Owned and Managed by:
 
 



 
Diamond Sponsors
 
 
 
 
 
Platinum Sponsors
 
 
 
 
Luncheon Sponsor
 
 
Showcase Sponsor
 
 
 
Official Training Sponsor
 
 
Premium Partner
 
 
Media Sponsors
 
 
 
 
 
 
  Tentative Conference Agenda

For printable agenda, please click here.

 
Time Agenda
08:15 - 09:00 Registration
09:00 - 09:30

Opening Keynote: Assessing Business Risk from Complex Information Systems

Protection of data and digital assets is critical for any company however, it continues to be more difficult with the proliferation of new, and more complex, technologies such as virtual machines, mobile computing, mirrored databases, cloud computing and complex multi-tiered architectures.

This presentation discusses a method to identify and assess the unique risks incurred from using complex technologies in business systems. Specific vulnerabilities and considerations will be discussed for each area of exposure and a recommended approach for evaluation and remediation of these risks. Major topics of discussion are:

  • Understanding Risk from Complex Technologies
  • Defining Five Layers of Technology
  • A Defense In Depth Model for Complex Systems
  • Assessing and Securing Complex Systems


Mr. James C. Nelms, CISSP
Chief Information Security Officer (CISO)
Treasury and Global Operations
The World Bank
09:30 - 10:00

Keynote One: Security and Compliance in the Cloud

Clouds and virtualization offer powerful new ways to manage and use digital information, but they also create new complexities for organizations in meeting the fundamental challenge of getting the right information to the right people over an infrastructure that they can trust.

In this session, we will present the best practice approach for building trust in cloud that can meet the most rigorous security and compliance requirements.


Mr. Gary Lau
Manager, Technology Consultant Greater China
RSA, The Security Division of EMC
10:00 - 10:30

Keynote Two: Keeping up with the Evolving Information Security World - What's Hot and What's Not?

The world of cybersecurity is shifting, and so is the CISO role. To establish tomorrow's security officers as leaders, today's CISOs must enhance their business acumen. As a dynamic business partner, new CISOs must be able to communicate risk from a business perspective, take proactive action and provide the necessary information to take tactical and strategic decisions.

In this session, the speaker will provide us with an overview of latest developments in the security marketplace and how to CISO's challenged to stay in control. What tools are available and what role have the technology partners. How to optimize the security investments while keeping up with new technologies and trends.

Session discovery topics:

  • Developments in the Security industry
  • Why security and organizational strategy need to be aligned
  • How IT security direction planning benefits business requirements
  • Tools that guide your organization to targeted Security Standards


Mr. Guido Crucq
General Manager, Security (Asia Pacific), Solutions Development Group
Datacraft Asia Pte Ltd.
10:30 - 11:00

Keynote Three: Back to Basics - CISOs and Data Ownership in an Evolving Technology Landscape

The evolution of the CISO role can in large part be credited to the rapid and constant growth of IT. Obviously, the CISO role will keep on shaping, defining and expanding every single day. Driving organizational strategy for risk, mobility and breach protection are merely some of the many responsibilities of today's CISOS. In managing these complex and complicated global issues, it can be easy for CISOs to lose focus on the most important aspect of their job - data.

In this session, the speaker will discuss how managing the data can promote security awareness and ultimately, drive security strategy.


Mr. Razak Mohammed Ali
Product Manager, Security Technology Business Unit
Cisco Systems
11:00 - 11:25 Morning Networking Coffee Break
11:25 - 11:55

Keynote Four: The Blueprint for Cybersecurity

In today's world, CISOs face enormous challenges, both internally and externally. Client data growth remains inescapable; the amount of information CISOs have to deal with is expanding every day, and so does their workload. On the other hand, they also focus on reducing costs and achieving near-term ROI on their technology investments. The emergence of the Information Economy acts as a shift in the landscape which leaders need to embrace.

In this presentation, the Speaker will dissect the current key trends and how they impact leaders into the next decade.

Session discovery topics:

  • Information Economy Shift
  • IT Latency and Security
  • Key IT trends - cloud computing, growth of digital devices and social media

Mr. Scott Tam
Business Development
Huawei Symantec Technologies Co. Ltd
11:55 - 12:55

CISO Panel Discussion One: The Future is NOW: The New CISO

In the very beginning, information security and compliance consisted of a single IT team member who showed interest in security. Their duties simply centered on firewalls and virus protection. However, it is of course no longer the same story. Over the last two decades, the complexities of technology and its subsequent regulation have demanded a shift in how security functions should be managed. And it is expected to keep in changing drastically. With the seemingly daily advancements in technology, the CISO position continues to become more visible and essential within an organization's structure. CISOs must learn and develop certain skills critical to becoming successful leaders and business partners.

During the discussion, all panelists will join together to discuss these crucial skills and the best methods to refine them.

Moderator:
Mr. Egidio Zarrella
Senior Partner, Advisory
KPMG


Executive Panelists:
Mr. Cenk Eldem, Head of BBS Asia Pacific (IT), BayerMaterialScience Ltd
Mr. Steve Tunstall, Head of Corporate Risk Management, Cathay Pacific Airways
Mr. Charles Liang, IT Security Policy Manager, CLP Power
Mr. Geofrey, L Master, Head of Business & Technology Sourcing Practice, Asia, Mayer Brown JSM
Mr. Daniel Lai, Head of Information Technology, MTR Corporation Ltd

12:55 - 14:05 Executive Networking Luncheon Roundtable
(By Invitation Only)
Sponsored by RSA, The Security Division of EMC


Welcome Remarks

Mr. Franco Lan
FSI Strategic Accounts
EMC Hong Kong


Trust in the Cloud


Clouds and virtualization offer powerful new ways to manage and use digital information, but they also create new complexities for organizations in meeting the fundamental challenge of getting the right information to the right people over an infrastructure that they can trust. How can we assure trust, GRC requirements are met in the cloud?

Networking Luncheon Speaker:

Mr. Matrix Chau
Senior Security Consultant
EMC Consulting Asia Pacific / Japan
14:05 - 14:50

CISO Panel Discussion Two: It's All About the Data!

As CISOs attempt to deal with a constantly changing technology landscape, in nine cases out of then, they easily lose focus on the most important aspect of their job - the data. Data is the core asset for many enterprises, and the onus falls solely on CISOs to secure and maintain them. It is essential in ensuring that staff protect the privacy of clients and handle personal information safely, especially after considerable data sale scandals lately.

In this panel discussion, the panelists will discuss with us how managing the data can promote security awareness and ultimately, drive security strategy.

Session discovery topics:

  • How to attack such a large project - getting going and taking it one step at a time
  • How awareness can affect security - why data belongs to the business owners
  • How data classification impacts the bottom line - data classification as a risk assessment

Moderator:
Mr. Derek P. Jackson
Chief Operating Officer, Risk Advisory Services
KPMG


Executive Panelists:
Mr. James C. Nelms, CISSP Chief Information Security Officer (CISO), Treasury and Global Operations, The World Bank
Mr. Shashank Bindal, CTO, Greater China, GE China
Mr. Endre Markos, Director, Head of Asian Client Information Services, Securities & Funds Services, Global Transaction Services, Citi
Mr. Daniel Ng, Founder, China Professional Investigation and Surveillance Alliance
Mr. Steven Yau, VP & CIO, Wal-Mart China

14:50 - 15:20

Keynote Five: Accelerating & Securing Consolidated, Virtualized and Cloudy Networks

Every now and then we reach a point where technologies finally become integrated and easier to understand and control. And then.. another revolution of technologies and subsequent business opportunities arise - with a whole new set of challenges to achieve the rewards.

Consolidated, virtualized and cloudy networks are the wave of the future but due to distance and latency between users, applications and storage, WAN optimization or acceleration is mandatory. But how do you secure applications and storage which you do not ultimately control? Further, how do you optimize data which is constantly scrambled, re-scrambled, sent using various encryptions, protected using SSL, etc.

This session examines the technologies which enable you to accelerate and secure your applications, data and storage while in transit and while at rest in these new IT service environments. We will define how these new techniques help organizations achieve exponential levels of productivity, efficiency and elastic capacity - while benefiting from an OPEX business model.


Mr. Paul Serrano
Senior Director Marketing, APAC & Japan
Riverbed
15:20 - 15:50

Keynote Six: Security in the Cloud - Maintaining Trust and Control in Virtualized Environments

To fully capitalize on the strategic potential of the cloud, enterprises will need to address a key challenge: security. With its comprehensive, flexible, and modular security solutions, SafeNet enables enterprises to overcome the security challenges posed by the cloud. The SafeNet Trusted Cloud Fabric enables enterprises to maximize security and control in the cloud, migrate to new cloud services with optimal flexibility, and fully leverage the cloudˇ¦s business benefits.


Mr. Sheung Chi Ng
Senior Security Consultant, CISSP, CISA
SafeNet Inc.
15:50 - 16:20

Keynote Seven: Next Generation Intrusion Protection Systems (IPS)

Traditional Intrusion Protection Systems (IPS) are always looked upon as a black box with a set of predefine static rules/signatures. The architectures are closed and with no flexibility to accurately tailor the detection to adapt to the dynamic fast changing network environments and attack. Security officers always find it very challenging to tune their IPS to adapt to their dynamic network environments and attack.

Next Generation IPS (NGIPS) raises the bar above traditional IPS offerings by leveraging contextual awareness to automate common IPS tasks, such as impact assessment, IPS tuning, and user identification. A NGIPS also offers an open architecture making it easy to customize protection for dynamic network environments.

With a NGIPS you can effectively defend your network while maintaining operation costs from spiraling out of control, and/or sacrificing security.


Mr. Brian Tan
Technical Consultant, ASEAN & North Asia,
Sourcefire
16:20 - 16:50

CISO Panel Discussion Three: One Step Ahead: Assessing the Future of Information Security

There is an escalating pattern of threats to IT infrastructure, and these threats are expected to exacerbate and evolve. The battle between CISOs and numerous sources of threats is endless. Many CISOs are frustrated about this fight and start to doubt if there is an end to this ever-intensifying arm race. So how can CISOs truly protect information? And how can security leaders keep up with this increasingly challenging environment?

In this panel discussion, the panelists will present their thoughts on how the information security industry can reach an improved, alternate reality.


Moderator:
Mr. Michael Mudd
Regional Representative, Asia Pacific
The Open Computing Alliance


Executive Panelists:
Mr. James McKeogh, Head of Information Security, KPMG
Mr. Alan Lee, Director of Information Technology, Shangri-La International Hotel Management Ltd.
Mr. Arthur Wong, Director, Head of IT, Sun Hung Kai Financial

16:50 - 17:10 Afternoon Networking Coffee Break
17:10 - 17:15 Closing Remarks
 
  Remarks: The above agenda is subject to change without prior notice.
© 2011 Market Intelligence Group Limited All rights reserved