MYSECurity.TV

Home   /   RESOURCES   /   MYSEC.TV   / Live – APAC Cybersecurity Strategies & Industrial Control Systems (ICS) Cyber Security Incidents

Live – APAC Cybersecurity Strategies & Industrial Control Systems (ICS) Cyber Security Incidents

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

APAC Cybersecurity Strategies & World’s best (worst) Industrial Control Systems (ICS) Cyber Security Incidents

Srinivas Bhattiprolu, Head of Advanced Consulting Service, Nokia Software, Singapore
REGIONAL CYBERSECURITY STRATEGIES IN APAC – Singapore and Canada.
Identifying the key modalities for adopting and implementing recommendations and the concomitant challenges faced by different stakeholders;•comparing the Australian cybersecurity strategy with the approach other nations are taking in the region.

Daniel Ehrenreich, Secure Communications and Control Experts , Israel
Industrial Control Systems (ICS) Cyber Security Incidents of the past decade and more – including 2020

#cybersecurity #mysecurityTV #ICScybersecurity #Nokia #5G #SmartCities #Singapore #India #Canada #Israel #stuxnet

OTHER VIDEOS IN THIS SERIES

sp
March 17, 2026
In this exclusive interview from Axiom Space headquarters in Houston, Aaron Tullos, Vice President of Station Engineering, gives Australia in Space TV an inside look at the engineering behind the Axiom Station, a commercial space station designed to operate in low Earth orbit.Watch Now
a6
March 8, 2026
At Zero Trust World #ZTW26 in Orlando, we speak with Emile Barakat, Director of Operations – APAC at ThreatLocker, about the new Australian regional office and partners and clients in the APAC region.Watch Now
a5
March 8, 2026
At Zero Trust World #ZTW26 in Orlando, we speak with Kieran Human, Security Enablement Lead at ThreatLocker, on how SQL injection remains one of the most persistent vulnerabilities in cybersecurity, with tens of thousands of known CVEs and continued relevance in modern attacks.Watch Now
a4
March 8, 2026
At Zero Trust World #ZTW26 in Orlando, we speak with Ryan Bowman, VP of Operations at ThreatLocker, about the growing risks of Shadow IT and how organisations can regain control over their environments.Watch Now

PLEASE COMPLETE