Search in

New Course: Cyber Security Risk Management

The cyber threat landscape is ever evolving and cyber security needs to be considered as a continuous effort to enable better protection, detection and mitigation of attacks. This course introduces participants (with no technical background) to the concepts and terminologies in cyber security. It also brings the participants up-to-date on the latest cyber threat landscape, and enables them to better understand and appreciate cyber security. The course also covers the recent attacks and threats, as well as explanation on each of their mechanics in layman’s term for the participants to acquire a deeper understanding and knowledge on what goes on under the hood. The participants will also learn cyber risk assessment and management so as to enable them to help their organisations be better prepared and more resilient against cyber threats and attacks.

Programme Benefits
This course introduces the concepts and terminologies in cyber security to participants with no technical background or prior knowledge of the field. It also brings the participants up-to-date on the latest cyber threat landscape, and enables them to better understand and appreciate cyber security. Participants are able to acquire a deeper understanding of the recent attacks’ mechanics in layman’s term to learn what goes on under the hood of these attacks, and also acquire knowledge on cyber risk assessment and management so as to enable them to help their organisations be better prepared and more resilient against cyber threats and attacks.

Click here for details.

New Course: Strategies in IT Service Management Implementation

This two-day course enables participants to gain a quick appreciation of the fundamental concepts of IT Service Management based on the internationally recognised ITIL® (IT Infrastructure Library), and to learn how an organisation can effectively implement ITSM to improve IT to Business alignment and Service Quality.

The participants will appreciate the evolution of ITIL® and understand the full lifecycle of IT Service Management from Service Strategy to Design, Transition, Operation through to Continual Service Improvement. The inter-relationships of processes to services will be explained. Implementation approaches will be explored at both a strategic and tactical level. Pitfalls will be discussed as well as Service Management tools and techniques.

Click here for details.

New Course: Modern Cyber Security Technologies for Senior Managers

This course updates senior cyber security professionals in an urgent and compact manner on all key cyber security developments, e.g. how the landscape has changed very quickly and which would be the best solution to attack the many “hot” and pressing problems that the organisation is now facing. By making sense of new trends and attack incidents that often appear confusing, it creates Eureka moments to resolve conflicting requirements with urgent deadlines via a methodology that makes the complex easy to understand. More importantly, it explains how the implementation strategy could be quickly internalised, communicated and then converted into fast action. Its powerful narrations will highlight the new types of cyber security opportunities, exposing many such well kept secrets. Interestingly, many are with almost no cost. A key take-away will be its comprehensive coverage of all strategic transformations in the cyber security industry today, e.g. the need for automation, non-signature defences, the rise of cloud security and Docker containers, big data security, mobile security, new cryptography and new hardware like Intel’s security instruction sets and GPUs.

Programme Benefits
The course addresses continual learning and the shortfall in knowledge and experience regarding latest developments, as many busy executives have been struggling to keep up with new solutions and the high complexity of today’s digital revolution. Critically, it provides key insights and advice for practical and much needed problem solving, which will build up confidence for decision making. This will  protect the organisation from the menace of organised cyber crime and advanced state attackers, avoiding massive losses or even company closure when successfully attacked (no longer if, but just when). By providing guidance on the latest or pending future products, a large part of the cyber security expenditure will be saved or the money will be better spent. In addition, it helps the student to communicate the urgency required, not only when in crisis but also in everyday planning.

Click here for details.


Professor Alex Siow receiving award for outstanding leadership as the first President of the PMI Chapter from 2001 to 2012

Professor Alex Siow of the School of Computing, NUS, receiving an award from the Secretary-General of the NTUC and Minister in the Prime Minister's Office, Mr Chan Chun Sing, on the 10 Mar 2016 during the Regional Symposium of the PMI Singapore Chapter, for outstanding leadership as the first President of the PMI Chapter from 2001 to 2012.

Workshop: Embracing Big Data Applications – Transform or Become Obsolete! (29 April 2016)


What is the World’s largest hotel chain? Not Starwood or Hilton, but Airbnb, and they don’t even own any hotels. What is the world’s largest taxi company? It’s Uber, and they don’t own any taxis. What is the world’s largest phone company? Not Vodafone or China Mobile. It is WhatsApp and WeChat, and they don’t even own any telecommunication infrastructure.

The question for you is: What opportunities do my company have in this new wave of new technologies revolution? What are the threats? How can I still stay relevant?

Our lives are going through rapid changes in this digital age. Driverless cars, drone deliveries, e-Doctors and robotic housekeepers are just some of the more popular innovations. They no longer remain just in the imagination of creative writers. At the same time, the new technology data-rich companies such as Google, Facebook and Amazon continue to dominate the world, outperforming almost all traditional giants in the stock markets. Concurrently, brand names such as Kodak and Borders are rendered obsolete and are no longer in business.

Many senior leaders of traditional companies are under intense pressure to change. However, they are struggling with both the direction and strategies. The technologies, business models, operations, as well as the go-to market strategies are no longer the same as what they had used to leverage and achieve success in the past.

We want to set you thinking in this 1-day workshop. We want to guide you on developing innovative ideas and strategies for your business that will keep you moving in this digital age.  


The workshop will cover the driving forces of the rapid changes in the digital age, especially on Big Data, mobility, and the Internet of Things (IOT). We will also cover the impacts of technologies on our lives and the traditional industries arising from these driving forces, address the risk of becoming irrelevant if unable to change and keep up, as well as the strategies and opportunities that can be used as anchorage for such transformation.

Upon completion of this workshop, participants will acquire the knowledge of today’s fast-changing environment, the skills needed to assess the impact of the new environment to their own businesses and to develop their transformation plans to capitalize on this massive change in the world.

Program Topics:

  • Module 1: Our Changing Lives and industries
  • Module 2: A Big Picture: Technologies and Trends Impacting Our Lives and the industries
  • Module 3: Harnessing Big Data – Big Data Applications
  • Module 4: Transforming a Traditional Business
  • Module 5: Capturing Opportunities in Big Data Revolution

Click here for details