Elevate your AWS security. Catapult your growth.
Elevate your AWS security. Catapult your growth.
Welcome to REA&H. Combining the expertise of Asia Pacific’s cloud security leaders, AWS and Horangi will come together this November to announce a brand new solution to accelerate your innovation in the cloud and defend against cyber threats. Join the world’s largest Financial Institutions, government agencies, and tech firms and get inspired at the REA&H launch event.
Learn about intelligent cloud threat detection, scalable compliance automation, and proven cybersecurity strategies. Experience how industry leaders are optimizing the cloud today to grow and transform the future.
REA&H: What Is It?
REA&H (Resilience and Excellence with AWS & Horangi; pronounced as ‘reach’), is the first joint security solution by Amazon Web Services (AWS) "Professional Services" and Horangi. Combining best-in-class security tools such as Horangi Warden with professional services, REA&H enables organizations to optimize their security in the cloud. Design, build, and operate your AWS environments, applications, workloads, and processes based on AWS Security Best Practices to meet regulatory requirements and business needs more easily.
Who should attend?
Who should attend?
Are you an AWS customer or partner that needs to develop compliance programs to financial regulations including MAS TRM, OJK, HKMA, BNM-RMiT, and APRA? Learn how to leverage the right expertise and solutions to accelerate your innovation.
- CISOs
- CTOs
- CIOs
- Heads of Business Development
- Heads of InfoSec
- Heads of Product
- Heads of IT
- Heads of Technology
- Heads of Engineering
- Solution Architects
- Compliance Officers
- Data Officers
Hear from the people helping organizations with transformative cloud security
Hear from the people helping organizations with transformative cloud security
With more speakers to be announced!
Paul Hadjy
CEO & Co-Founder, Horangi
Technology visionary and leader passionate about creating cutting edge cybersecurity solutions so users from the C-suite down to technical operators are all armed with the right, actionable data to make critical cyber decisions.
Paul Hadjy
CEO & Co-Founder, Horangi
Technology visionary and leader passionate about creating cutting edge cybersecurity solutions so users from the C-suite down to technical operators are all armed with the right, actionable data to make critical cyber decisions.
Mark Fuentes
Director of Cyber Operations, Horangi
16+ years of experience in the cybersecurity field, specializing in cyber strategy, GRC, SIEM development, and blue team operations. Avid consumer of technology trends and threat intelligence.
Mark Fuentes
Director of Cyber Operations, Horangi
16+ years of experience in the cybersecurity field, specializing in cyber strategy, GRC, SIEM development, and blue team operations. Avid consumer of technology trends and threat intelligence.
Alankar Bhatnagar
Senior Consultant – Security, Risk & Compliance
With over 15 years of experience in Information & Cyber Security, Alankar has worked with Financial services and Energy organisations, helping them to improve their compliance and security requirements on Cloud and on-Premise a environments.
Alankar Bhatnagar
Senior Consultant – Security, Risk & Compliance
With over 15 years of experience in Information & Cyber Security, Alankar has worked with Financial services and Energy organisations, helping them to improve their compliance and security requirements on Cloud and on-Premise a environments.
Ivy Young
Head of Security, Professional Services ASEAN, AWS
Ivy takes multi-disciplinary approaches for helping customers integrate security and privacy into how they build, deploy and operate with minimum friction, while delivering measurable business outcome.
Ivy Young
Head of Security, Professional Services ASEAN, AWS
Ivy takes multi-disciplinary approaches for helping customers integrate security and privacy into how they build, deploy and operate with minimum friction, while delivering measurable business outcome.
Nugroho Adji
Security Consultant, Professional Services Indonesia, AWS
Nugroho has experience both as a security practitioner and consultant. He is a cyber security professional with experience in security management, security technology design, deployment and operations mainly within the financial services industry.
Nugroho Adji
Security Consultant, Professional Services Indonesia, AWS
Nugroho has experience both as a security practitioner and consultant. He is a cyber security professional with experience in security management, security technology design, deployment and operations mainly within the financial services industry.
Stanley Chan
Head of APAC Technology Partnerships, AWS
Software and tech APAC leader, over 20 years of experience at high-tech companies and startups. Deep expertise in cloud, mobile, and internet infrastructure tech.
Stanley Chan
Head of APAC Technology Partnerships, AWS
Software and tech APAC leader, over 20 years of experience at high-tech companies and startups. Deep expertise in cloud, mobile, and internet infrastructure tech.
Linda Nguyen Schindler
Programme Head, ICE71
As the programme head of ICE71 ("Innovation Cybersecurity Ecosystem at BLOCK71") in Singapore, Linda helps to strengthen Singapore’s growing cybersecurity ecosystem by attracting and developing competencies and deep technologies. Linda is passionate about teaching entrepreneurial skills to students in Singapore to inspire and prepare today’s youth to succeed in the global economy.
Linda Nguyen Schindler
Programme Head, ICE71
As the programme head of ICE71 ("Innovation Cybersecurity Ecosystem at BLOCK71") in Singapore, Linda helps to strengthen Singapore’s growing cybersecurity ecosystem by attracting and developing competencies and deep technologies. Linda is passionate about teaching entrepreneurial skills to students in Singapore to inspire and prepare today’s youth to succeed in the global economy.
Register to book your seat alongside other IT and security delegates at the event.
Register to book your seat alongside other IT and security delegates at the event.
Two hours of hyper-focused sessions to take advantage of this new offering and apply it to your company's secure innovation.