Malaysia has seen a surge in high-profile cyberattacks targeting critical infrastructure, financial institutions, and government-linked organisations.
As ransomware and data extortion tactics grow more sophisticated, technology, security, and compliance leaders are under increasing pressure, not just to respond, but to build systems that are secure, available, and recoverable by design.
Yet many organisations remain underprepared. Ecosystm research finds that:
- 51% of CISOs are not confident in their cyber posture and risk assessments, despite ongoing investments
- 64% lack the internal skills and knowledge needed to navigate today’s evolving threat landscape
- 79% are looking to deploy more technology to better anticipate and prepare for cyber incidents
These figures underscore a critical gap: investment alone isn’t enough. True resilience requires embedding security, availability, and recovery into every layer of digital infrastructure from core to edge to cloud.
With regulatory expectations around digital resilience tightening, surface-level checklists fall short. What’s needed is a strategic, end-to-end approach where resilience is built into the architecture, not added as an afterthought.
Join us for an exclusive, invitation-only event bringing together senior technology, cybersecurity, and compliance leaders to explore:
- Assessing data resilience maturity and understanding emerging ransomware and extortion trends in Malaysia and the region
- Moving from reactive defence to resilience by design through aligned IT, security, and compliance
- Embedding intelligent threat detection, risk management, and secure transformation across the enterprise
- Building secure, scalable recovery architectures to support your digital transformation journey
This is a unique opportunity to engage in high-value peer discussions and explore how a “better together” approach – where tools, processes, and people are fully aligned – can ensure resilience at scale.
Whether you’re updating playbooks, rethinking recovery metrics, or enabling secure digital innovation, this session will offer clear, actionable steps tailored to today’s threat landscape.
HPE
Hewlett Packard Enterprise, a company that provides enterprise-focused IT products and services like servers, storage, networking, and software.
Veeam
Veeam is a software company providing backup, disaster recovery, and data protection solutions for various workloads, including virtual, physical, cloud, SaaS, and Kubernetes environments
Sash Mukherjee
VP Industry Insights, Ecosystm
Sean Hoong
General Manager of Compute, Data Services, HPC & AI, HPE Malaysia
Ng Hon Chun
General Manager for Services, HPE Malaysia, AEC & Pakistan
David Allott
Field CISO – APJ, Veeam Software
Register for this Event
This event has already concluded.
Please see below some images and key takeaways.
➡️Regulatory compliance is the floor, not the ceiling. Meeting requirements alone doesn’t ensure safety. Organisations must run scenario testing – from tabletop exercises to full cyber drills – and stress test recovery plans, continuously evolving them based on emerging threats and the latest attack methods.
➡️Resilience starts with decision clarity, not just processes. In a crisis, speed depends on clearly mapped roles, authority, and a command centre that can act decisively. It’s not just checklists; it’s knowing who makes which calls and when, and being prepared for deviations so teams can act fast even if key leaders are unavailable.
➡️Supply chain blind spots are a systemic risk. What’s often called “third-party risk” is actually supply chain risk and sits squarely within the organisation’s responsibility. Vulnerabilities can lurk deep in vendor networks, so resilience requires close collaboration, clear expectations, and continuous oversight of security practices across the entire supply chain.
➡️Cyber attackers are increasingly business-savvy. Beyond phishing and basic ransomware, criminals run well-researched campaigns, studying balance sheets, insurance policies, M&A activity, and other critical areas to tailor attacks that maximise financial and reputational impact.
➡️Ransomware demands clear playbooks. Backup, rebuild, accept the loss, or pay – organisations must define viable paths. Decisions should include whether payment is ever an option and who leads negotiations (legal counsel, insurer, or a designated negotiator) ensuring the choice is informed and involves all key stakeholders.