Director, TrendLabs , Trend MicroRecent news and events give the impression that the world is spinning out of control. The same thing can be said when it comes to technology and cybersecurity. Big data, cloud computing, and developments in mobile and Internet of Things, among others, are also met with unprecedented threats and risks from enterprising cybercriminals and threat actors. Data breaches and online extortion have become the new norm in the threat landscape. This leaves organizations at a constant state of prioritizing the right talent and infrastructure to protect their networks, managing and empowering employees into having a security-savvy mindset, and keeping an eye out on cyber-attacks. This thematic keynote presentation will provide insights on current organizational challenges when it comes to information security and risk management. It will also provide recommendations on how organizations can work past chaotic situations, and it begins by empowering the supposed weakest links—the humans. What better way to empower people than turning them into your best defenders.
Supervisory Special Agent, Cyber Taskforce FBIThe cybercrime threat is evolving rapidly and every organization regardless of the industry,sector or business vertical will be affected. The goal of the presentation will be to provide the audience with a high level understanding of the current cybercrime threat and attempt to put it into perspective.
This presentation will cover such topics as: The roles of government agencies responsible for cybercrime investigations and intelligence collection; International cooperation on cyber crime; The cybercrime threat spectrum differentiating between cyber criminals, nation state actors/threats and insider threats; The intended targeted organizations by cyber threat actors; and recommendations to reduce vulnerability to the cyber threats.
Legislative Councillor (Information Technology)
Hong Kong Legislative CouncilA “reality check” on cybersecurity, including the real-world impact of cyberattacks (financial loss, reputation damage, physical harm), which cybersecurity predictions have come true in the past 6 months.
Cyber Security and Technology Crime Bureau
Hong Kong Police
Today we are seeing more sophisticated cyber attacks launched by cybercriminals targeting various businesses and individuals for financial gains. Dicky Wong from the Cyber Security and Technology Crime Bureau of Hong Kong Police Force will bring an update of the latest cyber threat situation in Hong Kong and how organisations or individuals could protect themselves from the latest threats such as ransomware.
Professional Information Security Association
The most asked question of cloud computing potential user is “how secure the cloud is? Or is there any standard on Cloud Security? ” In the session, the current standard on Cloud Security and “how to be certified in Cloud Security?” will be covered.
Moderator: Dale JohnstoneThe increasingly personal impact of cyberattacks and cybercrime are just some of the factors organizations need to manage in order to defend their greatest assets: their data. But are businesses really ready to face these challenges? Do they have a clear understanding of the current realities of the security landscape? Do they have the people, the processes and policies, and the tools and knowledge to take control? In this panel discussion, we zero in on real-world factors that drive the numbers game in terms of what causes the most losses and how to prevent them, what contributes to the success of cyber security, and what is the cost of good security versus a poor one.
Senior Systems Engineer, NSX SE COE
VMware Greater China
Attend this session to learn how VMware NSX can transform your data center operational model and economics. You will discover the business benefits of network virtualization including enabling security in the software-defined data center, and increasing speed and agility of service delivery. Don’t miss the opportunity to hear about the various use cases and IT outcomes of VMware NSX.
3 secrets have been learned from countless cloud pioneers around the world. This session will show you how to become a Cloud Security Superhero by improving your strength, speed and intelligence for securing your cloud workloads. To do this, Laura Huang will share you 3 important cloud superpowers.
Stree G. Naidu
Vice President, Asia Pacific & Japan
Your networking and security infrastructure is built on top of hardware appliances and connected over Internet or MPLS links. This architecture is costly to own and complex to maintain. Connectivity charges, appliances purchases and upgrades, software updates and vulnerability patching… the list is long and the management overhead is significant. At the same time, the increased use of Cloud resources and mobile devices make networking and security even more challenging.
Vice Chairman – Membership and External Affairs
Cloud Security Alliance Hong Kong & Macau Chapter
Since many years ago, Cloud Adaptation has become a hot topic among senior management of companies who want to take cloud computing’s advantage but do not putting the business operation at risk. As a matter of fact, many cloud adaptation pioneers cultivate their best practice learnt from experience. However not all of these companies have sufficiency expertise and resource to achieve the same result and most of them was deferred by security and cost-effectiveness uncertainty.
Recently, more companies are willing to invest resource setting up cloud infrastructure or platform POC for deploying their business operation on cloud, because the cloud computing technologies have become more sophisticated, at the same time, there are more well-trained cloud practitioners and more successful cloud adaptation cases in the industry.
In this sharing, we will explore “What is major driving factors for a company to move on cloud computing? How do we make an easier migration approach on the road to Cloud Adaptation V2.0? How can we fine-tuned our plan to make a more effective cloud adaptation? Any concern you may have before you make your move i.e. Privacy? We will try to share our observation from the market, we call this age a “Cloud Adaptation V2.0 age”
A review on a typical Cloud security infrastructure with these areas analysed:
Security issues – is it the same as on-premises or even worst ?
Impact analysis – how to quantify and contain the security risk ?
Comparison of different Cloud Security Standards. CSA, EU, ISO ?
What minimum measures and precautions need to be consider as cloud users ?
Senior security Architect, HPE Security
Hewlett Packard Enterprise
A Big Data security analytics solution giving enterprises visibility into their users, network, data, and applications. Learn from HPE Security expert on how ArcSight Analytics makes it much easier to gain information and anticipate, recognize, and mitigate threats.
Regional Director, Asia Pacific
SSH Communications Security
While secure and encrypted connections in the cloud are an absolute necessity, they pose potential problems. The encryption that provides security to connections can also blind network security measures and thus mask malicious activity. Here are some common unaddressed issues:
• How can cloud users ensure the encrypted data on third-party servers is safe?
• How can cloud service providers control and audit interactive and automated encrypted traffic to, from and within the cloud, without affecting user experience and the automated process?
• How new machine learning and mathematics are automating advanced cyber defense
• Why 100% network visibility allows you to detect threats as they happen, or before they happen
• How smart prioritization and visualization of threats allows for better resource allocation and lower risk
• Real-world examples of unknown threats detected by ‘immune system’ technology
Aruba, a Hewlett Packard Enterprise company
Today’s #GenMobile workforce has completely diluted the notion of a fixed perimeter – it doesn’t exist where users connect and work from anywhere. To protect the enterprise and its resources, IT must consider security that starts from the inside out.
The Aruba ClearPass Policy Management Platform allows IT to adapt and apply trust levels based on every user and device that requests wireless, wired or VPN access. To do this, ClearPass leverages real-time, contextual data that IT can trust – a person’s role inside an organization, device and app attributes, location and insight from third party security solutions – to create policies that satisfy highly mobile security needs. We call this approach Adaptive Trust.
Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging. Join this session to understand more about this threat and learn best practices to protect your business and combat ransomware!“coming soon”