabling the nation to better protect its critical infrastructure and digital assets in the face of evolving cyber challenges. 

Furthermore, organisations in Malaysia can greatly leverage the capabilities of artificial intelligence (AI) to further mitigate security risks. Utilising AI, organisations can streamline their security measures by automatically identifying application segments, thus reducing internal attack surfaces and enabling the creation of tailored zero-trust access policies to mitigate security risks. Moreover, AI facilitates prompt data protection through ML-based automatic data classification, allowing organisations to expedite their data protection initiatives.  

That said, adopting zero trust and AI to ensure robust security is often complex. The complexity of implementing zero-trust architectures and AI, especially in large, interconnected networks, can be daunting, requiring careful planning and coordination across multiple teams and departments.  

In addition, integrating these principles into existing legacy systems and infrastructure poses a significant challenge, as they may lack the necessary capabilities or compatibility with modern security technologies, necessitating careful consideration and potentially extensive upgrades or replacements.  

In light of this, how can organisations ensure the effective implementation of the zero-trust and AI models to enhance their security posture? What strategies can they employ to navigate the complexities inherent in zero trust? 

Modern Zero-Trust Architecture to Secure Cloud Workloads  

The modern zero-trust architecture offers a robust framework for securing cloud workloads by rigorously verifying all users and devices accessing resources, regardless of location or trust level. Through strict access controls, encryption, and continuous monitoring, organisations can protect cloud environments against cyber threats, ensuring data confidentiality, integrity, and availability.  
Reduced Business Risks with A Transformative Approach  

Transforming to a zero-trust approach allows organisations to reduce business risks by implementing continuous verification for all users, devices, and applications accessing resources. This approach minimises unauthorised access and lateral movement by malicious actors, thereby lowering the risk of data breaches, financial losses, and reputational damage. Additionally, zero trust enhances visibility and control over network traffic, enabling real-time threat detection and response, further mitigating risks associated with cyberattacks and data breaches.  

Enhanced Security and Optimal IT Operations with AI  

AI decreases internal attack areas by automatically identifying application segments, enabling the formulation of custom zero-trust access policies to minimise security risks. It also offers immediate data protection through ML-based automatic data classification, requiring no setup and accelerating data protection efforts.

This Forum will allow delegates to:

  • IDENTIFY zero-trust security solutions tailored to the specific needs of each organisation
  • ADDRESS obstacles associated with the complexities of zero-trust
  • SECURE cloud networks with advanced zero-trust architecture
  • MITIGATE business risks through a transformative approach
  • ENHANCE protection against cyberattacks and data breaches
  • IMPROVE data visibility through the implementation of AI
  • UTILISE AI to optimise threat detection
  • LEVERAGE the optimal transformative potential of zero-trust security

Who Should Attend

Get the Latest News From OpenGov Asia

OpenGov Asia releases new digital content daily on trending topics within technology and the public sector. Join our newsletter to have weekly digests of our content conveniently sent to your email address.

By submitting, you agree to receive email communications from Opengov Asia, including upcoming promotions and discounted tickets, news, and access to exclusive invite-only events.

in collaboration with

BROught to you by


Make valuable connections and meet peers and mentors in your industry. Share ideas with others in your field, meet your future business partner, or seek advice from people who’ve done it all before.


We live in uncertain times for tech and business. We’re welcoming the people who are tackling the big challenges facing industry today. In our current climate, upskilling has never been more important.


Get exposed to first-hand knowledge and intelligence from subject matter experts across Asia Pacific to accelerate growth and progress.

“Excellent event. I really enjoyed the sharing session. The speakers and/or panelists are very interactive”

Top Glove

“It was one of the best run online sessions I have attended, right from the preparation, content, and presentations as well as discussions”

Pharmaniaga Berhad

“It was a great event, really engaging where all delegates get to give their input and experience not just listen. Keep up the good work OpenGov team!”

Kossan Rubber Industries Bhd

Get involved

For sponsorship opportunities

For speaking opportunities


Experience secure digital transformation

We accelerate digital transformation so our customers can be more agile, efficient, resilient, and secure. Our cloud native Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location.


Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.


CTC Global Singapore, a premier end-to-end IT solutions provider, is a fully owned subsidiary of ITOCHU Techno-Solutions Corporation (CTC) and ITOCHU Corporation.

Since 1972, CTC has established itself as one of the country’s top IT solutions providers. With 50 years of experience, headed by an experienced management team and staffed by over 200 qualified IT professionals, we support organizations with integrated IT solutions expertise in Autonomous IT, Cyber Security, Digital Transformation, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Well-known for our strengths in system integration and consultation, CTC Global proves to be the preferred IT outsourcing destination for organizations all over Singapore today.


Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit


SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.


HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 


IBM is a leading global hybrid cloud and AI, and business services provider. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity and service.