Architecting Cyber Resilience & Fraud Control Masterclass 2025

Overview

In an era where digital transformation accelerates at an unprecedented pace, organisations face increasingly sophisticated cyber threats and fraud schemes that continuously evolve and adapt. The convergence of advanced technologies, while driving innovation, has created complex vulnerability landscapes that demand a new approach to security leadership and risk management.

This executive masterclass, “Architecting Cyber Resilience & Fraud Control,” is designed to explore cutting-edge strategies that bridge the gap between conventional cybersecurity measures and the requirements of tomorrow’s threat landscape. From AI-powered attack vectors to sophisticated fraud schemes, we’ll examine how to build resilient security architectures that protect assets while enabling business growth.

“In a world where data is the new oil, cybersecurity is the frontier of opportunity and risk.” — Ginni Rometty, Former CEO of IBM

LIVE VIRTUAL TRAINING

24 - 25 JUNE 2025

08:00 AM - 16.30 PM UTC+8 (Singapore)

“The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency” 

- Bill Gates

Upon completion of this executive masterclass, participants will be able to:

  • Architect an integrated cybersecurity and fraud prevention strategy that aligns with organisational objectives, leveraging emerging technologies while effectively managing associated risks and ensuring regulatory compliance.
  • Design and implement adaptive defense frameworks incorporating AI, machine learning, and zero trust principles to protect against sophisticated cyber threats and evolving fraud schemes.
  • Lead organisational transformation in security practices by developing high-performing teams, fostering a culture of security awareness, and implementing effective governance structures.
  • Evaluate and enhance security architectures using advanced risk assessment methodologies, establishing metrics for program effectiveness, and creating comprehensive incident response strategies.
  • Build compelling business cases for security investments and effectively communicate security strategies to stakeholders, while establishing cross-functional partnerships that strengthen organisational resilience.

Why You Cannot Miss This Masterclass

Learn from renowned cybersecurity and fraud prevention specialists with extensive experience in government, financial, and corporate sectors. Their expertise will provide actionable strategies aligned with global security frameworks, ensuring a comprehensive approach to cyber resilience and stay ahead of how cybercriminals leveraging sophisticated tactics such as AI-driven attacks, ransomware, and deepfake fraud, staying informed is critical. This masterclass will equip you with the knowledge to analyze emerging threats, assess their business impact, and implement effective countermeasures.

From insider threats to digital payment fraud, financial crimes continue to pose significant risks to organizations. This course will introduce proactive fraud detection, prevention, and mitigation frameworks to protect your business from financial and reputational harm.

Expect interactive case studies, live cyberattack simulations, and real-world scenarios that allow you to apply acquired knowledge directly to your organization’s security strategy and engage with cybersecurity professionals, fraud analysts, and risk management leaders from diverse industries. This networking opportunity enables participants to exchange best practices, share insights, and build strategic alliances to strengthen their cybersecurity and fraud prevention efforts.

  • Gain Insights from Industry-Leading Experts
  • Stay Ahead of Evolving Cyber Threats and Fraud Techniques
  • Strengthen Cyber Resilience Strategies
  • Implement Advanced Fraud Prevention and Control Mechanisms
  • Engage in Practical, Hands-On Learning
  • Expand Your Professional Network
  • Ensure Compliance with Global Regulatory Standards
  • Gain a Competitive Edge in Cybersecurity Leadership

The rapidly evolving technological landscape demands that audit professionals stay ahead of the curve. This masterclass provides the essential knowledge and tools needed to:

  • Transform traditional audit approaches with AI capabilities
  • Enhance audit efficiency and effectiveness through automation
  • Develop forward-looking, data-driven audit strategies
  • Build confidence in evaluating AI systems and controls
  • Create value through AI-powered audit insights

Don’t miss this opportunity to position yourself and your audit function at the forefront of technological innovation. The future of internal audit is here – ensure you’re equipped to lead the transformation.

Agenda

Day One

24 JUNE 2025

Comprehensive Analysis of Modern Threats and Legal Advocacy

  • 0800

    Registration and Networking

  • 0830

    Ice breaker & brief introduction to the masterclass 

  • 0900

    Morning session commences

    Strategic Overview of Modern Cyber Threats and Fraud Techniques

    The evolving landscape of cyber threats and fraud presents unprecedented challenges for organisations globally. Modern threat actors employ sophisticated techniques that combine social engineering, advanced technology, and psychological manipulation to exploit vulnerabilities in both systems and human behavior.

    1.Advanced Persistent Threats (APTs) and Nation-State activities of global intelligence operations and critical infrastructure.
    2.Social engineering and digital fraud impersonation schemes: phishing techniques, deepfake manipulation, supply chain infiltration and business email compromise.
    3.Technology-enabled attack vectors: AI powered malware, IoT exploitation, cloud security breach, quantum computing and automation attacks.

    Case Study: Arup - $25 million Deepfake Scam

    Arup, a multinational professional services firm specializing in engineering and design, fell victim to a sophisticated deepfake scam. The Arup deepfake scam was a significant cybersecurity incident that highlighted the evolving sophistication of AI-powered fraud techniques.

  • 1030

    Morning break

  • 1100

    Morning session re-commences

    Early Anomaly Detection and AI-Driven Fraud Identification

    In an era where data drives decision-making, the ability to detect anomalies early is critical for minimising risks, optimising operations, and enhancing system resilience. Machine learning (ML) and artificial intelligence (AI) offer transformative capabilities to identify irregularities in data patterns, enabling organisations to respond proactively to potential issues before they escalate.

    This session explores the development and implementation of AI-powered frameworks for anomaly detection. Participants will learn how advanced algorithms, predictive analytics, and real-time monitoring systems can uncover hidden threats, streamline operations, and safeguard critical assets. From detecting cybersecurity breaches to preempting operational disruptions, the discussion will highlight practical applications, challenges, and best practices for leveraging AI and ML to drive actionable insights and maintain a competitive edge.

    1.Anomaly pattern recognition systems including machine learning algorithms for transaction monitoring, behavioral analytics and user profiling, neural networks for pattern detection and real-time alert generation.
    2.Predictive analytics for historical data analysis and fraud scenarios.
    3.Exploring ML algorithms and AI techniques for detecting deviations in data and addressing data quality, scalability, and false positive issues.

    Case Study: The Epsilon Financial AI Shield

    Epsilon Financial, a leading payment processing company handling over $3 billion in daily transactions, implemented a revolutionary AI-driven fraud detection system called "AI Shield" that fundamentally transformed their security posture and demonstrated the power of advanced anomaly detection.

  • 1230

    Lunch

  • 1330

    Breakout Session

    Peer Wisdom Exchange: Security Leadership Challenges
    Duration: 30 minutes

    Activity Overview:

    This peer-to-peer learning activity leverages the collective experience in the room by having participants share their approaches to common cybersecurity and fraud prevention leadership challenges. The structured exchange format ensures everyone contributes and benefits from the diverse perspectives present.

    Group Discussion (10 minutes)

    1.Each group discusses their assigned challenge scenario

    2.Together they identify 2-3 key strategies that have proven effective

    Challenge Scenarios:

    1.How do you secure executive buy-in for security investments when facing resistance?

    2.What techniques have you used to effectively communicate technical risks to non-technical stakeholders?

    3.How have you successfully integrated AI tools into your security operations?

    4.What approaches work best when building security awareness across different departments?

    5.How have you measured the effectiveness of your fraud prevention program?

    Presentation (20 minutes)

    1.One representative from each group will share their experiences, approaches, and lessons learned related to the challenge

  • 1430

    Afternoon break

  • 1500

    Evening session commences

    Cyber Governance and Risk Management Frameworks

    The relentless evolution of cyber threats is systematically challenging the integrity of critical infrastructure across the Asia-Pacific region. From smart cities in Singapore to advanced manufacturing in Japan, and from telecommunications networks in Australia to energy systems in China, the technological landscape faces unprecedented cybersecurity challenges.

    This session delves into the evolving landscape of cybersecurity policies and frameworks that promote robust solutions for developing cyber-resilient systems equipped to combat and respond to sophisticated frauds.

    1.How can regional initiatives, such as ASEAN cybersecurity frameworks, drive collective resilience?

    2.How are national cybersecurity centers and cross-border initiatives addressing evolving threats?

    3.What do new and upcoming regulations, such as the Singapore Cybersecurity Act, Australia's Critical Infrastructure Risk Management Program and NIST Cybersecurity Framework mean for businesses operating in critical sectors.

    Case Study: APAC Energy Consortium - Cross-Border Critical Infrastructure Resilience

    The APAC Energy Consortium (AEC), a collaborative network of energy providers spanning Singapore, Australia, Japan, and Malaysia, faced a critical turning point in late 2023 when a sophisticated threat actor exploited regulatory and governance gaps across jurisdictional boundaries, targeting their interconnected energy management systems.

  • 1630

    Masterclass concludes

Day Two

25 JUNE 2025

Advanced Fraud Prevention and Remedial Strategies

  • 0800

    Registration and Networking

  • 0830

    Ice breaker & brief introduction to the masterclass 

  • 0900

    Morning session commences

    Post-Incident Analysis and Practical Incident Response

    In an increasingly digital landscape, sophisticated fraud has evolved into a complex, multi-dimensional challenge that demands a comprehensive, adaptive approach. This framework provides a strategic methodology to prevent financial cyber threats.

    The session delve into how escalating sophistication of fraud demands an integrated, proactive approach that combines technological innovation, regulatory compliance, and human-centric defense mechanisms

    1.Continuous threat actor behavior analysis and evaluate the effectiveness of existing security controls.

    2. Develop specific action to address vulnerabilities and build multi-layered defense mechanisms.

    3.Integration of threat intelligence feeds like security information and event management (SIEM) systems and machine learning algorithms to detect and respond.

    4.Building resilience through adversary emulation and purple team exercises.

    Case Study: Hewlett Packard Enterprise(HPE) Cyberattack

    In December 2023, Hewlett Packard Enterprise (HPE) experienced a cyberattack attributed to the Russian hacker group Cozy Bear (Midnight Blizzard). This case highlights the importance of integrating threat intelligence feeds, such as Security Information and Event Management (SIEM) systems and machine learning algorithms, to detect and respond to threats promptly. Regular monitoring and immediate activation of incident response protocols are vital in minimizing the impact of such breaches.

  • 1030

    Morning break

  • 1100

    Morning session re-commences

    Continuous Improvement Strategies: Loss, Learn, and Maintain

    In today’s rapidly evolving digital landscape, organisations face an increasing risk of data breaches, operational disruptions, and regulatory challenges. "Loss, Learn, and Maintain" emphasises a proactive and continuous approach to security management, ensuring resilience in the face of cyber threats.

    This session delves into strategies that help organisations mitigate losses, learn from incidents, and maintain robust security systems. Participants will gain practical insights into implementing cutting-edge security controls, fostering compliance, and optimising their cybersecurity environments for long-term effectiveness.

    1.Implement comprehensive cloud security controls

    2.Develop granular access management protocols.

    3.Zero-trust security model implementation.

    4.Automated patch and configuration management.

    5.Quantum-resistant security technologies.

    6.Advanced cryptographic protection.

    Case Study: U.S. Treasury Department Hacked

    U.S Treasury Department experienced a significant security breach perpetrated by a China state-sponsored Advanced Persistent Threat (APT) group. The attackers exploited a compromised API key from BeyondTrust, a third-party remote management software provider, to infiltrate the Treasury's network.

  • 1230

    Lunch

  • 1330

    Breakout Session

    Peer Wisdom Exchange: Zero Trust Strategy Simulation

    Duration: 30 minutes

    Activity Overview:

    In this hands-on session, participants will work in teams to design and implement a Zero Trust security strategy for a multinational corporation facing sophisticated cyber threats. Teams will assess risks, prioritize security controls, and propose an implementation roadmap using Zero Trust principles.

    Case Scenario:

    Global Tech Enterprise, is a global organization with a hybrid cloud infrastructure, has noticed a surge in unauthorized login attempts from various global locations. Employees report unusual system slowdowns, and an internal audit reveals privileged accounts accessing sensitive data from unrecognized devices. Your team has been tasked with implementing a Zero Trust security model to prevent further compromise while maintaining operational efficiency.

    Learning Objectives:

    1.Understand and apply Zero Trust security principles in a real-world scenario.

    2.Identify key vulnerabilities and determine appropriate security controls.

    3.Balance security enforcement with business continuity considerations.

    4.Develop a strategic roadmap for Zero Trust adoption within an organization

  • 1430

    Afternoon break

  • 1500

    Evening session commences

    Resilient Cyber Landscape with Cryptographic

    The growing sophistication of cybercriminals has made fraud detection and prevention an essential priority for organisations. A comprehensive loss mitigation strategy combines advanced technologies and robust protocols to detect and contain fraud effectively.

    This session explores how to safeguard operations, ensuring data integrity, and enhancing resilience against emerging threats like quantum computing and cryptographic vulnerabilities.

    1.Implement AI-powered fraud detection systems.

    2.Rapid fraud containment.

    3.Comprehensive forensic analysis

    4.Advanced cryptographic protection.

    5.Quantum-resistant security technologies.

    Case Study: MediSecure Australia Data Breach

    MediSecure, a prominent electronic prescription service provider, suffered a significant ransomware attack. This resulted in the theft of personal and health information of approximately 12.9 million individuals and the compromised data included sensitive and personal information of them. This breach stands as one of the largest in Australian history.

  • 1630

    Masterclass concludes

Trainer

Dr Dennis Desmond

Former FBI & US Army Counterintelligence
School of Science, Technology and Engineering
University of the Sunshine Coast Australia

Dennis Desmond has spent the majority of his career in the counterintelligence discipline, first as a U.S. Army Special Agent, later as an FBI Special Agent, and finally, as a Special Agent with the Defense Intelligence Agency. Dennis is a veteran of Desert Shield, Desert Storm, Operation Iraqi Freedom IV, and V. As an FBI Special Agent, Dr. Desmond was assigned to the National Computer Crime Squad as a National Security Division detailee. Dennis specialised in international and state-sponsored cyber threats, especially those from Eastern Europe.

Dennis also worked closely with the various intelligence community members on national security-related cybercrime issues. As a Senior Intelligence Officer with the Defense Intelligence Agency, Dennis served as a HUMINT support officer focusing on identity Operations and Identity. Dennis earned several awards and recognition of his establishment and leadership of a specialised cyber unit at Fort Meade, Maryland for the US Department of Defense. Dennis’s last assignment was with the US Special Operations Command as the Chief Identity Scientist supporting Special Mission Unit operations.

Dennis was selected to attend Harvard’s John F. Kennedy School of Government as a National Security Fellow, attended the George C. Marshall School of Government in Garmisch, GE as a Senior Fellow, and has attended a variety of specialised law enforcement and intelligence training courses throughout the world. Dennis has also been an instructor for various U.S. Government agencies specialising in signature reduction, identity operations, and other intelligence related topics.

Dr Dennis Desmond’s specialist areas of knowledge include cryptocurrency money laundering, darknet marketplace activities and interventions, national security and espionage, cybersecurity, cyber intelligence, and blockchain technologies.

Dr Dennis Desmond’s:

1. Research areas

  • darknet marketplace interventions
  • cryptocurrency laundering (cryptolaundering)

2. Teaching areas

  • Cyberintelligence
  • Cryptography
  • Blockchain and Cybersecurity
  • Darknet Investigations and Exploitation

3. Professional memberships and affiliations

  • Human Factors and Ergonomics Society of Australia (HFESA)

4. Awards/Fellowships

  • ARC Linkage Grant – Scholarship, University of the Sunshine Coast (PhD) (2017)
  • National Security Fellowship, John F. Kennedy School of Government, Harvard University (2013)
  • Fellowship, George C. Marshall School for Democratic Studies (1994)
  • Scholarship, Indiana University, Russian and East European Institute (1992)

Course Outcome

We deliver excellence through our distinctive learning methodology:

We deliver excellence through our distinctive learning methodology:

  • Industry-aligned training that tackles real-world challenges and market dynamics
  • Bespoke learning journeys crafted from participant pre-course insights
  • In-depth educational resources designed for practical application

Pre-course Questionnaire: 
To ensure maximum benefit from this event, a detailed questionnaire will be sent to the delegates to establish their training needs. Our expert trainer will carefully analyse their responses to ensure the content is pitched appropriately and addresses your specific requirements. The course delivery will be tailored to incorporate the key issues identified through this assessment process. Additionally, you will receive detailed course materials that will serve as a valuable reference for continued learning and implementation after the program.

 

Strategic Masterclass Attendees:

Executive Leadership

  • Chief Information Security Officers (CISOs)
  • Chief Information Officers (CIOs)
  • Chief Technology Officers (CTOs)
  • Chief Risk Officers (CROs)
  • Chief Compliance Officers (CCOs)
  • Chief Financial Officers (CFOs)
  • Chief Executive Officers (CEOs)

Security Leadership

  • VP/Director of Information Security
  • VP/Director of Cybersecurity Operations
  • Security Architecture Leaders
  • Threat Intelligence Directors
  • Incident Response Team Leaders
  • Security Governance Managers

Fraud Prevention Leadership

  • Fraud Operations Directors
  • Financial Crime Prevention Managers
  • Anti-Money Laundering (AML) Specialists
  • Transaction Monitoring Leaders
  • Fraud Analytics Managers
  • Digital Fraud Prevention Specialists

Technology & Operations Leaders

  • Cloud Security Architects
  • Security Engineering Managers
  • IT Infrastructure Managers
  • DevSecOps Leaders
  • AI/ML Security Specialists
  • Identity & Access Management Leaders

Risk & Compliance Professionals

  • IT Audit Managers
  • Governance & Risk Management Directors
  • Regulatory Compliance Specialists
  • Security Control Assessors
  • Privacy Officers
  • Data Protection Leaders

Industry-Specific Leaders

  • Financial Services Security Leaders
  • Healthcare Information Security Directors
  • Critical Infrastructure Protection Managers
  • Government Cybersecurity Directors
  • Telecommunications Security Leaders
  • Energy Sector Security Managers

This masterclass is particularly valuable for industries handling sensitive data, managing critical infrastructure, processing financial transactions, or facing heightened regulatory scrutiny around cybersecurity and fraud prevention.

Industries needed to attend, but not limited to the list below:

  • · Industries for Cybersecurity & Fraud Control Masterclass
  • · Financial Services
  • · Healthcare & Pharmaceuticals
  • · Government & Public Sector
  • Energy providers (oil, gas, electricity)

  • Telecommunications providers

  • Logistics & Supply Chain
  • Technology

  • Manufacturing

  • Telecommunications & Media

  • Transportation & Logistics
  • Professional Services

Business Development Opportunities:

Does your company have services, solutions or technologies that the conference delegates would benefit from knowing about? If so, you can find out more about the exhibiting, networking and branding opportunities available by contacting: For in-house training enquiries, contact: qurat@hc-learning.com.

Secure Your Participation Today

Cyber threats and fraud risks are escalating rapidly—delaying action is not an option. This masterclass offers an unparalleled opportunity to advance your skills, reinforce your organization’s defenses, and future-proof your cybersecurity strategy.

Contact

Reach us to know more

Please let us know if you have a question, want to leave a comment, or would like further information about HC-Learning.

client inquiries

  • Monday–Saturday: 10:00AM–6:00PM
    Sunday: CLOSED

Inquiry Form

HCL contact form