Loading Events

Hong Kong
Thursday, August 3, 2017
Hong Kong Convention Exhibition Center, Wanchai, Hong Kong

CLOUDSEC Hong Kong 2017


Enterprises and organizations are facing next-tier, multifaceted threats that are both familiar and uncharted. As the cloud and the Internet of Things (IoT) ecosystem become more interconnected, it is essential for organizations to reevaluate and redefine their understanding of threats, risks, and solutions in an ever-changing landscape.
With that, organizations and enterprises must ask: what threats should they prepare for? What risks are involved? What processes and procedures should be implemented? In the face of next-tier threats, businesses must step up their game and LEVEL UP.
CLOUDSEC Hong Kong 2017 brings together some of the leading minds in the industry with an aim to help organisations better protect themselves with strategies and solutions designed to overcome the evolving landscape of cyberattacks.
This is an event no IT professionals should miss.
Agenda





08:45

Registration and Showcase Visits




09:00

Opening Remarks

Bob Hung

General Manager – Hong Kong & Taiwan

Trend Micro




09:10

TBD

Ryan Flores

Senior Manager, Future Threat Research

Trend Micro




09:40

INTERPOL 2020: The Multi-stakeholder Approach

Roeland van Zeijst

Digital Crime Officer for Strategy & Outreach

INTERPOL Cybercrime Directorate



The INTERPOL Global Complex for Innovation (IGCI) in Singapore is combating cybercrime by leading global efforts to provide operational support, capacity building and harmonization of international multi-stakeholder efforts, in coordination with national law enforcement agencies, academia and the private sector. The presentation gives an overview of recent and planned strategic and operational activities of the IGCI and stakeholder cooperation in support of such activities, both globally and within the ASEAN region. It will also highlight how easily your organization might be impacted by cybercrime, and how you could assist Law Enforcement to help counter this threat.


10:10

TBD

Charles Mok

Legislative Councillor (Information Technology)

HKSAR




10:40

Networking Break




11:10

BYOD or Bring your own Destruction: A Reflection on the Rush Toward Mobile Convenience

Steve Anson

SANS Institute



Bring Your Own Device is a paradigm that allows employees to access critical data from almost anywhere using devices that cost the employer nothing. Or do they? We’ll take a look at many of the challenges and assumptions that have gone into BYOD policies, or lack thereof, and take a moment to evaluate how reasonable our rush to embrace this approach has been. We’ll consider technical challenges such as vulnerability management, mobile device management platforms, and mobile device forensic challenges and look at what countermeasures we can employ to acknowledge and address the reality of this model.


11:40

TBD

Ian Christofis

Board Member

Cloud Security Alliance Hong Kong & Macau Chapter




12:10

TBD

Dale Johnstone

Vice-Convenor of ISO/IEC Joint Technical Committee 1 / Sub-Committee 27 / Working Group 1




12:50

Lunch




12:50

ROOM S221

Breakout Track A




14:00

TBD

TBD

XXXXX

VMware




14:30

Shield Vulnerabilities for Software-defined Datacenter

Tony Lee

Head of Consulting

Trend Micro



This session will explore the landscape of zero-day vulnerabilities at software-defined datacenters—not only how they are traded by cybercriminals on the underground market, but also how they are used by state actors for “lawful interception.” Attendees will learn how to protect their critical systems in software-defined datacenters with virtual patching and vulnerability shielding technologies.


15:00

TBD

TBD

XXXXX

Nutanix




15:30

Networking Break




16:00

Protect and Don’t Panic

Sunny Au

Senior Enterprise Security Architect, Asia Pacific

Akamai Technologies




16:30

TBD

TBD

XXXXX

Microsoft




12:50

ROOM S224

Breakout Track B




14:00

The Evolution of Vulnerability Management – 21st Century Cyber Security

Robert Healey

Senior Marketing Director

Tenable Networks



Frequent cyber security attacks spreading around the world and affecting systems everywhere has become the “new norm”. Recent changes in IT architecture such as virtual, mobile & cloud services, plus increasingly sophisticated cyber threats are forcing enterprise security practices and principles to be re-evaluated. Analyst research data shows that system vulnerabilities are still the largest contributing factor in enterprise data breaches. Thus, identifying vulnerable systems on your network and applying mitigations to them must continue to be a strong priority.This talk will provide you with insight into how successful organisations have evolved their Vulnerability Management programs to gain a deeper understanding of their overall Security posture.


14:30

TBD

TBD

XXXXX

Gemalto




15:00

TBD

TBD

XXXXX

Hewlett Packard Enterprise




15:30

Networking Break




16:00

Stop Targeted eMail Attacks

Tony Lee

Head of Consulting

Trend Micro



Business email compromise (BEC) scams have dominated the security threat landscape in the last few months. With cybercriminals becoming more sophisticated and using personalized spear-phishing emails to lure their targets, today’s organization must enhance their traditional security system to protect themselves from such fraud.
In a typical spear-phishing attack, specially crafted emails are sent to specific employees, partners, or others with access to your network. Using personal and professional information gleaned from social networks and the Internet to entice their target, attackers convince recipients to transfer their fund or valuable data.
In this session, expert from Trend Micro will provide you with the insight on how to use advanced detection methods to detect and block targeted email attacks that are specifically designed to evade traditional IT security.


16:30

TBD

TBD

XXXXX

Juniper




13:30

Platimum Sponsor

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


14:00

Platimum Sponsor

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


14:30

Joint Case Study

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


15:30

Gold Sponsor

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


16:00

Gold Sponsor

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


16:30

Threat Landscape 2017

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


17:00

Lucky Draw and Close




Speakers

Andy Leung

Security Product Manager, APAC
Juniper Networks

Charles Mok

Legislative Councillor (Information Technology)
Hong Kong Legislative Council

Dale Johnstone

Vice-Convenor
ISO/IEC JTC 1 SC 27 WG 1

Ian Christofis

Board Member
Cloud Security Alliance Hong Kong & Macau Chapter

Robert Healey

Senior Marketing Director
Tenable Networks

Roeland van Zeijst

Digital Crime Officer for Strategy & Outreach
INTERPOL Cybercrime Directorate

Ryan Flores

Senior Manager Future Threat Research
Trend Micro

Tony Lee

Consultant
Trend Micro

Hosted By

Gold Sponsors

Supporting Organizations