Loading Events

Agenda

  • +Take Control – Empower the People

    Myla Pilao
    Director, TrendLabs , Trend Micro

    Recent news and events give the impression that the world is spinning out of control. The same thing can be said when it comes to technology and cybersecurity. Big data, cloud computing, and developments in mobile and Internet of Things, among others, are also met with unprecedented threats and risks from enterprising cybercriminals and threat actors. Data breaches and online extortion have become the new norm in the threat landscape. This leaves organizations at a constant state of prioritizing the right talent and infrastructure to protect their networks, managing and empowering employees into having a security-savvy mindset, and keeping an eye out on cyber-attacks. This thematic keynote presentation will provide insights on current organizational challenges when it comes to information security and risk management. It will also provide recommendations on how organizations can work past chaotic situations, and it begins by empowering the supposed weakest links—the humans. What better way to empower people than turning them into your best defenders.
  • +Quantifying the threat: A perspective on the status and evolution of global cybercrime

    Timothy Wallach
    Supervisory Special Agent, Cyber Taskforce FBI

    The cybercrime threat is evolving rapidly and every organization regardless of the industry,sector or business vertical will be affected. The goal of the presentation will be to provide the audience with a high level understanding of the current cybercrime threat and attempt to put it into perspective.
    This presentation will cover such topics as: The roles of government agencies responsible for cybercrime investigations and intelligence collection; International cooperation on cyber crime; The cybercrime threat spectrum differentiating between cyber criminals, nation state actors/threats and insider threats; The intended targeted organizations by cyber threat actors; and recommendations to reduce vulnerability to the cyber threats.
  • +The reality of cybersecurity threats

    Charles Mok
    Legislative Councillor (Information Technology)
    Hong Kong Legislative Council

    A “reality check” on cybersecurity, including the real-world impact of cyberattacks (financial loss, reputation damage, physical harm), which cybersecurity predictions have come true in the past 6 months.
  • +An update on Cyberthreats

    Dicky Wong
    Detective Inspector
    Cyber Security and Technology Crime Bureau
    Hong Kong Police

    Today we are seeing more sophisticated cyber attacks launched by cybercriminals targeting various businesses and individuals for financial gains. Dicky Wong from the Cyber Security and Technology Crime Bureau of Hong Kong Police Force will bring an update of the latest cyber threat situation in Hong Kong and how organisations or individuals could protect themselves from the latest threats such as ransomware.
  • +Professional Development in Cloud Security

    Frankie Leung
    Program Director
    Professional Information Security Association

    The most asked question of cloud computing potential user is “how secure the cloud is? Or is there any standard on Cloud Security? ” In the session, the current standard on Cloud Security and “how to be certified in Cloud Security?” will be covered.
  • +Panel Discussion
    Reality Check: Do We Have What It Takes To Take Control?

    Moderator: Dale Johnstone

    The increasingly personal impact of cyberattacks and cybercrime are just some of the factors organizations need to manage in order to defend their greatest assets: their data. But are businesses really ready to face these challenges? Do they have a clear understanding of the current realities of the security landscape? Do they have the people, the processes and policies, and the tools and knowledge to take control? In this panel discussion, we zero in on real-world factors that drive the numbers game in terms of what causes the most losses and how to prevent them, what contributes to the success of cyber security, and what is the cost of good security versus a poor one.

    • +Building a Secure and Agile Software-Defined Data Center with VMware NSX

      Tim Wu
      Senior Systems Engineer, NSX SE COE
      VMware Greater China

      Attend this session to learn how VMware NSX can transform your data center operational model and economics. You will discover the business benefits of network virtualization including enabling security in the software-defined data center, and increasing speed and agility of service delivery. Don’t miss the opportunity to hear about the various use cases and IT outcomes of VMware NSX.


      +3 Secrets to becoming a Cloud Security Superhero

      Tony Lee
      Consultant
      Trend Micro

      3 secrets have been learned from countless cloud pioneers around the world. This session will show you how to become a Cloud Security Superhero by improving your strength, speed and intelligence for securing your cloud workloads. To do this, Laura Huang will share you 3 important cloud superpowers.



      +The Case for Taking Networking and Security to the Cloud

      Stree G. Naidu
      Vice President, Asia Pacific & Japan
      Cato Networks

      Your networking and security infrastructure is built on top of hardware appliances and connected over Internet or MPLS links. This architecture is costly to own and complex to maintain. Connectivity charges, appliances purchases and upgrades, software updates and vulnerability patching… the list is long and the management overhead is significant. At the same time, the increased use of Cloud resources and mobile devices make networking and security even more challenging.


      +Get Prepared for Cloud Adaptation v2.0

      Mike Lo
      Vice Chairman – Membership and External Affairs
      Cloud Security Alliance Hong Kong & Macau Chapter

      Since many years ago, Cloud Adaptation has become a hot topic among senior management of companies who want to take cloud computing’s advantage but do not putting the business operation at risk. As a matter of fact, many cloud adaptation pioneers cultivate their best practice learnt from experience. However not all of these companies have sufficiency expertise and resource to achieve the same result and most of them was deferred by security and cost-effectiveness uncertainty.

      Recently, more companies are willing to invest resource setting up cloud infrastructure or platform POC for deploying their business operation on cloud, because the cloud computing technologies have become more sophisticated, at the same time, there are more well-trained cloud practitioners and more successful cloud adaptation cases in the industry.

      In this sharing, we will explore “What is major driving factors for a company to move on cloud computing? How do we make an easier migration approach on the road to Cloud Adaptation V2.0? How can we fine-tuned our plan to make a more effective cloud adaptation? Any concern you may have before you make your move i.e. Privacy? We will try to share our observation from the market, we call this age a “Cloud Adaptation V2.0 age”


      +Cloud is Hot and Easy to Adopt, But does it secure?

      Roger Chung
      Managing Director
      Maximus Consulting

      A review on a typical Cloud security infrastructure with these areas analysed:
      Security issues – is it the same as on-premises or even worst ?
      Impact analysis – how to quantify and contain the security risk ?
      Comparison of different Cloud Security Standards. CSA, EU, ISO ?
      What minimum measures and precautions need to be consider as cloud users ?

    • +Finding Known and Unknown Threats by Big Data Security Analytics

      Ricky Mok
      Senior security Architect, HPE Security
      Hewlett Packard Enterprise

      A Big Data security analytics solution giving enterprises visibility into their users, network, data, and applications. Learn from HPE Security expert on how ArcSight Analytics makes it much easier to gain information and anticipate, recognize, and mitigate threats.


      +The Evolution of Trusted Access for Cloud

      Ricky Ho
      Regional Director, Asia Pacific
      SSH Communications Security

      While secure and encrypted connections in the cloud are an absolute necessity, they pose potential problems. The encryption that provides security to connections can also blind network security measures and thus mask malicious activity. Here are some common unaddressed issues:
      • How can cloud users ensure the encrypted data on third-party servers is safe?
      • How can cloud service providers control and audit interactive and automated encrypted traffic to, from and within the cloud, without affecting user experience and the automated process?



      +The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

      Stanley Hsu
      Regional Director
      Darktrace

      • How new machine learning and mathematics are automating advanced cyber defense
      • Why 100% network visibility allows you to detect threats as they happen, or before they happen
      • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
      • Real-world examples of unknown threats detected by ‘immune system’ technology


      +Adaptive Trust for Enterprise

      Vincent Chow
      Solution Architect
      Aruba, a Hewlett Packard Enterprise company

      Today’s #GenMobile workforce has completely diluted the notion of a fixed perimeter – it doesn’t exist where users connect and work from anywhere. To protect the enterprise and its resources, IT must consider security that starts from the inside out.

      The Aruba ClearPass Policy Management Platform allows IT to adapt and apply trust levels based on every user and device that requests wireless, wired or VPN access. To do this, ClearPass leverages real-time, contextual data that IT can trust – a person’s role inside an organization, device and app attributes, location and insight from third party security solutions – to create policies that satisfy highly mobile security needs. We call this approach Adaptive Trust.


      +Say NO to Ransomware

      Tony Lee
      Consultant
      Trend Micro

      Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging. Join this session to understand more about this threat and learn best practices to protect your business and combat ransomware!

  • +Lucky Draw / Close

    “coming soon”

Speakers

Charles Mok

Legislative Councillor (Information Technology)
Hong Kong Legislative Council

Dale Johnstone

Vice-Convenor
ISO/IEC JTC 1 SC 27 WG 1

Dicky Wong

Detective Inspector, Cyber Security Division, Collaboration Team 3, Cyber Security and Technology Crime Bureau
Hong Kong Police Force

Frankie Leung

Program Director
Professional Information Security Association

Mike Lo

Vice Chairman – Membership and External Affairs
Cloud Security Alliance Hong Kong & Macau Chapter

Myla Pilao

Director of TrendLabs Research
Trend Micro

Ricky Ho

Regional Director, APAC
SSH Communications Security

Ricky Mok

Senior Security Architect
HPE Security

Roger Chung

Managing Director
Maximus Consulting

Stanley Hsu

Country Manager, South Asia
Darktrace

STREE G. NAIDU

Vice President, Asia Pacific & Japan
Cato Networks

Tim Wu

Senior Systems Engineer, NSX SE COE, Greater China
VMware

Timothy Wallach

Supervisory Special Agent
FBI

Tony Lee

Head of Consulting
Trend Micro

Vincent Chow

Solution Architect
Aruba, a Hewlett Packard Enterprise company

Hosted By

Gold Sponsors

Silver Sponsors

Supporting Organizations