
Unfilled Roles, Untapped Talent: Building Malaysia’s Cyber Defenders
Discover how laws, frameworks, and certifications in cybersecurity can empower the next generation of defenders against rising threats.
Date:
23rd October 2025
Time:
9:00am – 5:00pm
Mode:
Live Virtual (VILT)

Lucky Draw!
Join and stand a chance to CompTIA CertMaster Learn + Lab or an exam voucher!
Cybersecurity at a Breaking Point: Malaysia and Beyond
Rising threats. Growing gaps. Urgent action.
43%
of organizations experienced not just one, but multiple breaches last year.
(TechRadar, 2025)
$10.5 trillion
By 2025, cybercrime will cost the global economy $10.5 trillion annually DOS Attacks blocked by Cloudflare in Q1 2025.
(Cybersecurity Ventures)
88%
of organizations reported at least one cybersecurity incident in the past year.
(TechRadar, 2025)

Malaysia needs over 25,000 cybersecurity professionals by 2025. However, we are still 12,000 short.
The clock is ticking. Every unfilled role leaves our organizations and our nation more exposed. With the talent gap widening, only those who act now will seize the opportunities, secure the jobs, and shape Malaysia’s cyber future.
Don’t wait until the seats are gone be among the few who step up.

Who Should Attend
For professionals and learners aiming to upskill.
Key Takeaways
Practical insights you can apply right away.
Decode Laws & Frameworks
Learn how the Cyber Security Act, PDPA, and Data Sharing frameworks are shaping Malaysia’s digital landscape.
Sharpen Your Cyber Skills
Gain practical insights into OSINT, OpSec, and incident response.
Master Identity Protection
Understand how growing threats like credential theft impact businesses—and how to guard against them.
Exclusive Lucky Draw for Attendees!
Sponsored by CompTIA, stand a chance to win:
Winners will be announced during the Closing Session on event day.
Register today to secure your spot and your chance to win!

1st Prize Winner
CompTIA CertMaster Learn + CertMaster Lab.

2nd Prize Winner
CompTIA Exam Voucher.
Event Agenda
Your one-day journey at a glance.
| Time | Duration | Session | Topic | Speaker Name |
|---|---|---|---|---|
| 8:50 – 9:10 am | 20 mins | Opening Remarks | Welcome Message | Alan Yau |
| 9:10 – 9:40 am | 30 mins | Keynote Address | Bridging the Gap: The Role of Professional Standards, Certification, and Collaboration in Building Malaysia’s Cyber Defenders | Dr James Stanger – Chief Technology Evangelist at CompTIA Inc. |
| 9:40 – 10:20 am | 40 mins | Speaker 1 | Cybersecurity Act PDPA Act and Data Sharing Act | Hon Fun Ping – NetAssist |
| 10:20 – 11:00 am | 40 mins | Speaker 2 | Identity & Access Management: The Foundation of Digital Trust | Jason Lim –Cydentiq |
| 11:00 – 11:10 am | 10 mins | – | Morning Break | – |
| 11:10 – 12:10 pm | 60 mins | Panel Session 1 | Impact of Cybersecurity Act, PDPA and Data Sharing | Moderator Alan Yau Panelist 1 – Hon Fun Ping Panelist 2 – Lim Boon Hung |
| 12:10 – 12:50 pm | 40 mins | Speaker 3 | Integrating OpSec Principles into Modern Incident Response Practices | Azri Hafiz – Malaysia Cyber Security Community Organization (MCCO), FSI Regulator |
| 12:50 – 1:50 pm | 60 mins | – | Lunch | – |
| 1:50 – 2:30 pm | 40 mins | Speaker 4 | Unmasking the Truth: How OSINT Detects and Defends Against Deepfakes | Ahmad Fuad – VP Technology and Delivery, Vardaan |
| 2:30 – 3:10 pm | 40 mins | Speaker 5 | Evolving Cyberthreat Landscape | Haja Mo – President and CTO, Rocheston |
| 3:10 – 3:20 pm | 10 mins | – | Afternoon Break | – |
| 3:20 – 4:00 pm | 40 mins | Speaker 6 | Cybersecurity Audit | Robin Yong – ISC2 Malaysia Chapter BOD |
| 4:00 – 4:20 pm | 20 mins | Closing Remarks | Wrap Up | Alan Yau, Trainocate |
Featured Speakers
Meet the Experts

Ts. Alan Yau
Trainer, Trainocate
A cybersecurity and information security leader with over 20 years of experience, Ts. Alan Yau specializes in professional training and certification coaching across global standards including ISACA, ISC2, and PECB. As an accredited trainer for multiple internationally recognized certifications, he has successfully guided thousands of professionals across banking, government, energy, and telco sectors to strengthen their cyber resilience and achieve industry-recognized credentials.
Known for his ability to bridge theory with practice, Alan brings a blended learning approach that integrates frameworks, tools, case studies, and simulation labs—creating an engaging and practical learning experience. With an impressive track record of 90%+ first-time certification pass rates, his mission is to empower individuals and organizations with the knowledge and skills needed to excel in today’s evolving cybersecurity landscape.

Dr. James Stanger
Chief Technology Evangelist, CompTIA
With over 20 years of experience in IT security, open source, and network administration. He has worked with clients including the British Army, Northrop Grumman, IBM, Oracle, and the US State Department.
A well respected authority in security, networking, and open source and his areas of expertise include security analytics, penetration testing, and blockchain. He is currently the Chief Technology Evangelist at CompTIA.

Jason Lim
Founder and CEO, Cydentiq
Jason Lim is the Founder & CEO of Cydentiq. Having more than 15 years of expertise in the information technology industry and identity security domain, Jason is an all-round entrepreneur across different dimensions such as technology, strategic consulting, client engagement, leadership, service delivery & business development. For more than a decade, Jason has been providing extensive Identity & Access Management (IAM) and Privileged Access Management (PAM) advisory services to help organizations shaping the identity-first initiatives. With his great passion in identity security domain, Jason has successfully developed Identity Security framework that helps organizations in building strategic IAM roadmap.
Jason is an active conference speaker and had been invited by known organizers such as EC-Council, ISACA Malaysia Chapter & Malaysia Institute of Accountants (MIA), and universities to speak in the cybersecurity & technology conferences. Apart from that, Jason was also interviewed and featured by CISOMag.

Azri Hafiz
Malaysia Cyber Security Community Organization
With over 14 years of dedicated experience in cyber security, Azri Hafiz is currently commandeering the Security Operation Center of FSI, his responsibilities include leading the incident response activity of the cyber security incidents and delivering in-depth reports on global cyber security trends. Alongside his professional commitments, he co-founded rawSEC, a non-profit initiative aimed at cultivating a dynamic platform for local cyber security professionals to exchange insights and contribute to the wider community.
Passionate about sharing knowledge, Azri frequently delivers lectures and speaks at various events, offering his expertise to conferences and organizations as part of his commitment to make the internet safer for everyone. He is also active in organizing Capture the Flags competition to foster practical understanding of cybersecurity concepts and encourage collaboration and innovation among students.

Ts. Hon Fun Ping
Founder and CEO, NetAssist Group
Ts. Hon Fun Ping is a seasoned cybersecurity expert with 29+ years of experience and CEO of NetAssist, where he drives cutting-edge solutions to help organizations navigate today’s complex threat landscape. He holds a B.Sc. in Computer Science & Mathematics (Campbell University) and began his career at Extol before founding Innodium Sdn Bhd in 2000, later acquired by Extol Corporation Bhd in 2007. As General Manager of E-Cop Surveillance Sdn Bhd, he achieved triple-digit growth in profitability and revenue within three years.
Under his leadership, NetAssist recorded an annual growth rate of 35% until 2022, cementing its position as a trusted cybersecurity partner. Widely recognized as a thought leader, Hon Fun Ping is also an active speaker and advisor committed to building cyber resilience across Malaysia and the Asia Pacific region.

Robin Yong
ISC2 Malaysia Chapter BOD
Robin Yong With over 24 years of professional experience in Information Technology, Assurance, Cybersecurity, and Privacy, and currently serves as an IT and Cybersecurity Assurance practitioner at a leading national telecommunications company. He is actively involved in national initiatives and professional communities including PIKOM, IIA, ISC² Malaysia, ISACA Malaysia, DRII, and PECB. Robin plays key roles in advancing cybersecurity standards, notably as Vice Chair of MTFSB’s Working Group on Security, Technology, and Privacy, where he contributed to the publication of “Business Continuity Management – Requirements (First Revision) TC G014:2024.”
He is also a member of the MTFSB AI Task Force on AI Ethics, Transparency & Accountability. Within the professional community, Robin serves as Secretary of ISC² Malaysia Chapter (2025/2026 term), continuing from his previous tenure, while also contributing to PIKOM’s Government Affairs Committee and Cybersecurity Chapter. Recognized for his leadership and expertise, Robin is deeply committed to strengthening Malaysia’s cybersecurity ecosystem and fostering trust in digital transformation.

Ahmad Fuad
VP Technology and Delivery, Vardaan
Ahmad Fuad Kamarazaman is a seasoned Cybersecurity Practitioner with over 12 years of experience across financial services, healthcare, education, public sectors, and service providers. Fuad’s holistic approach integrates technology, process improvement, and education.
Beyond his professional role, he mentors aspiring professionals through a free cybersecurity career clinic, serves as an Industry Technical Advisor for Malaysian educational institutions, and blogs about open-source intelligence (OSINT) under the pseudonym “SyberSeeker,” contributing actively to the cybersecurity community.
Haja Mo
President and CTO, Rocheston
With over four decades in IT and software engineering, Haja Mohideen (Haja Mo) has set global benchmarks in cybersecurity, AI, and blockchain education. As President and CTO of Rocheston, he created the Rocheston Certified Cybersecurity Engineer (RCCE) — an ANSI ISO/IEC 17024-accredited and U.S. DoD 8140-approved program adopted by Fortune 500 companies and leading universities worldwide.
A pioneer who co-founded EC-Council and introduced the term “ethical hacking,” Haja continues to push boundaries through innovations like the Rocheston Certified AI Engineer (RCAI). An inventor, author, and creative visionary, he blends technology and imagination to redefine learning for the digital age — guided by his belief that “the future belongs to those who learn by doing.”

Lim Boon Hung
Director, Axcelasia
An accomplished IT security specialist with over 17 years of experience in cybersecurity advisory, quality assurance reviews, and risk management. He has a deep understanding of leading cybersecurity frameworks including ISO 27001, CIS, and NIST, as well as hands-on expertise with critical IT security products such as firewalls, endpoint detection and response (EDR), data loss prevention (DLP) systems, and more. He has worked extensively across various sectors including financial institutions, government-linked companies (GLCs), oil & gas, technology, and manufacturing.
His key experience includes providing advisory services for banks such as Maybank, Alliance Bank, and Hong Leong Bank, as well as consulting for fintech companies like Touch n Go, RazerPay, and Kiplepark on technology risk management and regulatory compliance. He is a seasoned expert in aligning IT security strategies with business objectives, managing risk, and ensuring compliance with regulatory requirements. His hands-on approach and strategic vision make him a trusted advisor for organizations seeking to strengthen their cybersecurity posture.

Farhana Farish
Facilitator
A creative and results-driven digital marketing professional with proven experience in crafting and executing integrated campaigns across cloud, AI, and cybersecurity verticals.
Known for a strategic, audience-first approach to content and brand storytelling—paired with hands-on execution across social media, email, and SEO.
Adept at managing multi-channel initiatives, building engagement, and driving lead generation through data-backed insights. Passionate about connecting professionals to impactful learning experiences.
Register For Free
Future-proof your cybersecurity strategy and career—don’t miss out.



