Enterprises and organizations are facing next-tier, multifaceted threats that are both familiar and uncharted. As the cloud and the Internet of Things (IoT) ecosystem become more interconnected, it is essential for organizations to reevaluate and redefine their understanding of threats, risks, and solutions in an ever-changing landscape.
With that, organizations and enterprises must ask: what threats should they prepare for? What risks are involved? What processes and procedures should be implemented? In the face of next-tier threats, businesses must step up their game and LEVEL UP.
8:00 - 9:00Registration
9:00 - 9:30Trend Micro Address: Welcome to CLOUDSEC 2017 - Inspiring Your Digital Transformation Download Presentation Slides
The CIO role is changing. Sure, it’s still important to keep the lights on but increasingly the CIO is being tasked with driving change. No longer relegated to a peripheral role, the CIO is being called on to inspire change from the centre.
- We have the technology. But who cares? How will you create the necessary energy and inspiration for change?
- How will you help balance innovation with business as usual?
- What will you need to lead necessary change and transformation?
It has never been a better time or a more challenging time to be a CIO. So many of the rising technology opportunities, like digital transformation, machine learning, artificial intelligence, IOT, and cloud offer the chance for CIOs to be in the middle of the discussion around topics of significant value to the enterprise. At the same time risks associated with security are also at the top of the agendas of many boards. Again, the CIO is one of the key drivers of risk mitigation, playing both offense and Defense. In this session Dhanya will discuss how finding faster paths to seizing opportunity and mitigating risks requires a better ecosystem. With that, organisations and enterprises must ask: what threats should they prepare for? What risks are involved? What processes and procedures should be implemented?
9:30 - 10:00LEVEL UP: Play to Win Download Presentation Slides
For organizations, having a competitive advantage and providing customer delight is, like an online game, a quest that's already being played in the cloud. As devices become smarter and more connected, and as user habits now dictate that faster is better, enterprises must go through their respective hero's journey to harness and master the "super powers" cloud computing can provide them. It is important, therefore, for these organizations to LEVEL UP and "win" in order to reap the rewards. This thematic keynote presentation will provide insights on the latest and upcoming trends in cloud computing, which may challenge current information security mindset and practices. It will also provide recommendations on how businesses can leverage the aforementioned cloud computing trends without compromising the security of their networks and infrastructure.
10:00 - 10:30Cyber Security and Cooperation with Industry
10:30 - 11:00Keynote 4: Ransomware
After becoming one of the main cyber security threats in 2016 and recently causing an international turmoil in May 2017, ransomware is keeping everyone on their toes regarding the protection of their critical data and computer systems. As infection approaches diversify and traditional antivirus protection is surpassed, companies need to treat data protection proactively, getting the right solutions and processes in place to prepare for the inevitable attack.
- Discover the benefits of extending Availability to the cloud
- How to efficiently recover from an attack.
11:00 - 11:30Break & Exhibition Stage
11:30 - 12:00Keynote 5: Creating Holistic Cyber Security Strategies Download Presentation Slides
The world of IT security is moving rapidly as a wealth of new technologies such as artificial intelligence, machine learning and deep analytics, to name a few, enter the markets and help to improve defenses of organizations. But even as these innovations vastly improve the technology, there still exist organizational challenges that remain as hurdles to the successful delivery of a robust IT security strategy. In this session IDC will touch on the future of IT security technologies and focus on the structural changes organizations need to make to ensure that this depth of innovation can be best leveraged to create a holistic and robust enterprise security strategy to better equip the frontlines of this cyber war that all organizations are now faced with.
12:00 - 12:30Keynote Panel Discussion: Turning security into competitive advantage in the era of Fast-IT
12:30 - 13:30Lunch & Exhibition Stage
13:30 - 14:00Keeping a Billion Cloud Users Secure
Google secures and protects the data and information for over a billion users across a number of its business units and offerings. With some of the largest global networks and systems, protecting our customers data (both business and consumer) requires leading-edge and scalable approaches to security that are both efficient and effective.
Security is embedded in everything that Google does with significant investments made to drive execution as well as through programs such as Project Zero for security research, Project Shield for DDoS mitigation, while taking a new approach to Enterprise Security with BeyondCorp.
Google continues to invest in testing systems for security weaknesses such as finding the first SHA-1 collision and the SSL 3.0 POODLE vulnerability, and openly promotes a Vulnerability Reward Program (paying $3 million in 2016 alone to individuals who have contributed to protect global systems).
Join this session to gain an insight into Google's approach to security, best practice in design and take the opportunity to understand how you can engage with Google to drive security in your organization.
14:00 - 14:30Living on the Edge Download Presentation Slides
The continuing evolution of technology has changed the way people live their lives. Home automation has become a norm the past couple of years with the ever-rising market of connected devices such as smartphones, TVs, and even smart fridges. You can now automate many of the functions in your house and control them from your smart device from almost anywhere. And as more workplaces and communities become more automated as well, the world appears to become smarter, better and more convenient for everyone.
Smart devices, smart transports systems, smart environments. However, it’s still very far from being a paradise.
Like any other device connected to the internet, smart environments can be vulnerable to cyberattacks that can risk people’s privacy, and even their safety. How many people you know have actually installed anti-virus software into their fridge or TV?
While much has been discussed about the security of systems and networks, talks regarding the security of smart environments seems like it’s just an afterthought.
14:30 - 15:00Trust & Assurance, in the digital world Download Presentation Slides
15:00 - 15:30Break & Exhibition Stage
15:30 - 16:00Visibility into SSL Traffic Is Key to Securing Your Data Download Presentation Slides
Rising amounts of encrypted traffic are hampering the ability of IT security teams to protect customer data and intellectual property. Traditional security gateways, network firewalls, and intrusion prevention systems are increasingly running blind to SSL/TLS traffic. The growth in SSL encryption presents a challenge for enterprises,
because without security tools to inspect SSL traffic, encrypted attacks go undetected and expose your data to breaches. With Elliptic Curve Cryptography (ECC) becoming the leading standard in SSL communication, your datacentre needs to take immediate action to the new SSL standards and detect encrypted cyber-attacks that try to hide under the new ECC encryption protocol.
In this session we will review the latest trends and SSL technology evolution, how they affect your datacentre and ways to handle the challenges it presents.
16:00 - 16:30Next-generation Security Download Presentation Slides
16:30 - 17:00Closing Keynote: Evolving Era of Cloud
17:00Awards & Lucky Draw
13:30 - 14:00Securing Applications Across Clouds Download Presentation Slides
With Public Cloud and Managed Hosting Services playing a key part in IT Transformation projects we end up creating silos of Clouds which need to be managed individually from security and access perspective. VMware is leading the way in providing a unified experience in managing security and access across private, public and hosted clouds.
In this session you will get a preview of how:
- Network and Security policies can be extended across Private and public clouds
- Application integrity can be maintained and threat response can be automated across Private and Public Clouds
- Gain visibility into network traffic, security policy and compliance across Private and Public Clouds
- Monitor Application performance and Underlying Infrastructure in real time across Clouds
- Analyze workload usage and utilization across Clouds
- Get cost visibility for delivering IT across Clouds
14:00 - 14:30Who did it? How an enhanced attribution process could help in mitigating the cyber risk
As the world’s largest law enforcement organization, the International Criminal Police Organization, aka INTERPOL, is assisting its 190 member countries to enhance their cyber capabilities. Knowing that law enforcement agencies only hold part of the solution to tackle cybercrime, a comprehensive strategy is required to find synergies. From operation coordination, to training, passing by research, it is therefore crucial to build a strong relationship between actors from diverse horizons. A mutual understanding and a fair comprehension of each other limits are required to collectively mitigating the digital risk.
14:30 - 15:00Dynamic environments require dynamic security Download Presentation Slides
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. If you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. To meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. In this session, Shraddha will talk about challenges that enterprises face while trying to secure modern day dynamic datacenters and will highlight the optimized security framework that is needed to keep hybrid cloud environments safe without compromising on performance, speed and agility.
15:00 - 15:30Break & Exhibition Stage
15:30 - 16:00The Cloud Re-writes the Rules Download Presentation Slides
Veeam recognises the new challenge companies across the globe face in enabling the Always-On Enterprise™, a business that must operate 24/7/365. Veeam defines DRaaS, by offering it as part of it’s comprehensive availability strategy, providing a consistent user experience and reducing overall cost to protect your data (backup + replication + cloud). Disaster Recovery-as-a-Service is opportunity to sell cloud services to new and existing customers. Veeam Cloud Connect Replication for Service Providers makes DRaaS easy, profitable and practical for any customer environment. Veeam has pioneered a new market of Availability for the Always-On Enterprise by helping organisations meet recovery time and point objectives (RTPO) of less than 15 minutes for all applications and data, through a fundamentally new kind of solution that delivers high-speed recovery, data loss avoidance, verified recoverability, leveraged data and complete visibility.
16:00 - 16:30Securing the Enterprise from Unknown – The behavior Way Download Presentation Slides
16:30 - 17:00Closing Keynote: Evolving Era of Cloud
17:00Awards & Lucky Draw
13:00 - 14:00Session 1
14:00 - 15:00Session 2
15:00 - 16:00Session 3
16:00 - 17:00Session 4
Simon Piff is the Vice President of IDC Asia/Pacific's IT Security Practice Business. He focuses on the needs of the chief security officer in an environment that encompasses cloud computing, the Internet of Things, and a continued and persistent attack from cybercriminals. Much has changed in this area since 1994, when Simon installed his first firewall, and the collision of Big Data with security, the move to a defense in-depth strategy, and the issues of insufficient numbers of well-trained staff make this a challenging area for businesses today.
Simon started his Asia/Pacific regional experience in 1989; since then, he has served in various sales, marketing management, and consulting roles for IT hardware, software, services, and online businesses. Having previously covered the storage system and then datacenter markets for IDC Asia/Pacific, Simon's career background and IDC experience put him in the ideal position to deliver valuable insights to both technology buyers and providers. Prior to joining IDC, Simon worked at Microsoft Asia/Pacific, defining the company's business intelligence, data warehousing, and data management go-to-market strategies for the region. He also worked at Digital Equipment Corporation to develop its IT security, Internet, ecommerce, and service provider business as well as with a medical dot-com in various business development and management roles.
"Interative panel, informative, expertise presentations"
"The information sharing allows us to compare our security position to others. It is comforting to know we are doing what we should do and more on security"
"The opportunities to acquire valuable information referring to security threats and how to deal with it from different experts"
Macquarie Community College
"Exposure to the threat landscape, excellent thoughts from leaders"
"Format is very good, very informative and very interactive"