Loading Events

Hong Kong
Thursday, August 3, 2017
Hong Kong Convention Exhibition Center, Wanchai, Hong Kong

CLOUDSEC Hong Kong 2017


Enterprises and organizations are facing next-tier, multifaceted threats that are both familiar and uncharted. As the cloud and the Internet of Things (IoT) ecosystem become more interconnected, it is essential for organizations to reevaluate and redefine their understanding of threats, risks, and solutions in an ever-changing landscape.
With that, organizations and enterprises must ask: what threats should they prepare for? What risks are involved? What processes and procedures should be implemented? In the face of next-tier threats, businesses must step up their game and LEVEL UP.
CLOUDSEC Hong Kong 2017 brings together some of the leading minds in the industry with an aim to help organisations better protect themselves with strategies and solutions designed to overcome the evolving landscape of cyberattacks.
This is an event no IT professionals should miss.
Agenda





08:45

Registration and Showcase Visits




09:00

Opening Remarks

Bob Hung

General Manager – Hong Kong & Taiwan

Trend Micro




09:10

Opening Keynote LEVEL UP: Play to Win

Ryan Flores

Senior Manager, Future Threat Research

Trend Micro



For organizations, having a competitive advantage and providing customer delight is, like an online game, a quest that’s already being played in the cloud. As devices become smarter and more connected, and as user habits now dictate that faster is better, enterprises must go through their respective hero’s journey to harness and master the “super powers” cloud computing can provide them. It is important, therefore, for these organizations to LEVEL UP and “win” in order to reap the rewards. This thematic keynote presentation will provide insights on the latest and upcoming trends in cloud computing, which may challenge current information security mindset and practices. It will also provide recommendations on how businesses can leverage the aforementioned cloud computing trends without compromising the security of their networks and infrastructure.


09:40

INTERPOL 2020: The Multi-stakeholder Approach

Roeland van Zeijst

Digital Crime Officer for Strategy & Outreach

INTERPOL Cybercrime Directorate



The INTERPOL Global Complex for Innovation (IGCI) in Singapore is combating cybercrime by leading global efforts to provide operational support, capacity building and harmonization of international multi-stakeholder efforts, in coordination with national law enforcement agencies, academia and the private sector. The presentation gives an overview of recent and planned strategic and operational activities of the IGCI and stakeholder cooperation in support of such activities, both globally and within the ASEAN region. It will also highlight how easily your organization might be impacted by cybercrime, and how you could assist Law Enforcement to help counter this threat.


10:10

Understanding and Tackling “Next-tire” Cyber Threats

Charles Mok

Legislative Councillor (Information Technology)

HKSAR



Technology is now inseparable from every part of our modern lives. As the recent waves of global ransomware attacks such as Wannacry and GoldenEye/Petya highlight growing threat, opportunities for fraud, data compromise and physical disruption of critical safety systems also increase. With huge amount of trust and reputation at stake, businesses need to take a proactive approach to protecting themselves from ever-changing cyber-threats. Mr Mok will share his thoughts on adopting new technologies and approaches to cybersecurity, and how policies should enhance preparedness of society against cyberattacks.


10:40

Networking Break




11:10

BYOD or Bring your own Destruction: A Reflection on the Rush Toward Mobile Convenience

Steve Anson

SANS Institute



Bring Your Own Device is a paradigm that allows employees to access critical data from almost anywhere using devices that cost the employer nothing. Or do they? We’ll take a look at many of the challenges and assumptions that have gone into BYOD policies, or lack thereof, and take a moment to evaluate how reasonable our rush to embrace this approach has been. We’ll consider technical challenges such as vulnerability management, mobile device management platforms, and mobile device forensic challenges and look at what countermeasures we can employ to acknowledge and address the reality of this model.


11:40

The Next Generation of Cloud Security

Joe Chan

Vice Chairman – Programs & Research

Cloud Security Alliance Hong Kong & Macau Chapter



Many organizations are moving their computing assets from physical to virtualization and cloud computing. However each stage brings with it new challenges and threats. This presentation talks about today’s cloud security pain points and future of infomation technology which will help to create security scalability.


12:10

Panel Discussion: Redefining Security

Dale Johnstone

Vice-Convenor of ISO/IEC Joint Technical Committee 1 / Sub-Committee 27 / Working Group 1



It has been long established that cloud computing is no longer an option or simply an inevitability for organizations; it’s now the new norm for organizations, regardless of size or type. However, the journey to the cloud is not always a smooth ride, as dynamic real-world factors—from cybercrime and organizational preparedness to geopolitical issues—have to be considered. In today’s computing landscape, how should we define cybersecurity? This panel discussion will zero in on the impact of the aforementioned factors to an organization’s cybersecurity and cloud strategies and what enterprises need to do to LEVEL UP.


12:50

Lunch




14:00

Secure your SDDC in Hybrid Cloud

Eric Ng

Senior Systems Engineer, NSX COE

VMware



For several years, cloud computing has been the focus of IT decision, but the extremely security-conscious have been hesitant to move their data and workloads into the cloud. The typical challenge is the lack of visibility in east-west traffic and the high complexity of service insertion, configuration and chaining. In addition, static Security Group membership and the consumption of 3rd party advanced security is difficult as workload is spreading in the hybrid cloud. This session will cover the key design principles to enable network and security services in cloud like AWS, Azure, Softlayer etc. We will also talk about the hybrid cloud architecture that leveraging NSX network virtualization and show how NSX can provide a security framework to enable 3rd party integration in cloud.


14:30

Shield Vulnerabilities for Software-defined Datacenter

Tony Lee

Head of Consulting

Trend Micro



This session will explore the landscape of zero-day vulnerabilities at software-defined datacenters—not only how they are traded by cybercriminals on the underground market, but also how they are used by state actors for “lawful interception.” Attendees will learn how to protect their critical systems in software-defined datacenters with virtual patching and vulnerability shielding technologies.


15:00

Ensure Security Without Compromising on Enterprise Cloud Platform

Patrick Chan

Systems Engineer Manager

Nutanix Hong Kong & Taiwan



Digital transformation, the emerging Internet of Things (IoT) and proliferation of mobile-first apps have triggered a major rethink in the way software is built, deployed and scaled. Modern applications are being developed with flexible architectures using smaller, more independent modular services. While these new application architectures have improved overall IT agility, they have also exposed a multitude of IT challenges – visibility of application interdependencies for troubleshooting, new security threats and a dearth of unified management tools.
Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix enterprise cloud platform leverages web-scale engineering and consumer-grade design to natively converge compute, virtualization and storage into a resilient, software-defined solution with rich machine intelligence.
To address the new security threats and a death of network & security management tools, Nutanix Prism will provide application-centric visualization of the network, Secure Applications Against Emerging Threats with Upcoming Built-in Micro-segmentation and Orchestrate Networking and Security Services with One-Click to delivering security to the enterprise.


15:30

Networking Break




16:00

Protect and Don’t Panic

Sunny Au

Senior Enterprise Security Architect, Asia Pacific

Akamai Technologies




16:30

The Microsoft IT Security Journey in the Hybrid Environment

Calvin Kam

Technical Presales Specialist

Microsoft



If done correctly and proactively, security can be an accelerator for cloud adoption. The session provides an overview on how Microsoft helps businesses to adopt secured cloud solutions in the hybrid environment during the rapid changing business environment.


14:00

The Evolution of Vulnerability Management – 21st Century Cyber Security

Robert Healey

Senior Marketing Director

Tenable Networks



Frequent cyber security attacks spreading around the world and affecting systems everywhere has become the “new norm”. Recent changes in IT architecture such as virtual, mobile & cloud services, plus increasingly sophisticated cyber threats are forcing enterprise security practices and principles to be re-evaluated. Analyst research data shows that system vulnerabilities are still the largest contributing factor in enterprise data breaches. Thus, identifying vulnerable systems on your network and applying mitigations to them must continue to be a strong priority.This talk will provide you with insight into how successful organisations have evolved their Vulnerability Management programs to gain a deeper understanding of their overall Security posture.


14:30

Bringing Trust To The Internet of Things

Sheung-Chi Ng

Senior Security Consulting Manager for Enterprise & Cybersecurity, APAC

Gemalto



With the introduction of the Internet of Things, it not only revolutionizes the industry involved with devices by generating new value chain in the business from data but also benefits many industries such as bank, insurance, healthcare and others by discovering the insight from data analytics. The core value of IoT is from data itself. Data is the new Oil for IoT. This is vital to maintain the trust of data in the entire data lifecycle from the Edge to the Core.


15:00

Data-Centric Security Advances

Ricky Mok

Senior Security Architect, HPE Security

Hewlett Packard Enterprise



In this session HPE security expert will examine vulnerabilities and solutions across on-prem, the cloud, mobile, IoT and web. Learn how to secure data-in-use and data-in-motion – without impacting performance. See the latest in data-centric security, encryption, data virtualization and more.


15:30

Networking Break




16:00

Stop Targeted eMail Attacks

Tony Lee

Head of Consulting

Trend Micro



Business email compromise (BEC) scams have dominated the security threat landscape in the last few months. With cybercriminals becoming more sophisticated and using personalized spear-phishing emails to lure their targets, today’s organization must enhance their traditional security system to protect themselves from such fraud.
In a typical spear-phishing attack, specially crafted emails are sent to specific employees, partners, or others with access to your network. Using personal and professional information gleaned from social networks and the Internet to entice their target, attackers convince recipients to transfer their fund or valuable data.
In this session, expert from Trend Micro will provide you with the insight on how to use advanced detection methods to detect and block targeted email attacks that are specifically designed to evade traditional IT security.


16:30

Software-Defined Secure Network

Andy Leung

Security Product Manager, APAC

Juniper Networks



To address the ever-growing cyber attack, enterprises need to think differently about security and consider a new option—an option in which your network components are orchestrated into an end-to-end defense domain. With a Software-Defined Secure Network (SDSN) from Juniper, your business can benefit from unified defense across multivendor environments, private clouds, and public clouds. We will talk about SDSN’s integration with Trend Micro and how we can join force to deliver best all-around security framework.


13:30

Platimum Sponsor

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


14:00

Platimum Sponsor

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


14:30

Joint Case Study

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


15:30

Gold Sponsor

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


16:00

Gold Sponsor

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


16:30

Threat Landscape 2017

Rik Feguson

Vice President Security Research

Trend Micro Global



abstract


17:00

Lucky Draw and Close




Speakers

Andy Leung

Security Product Manager, APAC
Juniper Networks

Calvin Kam

Technical Presales Specialist
Microsoft

Charles Mok

Legislative Councillor (Information Technology)
Hong Kong Legislative Council

Dale Johnstone

Vice-Convenor
ISO/IEC JTC 1 SC 27 WG 1

Eric Ng

Senior Systems Engineer, NSX COE
VMware

Joe Chan

Vice Chairman – Programs & Research
Cloud Security Alliance Hong Kong & Macau Chapter

Patrick Chan

Systems Engineer Manager
Nutanix Hong Kong & Taiwan

Ricky Mok

Senior Security Architect
HPE Security

Robert Healey

Senior Marketing Director
Tenable Networks

Roeland van Zeijst

Digital Crime Officer for Strategy & Outreach
INTERPOL Cybercrime Directorate

Ryan Flores

Senior Manager Future Threat Research
Trend Micro

Sheung-Chi Ng

Senior Security Consulting Manager for Enterprise & Cybersecurity, APAC
Gemalto

Steve Anson

Instructor
SANS Institute

Sunny Au

Senior Enterprise Security Architect, Asia Pacific
Akamai Technologies

Tony Lee

Head of Consulting
Trend Micro

Best Moments

Hosted By

Gold Sponsors

Supporting Organizations

Exhibitors