Join key influencers, policy makers and thought leaders from around the globe to hear their perspectives on regional cybersecurity issues impacting all corners of the world. Seize the opportunity to get answers to your questions from our featured guests. Compared to earlier generations of mobile networks, 5G has shifted to service-based architecture and its ability to host massive IoT connections has resulted in new threat vectors and expanded attack surface. Get an overview of the security risks to enterprise users of 5G services and recommendations to reduce these risks. Gain insight into the security considerations for cloud adoption in the public sector, and discover the methods employed by the Singapore government to adopt Zero Trust Architecture as a proactive approach to fortify its cybersecurity posture in the cloud and to address the constantly evolving security threats.