WEBINAR: Securing Organisational Digitalisation Efforts While Effectively Managing and Safeguarding Calibration Data

29 May 2025
5.30-6.30pm SGT | Online

Abstract:
Digitalisation is an ongoing effort to provide organisations with opportunities and improvements. However, it can introduce significant security risks and operational challenges if not executed correctly.

With the rapid rise of machine learning and generative AI, the reliance on data, particularly organisational, industrial and calibration data, has never been greater. Ensuring its integrity, security, and usability is crucial to maintaining operational reliability and compliance.

This webinar will delve into the core principles of cyber and information security within the context of organisational digitalisation. We will explore strategies for safeguarding calibration data, ensuring it is leveraged to its full potential, securely, ethically, and effectively.

Led by:
Samuel GranvikSamuel Granvik, Software Designer, Product Development, Beamex | Security & Privacy Expert

Samuel Granvik is an experienced software designer at Beamex with a strong background in software security, privacy, and assurance. With years of hands-on experience in developing secure, large-scale software systems, he specializes in analyzing and enhancing security frameworks for mission-critical environments that handle sensitive data.

His expertise is backed by his extensive research in software security and assurance, where he has worked on strengthening security practices in real-world, complex organizations. Through his work, he has contributed to developing more resilient security strategies for companies operating in highly regulated industries.

Throughout his career, Samuel has played key roles in designing and implementing secure microservices architectures, large distributed systems, and AI-driven solutions. His deep technical understanding, combined with his commitment to security awareness and advocacy, makes him a sought-after expert in software security and privacy best practices.

Hosted by:

MG2

Register Now