Owned and Managed by: |
|
|
|
|
|
Diamond Sponsors |
|
|
|
|
|
|
|
|
|
Platinum Sponsors |
|
|
|
|
|
|
|
Luncheon Sponsor |
|
|
|
Showcase Sponsor |
|
|
|
|
|
Official Training Sponsor |
|
|
|
Premium Partner |
|
|
|
Media Sponsors |
|
|
|
|
|
|
|
|
|
|
|
|
|
For printable agenda, please click . |
|
Time |
Agenda |
08:15 - 09:00 |
Registration |
09:00 - 09:30 |
Opening Keynote: Assessing Business Risk from Complex Information Systems
Protection of data and digital assets is critical for any company however, it continues to be more difficult with the proliferation of new, and more complex, technologies such as virtual machines, mobile computing, mirrored databases, cloud computing and complex multi-tiered architectures.
This presentation discusses a method to identify and assess the unique risks incurred from using complex technologies in business systems. Specific vulnerabilities and considerations will be discussed for each area of exposure and a recommended approach for evaluation and remediation of these risks. Major topics of discussion are:
- Understanding Risk from Complex Technologies
- Defining Five Layers of Technology
- A Defense In Depth Model for Complex Systems
- Assessing and Securing Complex Systems
Chief Information Security Officer (CISO) Treasury and Global Operations The World Bank
|
09:30 - 10:00 |
Keynote One: Security and Compliance in the Cloud
Clouds and virtualization offer powerful new ways to manage and use digital information, but they also create new complexities for organizations in meeting the fundamental challenge of getting the right information to the right people over an infrastructure that they can trust.
In this session, we will present the best practice approach for building trust in cloud that can meet the most rigorous security and compliance requirements.
Manager, Technology Consultant Greater China RSA, The Security Division of EMC
|
10:00 - 10:30 |
Keynote Two: Keeping up with the Evolving Information Security World - What's Hot and What's Not?
The world of cybersecurity is shifting, and so is the CISO role. To establish tomorrow's security officers as leaders, today's CISOs must enhance their business acumen. As a dynamic business partner, new CISOs must be able to communicate risk from a business perspective, take proactive action and provide the necessary information to take tactical and strategic decisions.
In this session, the speaker will provide us with an overview of latest developments in the security marketplace and how to CISO's challenged to stay in control. What tools are available and what role have the technology partners. How to optimize the security investments while keeping up with new technologies and trends.
Session discovery topics:
- Developments in the Security industry
- Why security and organizational strategy need to be aligned
- How IT security direction planning benefits business requirements
- Tools that guide your organization to targeted Security Standards
General Manager, Security (Asia Pacific), Solutions Development Group Datacraft Asia Pte Ltd.
|
10:30 - 11:00 |
Keynote Three: Back to Basics - CISOs and Data Ownership in an Evolving Technology Landscape
The evolution of the CISO role can in large part be credited to the rapid and constant growth of IT. Obviously, the CISO role will keep on shaping, defining and expanding every single day. Driving organizational strategy for risk, mobility and breach protection are merely some of the many responsibilities of today's CISOS. In managing these complex and complicated global issues, it can be easy for CISOs to lose focus on the most important aspect of their job - data.
In this session, the speaker will discuss how managing the data can promote security awareness and ultimately, drive security strategy.
Product Manager, Security Technology Business Unit Cisco Systems
|
11:00 - 11:25 |
Morning Networking Coffee Break |
11:25 - 11:55 |
Keynote Four: The Blueprint for Cybersecurity
In today's world, CISOs face enormous challenges, both internally and externally. Client data growth remains inescapable; the amount of information CISOs have to deal with is expanding every day, and so does their workload. On the other hand, they also focus on reducing costs and achieving near-term ROI on their technology investments. The emergence of the Information Economy acts as a shift in the landscape which leaders need to embrace.
In this presentation, the Speaker will dissect the current key trends and how they impact leaders into the next decade.
Session discovery topics:
- Information Economy Shift
- IT Latency and Security
- Key IT trends - cloud computing, growth of digital devices and social media
Business Development Huawei Symantec Technologies Co. Ltd
|
11:55 - 12:55 |
CISO Panel Discussion One: The Future is NOW: The New CISO
In the very beginning, information security and compliance consisted of a single IT team member who showed interest in security. Their duties simply centered on firewalls and virus protection. However, it is of course no longer the same story. Over the last two decades, the complexities of technology and its subsequent regulation have demanded a shift in how security functions should be managed. And it is expected to keep in changing drastically. With the seemingly daily advancements in technology, the CISO position continues to become more visible and essential within an organization's structure. CISOs must learn and develop certain skills critical to becoming successful leaders and business partners.
During the discussion, all panelists will join together to discuss these crucial skills and the best methods to refine them.
Moderator:
Senior Partner, Advisory KPMG
Executive Panelists:
, Head of BBS Asia Pacific (IT), BayerMaterialScience Ltd
, Head of Corporate Risk Management, Cathay Pacific Airways
, IT Security Policy Manager, CLP Power
, Head of Business & Technology Sourcing Practice, Asia, Mayer Brown JSM
, Head of Information Technology, MTR Corporation Ltd
|
12:55 - 14:05 |
Executive Networking Luncheon Roundtable (By Invitation Only) Sponsored by RSA, The Security Division of EMC
Welcome Remarks
FSI Strategic Accounts EMC Hong Kong
Trust in the Cloud
Clouds and virtualization offer powerful new ways to manage and use digital information, but they also create new complexities for organizations in meeting the fundamental challenge of getting the right information to the right people over an infrastructure that they can trust. How can we assure trust, GRC requirements are met in the cloud?
Networking Luncheon Speaker:
Senior Security Consultant EMC Consulting Asia Pacific / Japan
|
14:05 - 14:50 |
CISO Panel Discussion Two: It's All About the Data!
As CISOs attempt to deal with a constantly changing technology landscape, in nine cases out of then, they easily lose focus on the most important aspect of their job - the data. Data is the core asset for many enterprises, and the onus falls solely on CISOs to secure and maintain them. It is essential in ensuring that staff protect the privacy of clients and handle personal information safely, especially after considerable data sale scandals lately.
In this panel discussion, the panelists will discuss with us how managing the data can promote security awareness and ultimately, drive security strategy.
Session discovery topics:
- How to attack such a large project - getting going and taking it one step at a time
- How awareness can affect security - why data belongs to the business owners
- How data classification impacts the bottom line - data classification as a risk assessment
Moderator:
Chief Operating Officer, Risk Advisory Services KPMG
Executive Panelists:
Chief Information Security Officer (CISO), Treasury and Global Operations, The World Bank
, CTO, Greater China, GE China
, Director, Head of Asian Client Information Services, Securities & Funds Services, Global Transaction Services, Citi
, Founder, China Professional Investigation and Surveillance Alliance
, VP & CIO, Wal-Mart China
|
14:50 - 15:20 |
Keynote Five: Accelerating & Securing Consolidated, Virtualized and Cloudy Networks
Every now and then we reach a point where technologies finally become integrated and easier to understand and control. And then.. another revolution of technologies and subsequent business opportunities arise - with a whole new set of challenges to achieve the rewards.
Consolidated, virtualized and cloudy networks are the wave of the future but due to distance and latency between users, applications and storage, WAN optimization or acceleration is mandatory. But how do you secure applications and storage which you do not ultimately control? Further, how do you optimize data which is constantly scrambled, re-scrambled, sent using various encryptions, protected using SSL, etc.
This session examines the technologies which enable you to accelerate and secure your applications, data and storage while in transit and while at rest in these new IT service environments. We will define how these new techniques help organizations achieve exponential levels of productivity, efficiency and elastic capacity - while benefiting from an OPEX business model.
Senior Director Marketing, APAC & Japan Riverbed
|
15:20 - 15:50 |
Keynote Six: Security in the Cloud - Maintaining Trust and Control in Virtualized Environments
To fully capitalize on the strategic potential of the cloud, enterprises will need to address a key challenge: security. With its comprehensive, flexible, and modular security solutions, SafeNet enables enterprises to overcome the security challenges posed by the cloud. The SafeNet Trusted Cloud Fabric enables enterprises to maximize security and control in the cloud, migrate to new cloud services with optimal flexibility, and fully leverage the cloudˇ¦s business benefits.
Senior Security Consultant, CISSP, CISA SafeNet Inc.
|
15:50 - 16:20 |
Keynote Seven: Next Generation Intrusion Protection Systems (IPS)
Traditional Intrusion Protection Systems (IPS) are always looked upon as a black box with a set of predefine static rules/signatures. The architectures are closed and with no flexibility to accurately tailor the detection to adapt to the dynamic fast changing network environments and attack. Security officers always find it very challenging to tune their IPS to adapt to their dynamic network environments and attack. Next Generation IPS (NGIPS) raises the bar above traditional IPS offerings by leveraging contextual awareness to automate common IPS tasks, such as impact assessment, IPS tuning, and user identification. A NGIPS also offers an open architecture making it easy to customize protection for dynamic network environments.
With a NGIPS you can effectively defend your network while maintaining operation costs from spiraling out of control, and/or sacrificing security.
Technical Consultant, ASEAN & North Asia, Sourcefire
|
16:20 - 16:50 |
CISO Panel Discussion Three: One Step Ahead: Assessing the Future of Information Security
There is an escalating pattern of threats to IT infrastructure, and these threats are expected to exacerbate and evolve. The battle between CISOs and numerous sources of threats is endless. Many CISOs are frustrated about this fight and start to doubt if there is an end to this ever-intensifying arm race. So how can CISOs truly protect information? And how can security leaders keep up with this increasingly challenging environment?
In this panel discussion, the panelists will present their thoughts on how the information security industry can reach an improved, alternate reality.
Moderator:
Regional Representative, Asia Pacific The Open Computing Alliance
Executive Panelists:
, Head of Information Security, KPMG
, Director of Information Technology, Shangri-La International Hotel Management Ltd.
, Director, Head of IT, Sun Hung Kai Financial
|
16:50 - 17:10 |
Afternoon Networking Coffee Break |
17:10 - 17:15 |
Closing Remarks |
|
|
|
Remarks: The above agenda is subject to change without prior notice. |
© 2011 Market Intelligence Group Limited All rights reserved |
|
|