Owned and Organized By

Home Agenda Speakers Past Events Registration
For printable agenda, please click here
Time Agenda
08.15 - 08.50 Registration
08.50 - 09.00 Opening Remarks

Mr. Daniel Lai, BBS, JP
Government CIO
The Government of Hong Kong SAR

09.00 - 09.30 Opening Keynote: 2013 Global State of Information Security Survey - Changing the game

In Hong Kong & China, information security has always been a high-stakes game. One that demands a smart strategy and the right technology moves. Given today's elevated threat environment, businesses can no longer afford to play a game of chance. They must prepare to play a new game, one that requires advanced levels of skill and strategy to win. In this session, you will gain invaluable insights into information security issues and learn how information security safeguards should be in alignment with the overall business strategy.

Mr. Kok-tin Gan
Senior Manager
PwC China / Hong Kong

09.30 - 10.00 Keynote One: Big Security for Big Data

The multitude of devices, users, and generated traffic all combine to create a proliferation of data that is being created with incredible volume, velocity, and variety. As a result, organizations are looking for actionable intelligence to protect, utilize, and gain real-time insight from Big Data. Securing Big Data is safeguarding enterprise reputation. With HP Enterprise Security Platform, organizations can automatically apply event information to their Big Data and security event platforms to gain real-time visibility into the internal and external threat landscape.

HP will present you the solution that broadens the reach of an organization's security monitoring capabilities by bringing real-time intelligence to Big Data.

Mr. Kenneth Yip
HP Security Solution Evangelist, Asia Pacific and Japan
HP

10.00 - 10.30 Keynote Two: APT Threat Defense

Globally, organizations are spending billions of dollars every year on security infrastructure. Yet in the first few months of 2013 alone we have already seen a string of headlines related to high profile breaches of well known companies. How is this happening, and why are traditional defenses failing to stop these attacks? Most importantly what can be done to fix the problem?

FireEye is the leader in stopping today's new breed of cyber attacks, such as zero-day and APT attacks.

Mr. Steve Ledzian
Senior Sales Engineering Manager
FireEye

10.30 - 11.00 Keynote Three: Security from Client to the Cloud - An Architectural Approach for the Infrastructure

Organizations seek a comprehensive security approach to protect their information and resources in new system architectures which can provide sufficient security services from client to the cloud network environment. To effectively manage the new risks, organizations should reevaluate their cloud security practices and implement new network-centric capabilities to ensure the integrity of their services. Mr. Joe Green from Juniper Networks may address the current security challenges that organizations faces with and share with you his experiences and perspectives how to deploy an efficient and effective security strategy from client to the cloud.

Mr. Joe Green
Managing Director, Systems Engineering, Asia Pacific
Juniper Networks
11.00 - 11.15 Morning Networking Coffee Break & Showcase Tour
11.15 - 11.45 Keynote Four: Vulnerability Assessment - A Cost Effective Security Solution

Even during economy down cycle, most organizations still keep or increase the amount in IT security in order to reduce the risk. If looking into the three basic areas (preventive, defensive and responsive), large portion of investment is still in defensive area. The question is the solution is effective to reduce the risk? How can you know?

This presentation will try to show a reverse analysis in IT security strategy. It will bring your attention from defensive to the more cost effective preventive area. You will have more understanding about your environment hence you know what to do in future.

Mr. Michael Lai
Senior Security Sales Engineer, APAC
Rapid 7

11.45 - 12.15 Keynote Five: Essential Secure Network Deployment Ingredients

How secure is your network? Users are asking for any to any communication. Mobility breaks traditional corporate network boundary. With ever increasing BYOD demand, as a network manager, how you enforce access policies and protect your corporate data? What about internal exploits? The speaker is going to share with you experience in deploying a secure and fast corporate network.

Mr. Roger Luk
Senior Manager, Sales Engineering, APJ.
Dell SonicWALL

12.15 - 13.05 Panel Discussion One: Big Data - Opportunity or Vulnerability?

Nothing gets the security industry in a frenzy like a good buzzword, and Big Data currently tops the list. There are numerous concerns to address in big-data security. These include several stages of advanced threats, protecting data beyond perimeters in mobile and social environments and using containment defenses to discern malicious attacks from legitimate activities and stop data theft. The secret to keeping your data secure is the threat model most relevant for properly protecting big data: how do you decide in real-time which network activities are malicious, given that they are often far outnumbered by legitimate activities?

In this panel discussion, the moderator and the panelists will examine what makes them successful and focus on the necessary analytics to combat them.

Session discovery topics:

  • A working understanding of Big Data security
  • Several stages of an advanced attack
  • Ways to apply this threat model to protect your Big Data
Panel Chair:
Mr. Kenneth Wong, Partner, National Technology Risk & Security Practice Leader, PwC China / Hong Kong

Executive Panelists:
Mr. Al Demeter, Regional Executive Director, Citigroup Security & Investigative Services, Asia/Pacific Region, Citi
Dr. Frank Law, Chief Inspector and Head of Cyber Security, Hong Kong Police Force
Mr. Roger Seshadri, Corporate CIO, SVP, Melco Crown Entertainment
13.05 - 14.05 Executive Networking Luncheon Roundtable
Sponsored by CITIC Telecom International CPC Limited (By Invitation Only)
Topic: Balancing Risk Management & Security Investment

Mr. Freddie Chin
Senior Manager, Security Services
CITIC Telecom International CPC Limited


And

Mr. Jones Leung
Systems Engineering Manager, Greater China
Palo Alto Networks
14.05 - 14.50

Panel Discussion Two: Securely Enabling Mobility and BYOD Across the Enterprise

As the new world of handheld, connected technologies continues to offer increasingly limitless business capabilities, the demand from employees to use their own devices will continue to grow. With the huge increase in mobile applications and people's desire to always do more, how do CISOs stay ahead of the consumerization of IT and maintain security across the enterprise?

In this panel discussion, the moderator and the panelists will provide an actionable best practices to securing mobile devices, developing BYOD policy frameworks and the crucial importance of cultivating security awareness while implementing mobility and BYOD programs within their organizations.

Panel Chair:
Mr. Peter Koo, Partner, Enterprise Risk Services, National Security, Privacy & Resiliency Leader, Deloitte Touche Tohmatsu, Greater China Region

Executive Panelists:
Mr. SH Lim, Head of Information Security, Hong Kong Jockey Club
Mr. Steve Logan, Director of IT & Services, Ball Asia Pacific
Mr. Dennis Lee, Executive Director, Nomura International (Hong Kong)
Mr. Daniel Cheung, Head of IT Security, Daiwa Capital Markets
Mr. Rajagopal Gampa, Corporate Director of IT, New World Hospitality


14.50 - 15.20 Keynote Six: Server, App, Disk, Switch, or OS - Where Is My Encryption?

This session will illustrate how to identify the most cost effective location and understand how that meets the needs of the organization while introducing as little operational management overhead as possible. Attendees will be able to understand the threats against their critical data, how to detect vulnerabilities in their current infrastructures, and how to use multiple technologies to address those vulnerabilities.

Mr. Ng Sheung Chi
Security Consulting Manager, APAC
SafeNet

15.20 - 15.50 Keynote Seven: Getting to Know Unknown Threats

Over the past years, exploits become more and more sophisticated and targeted (sometimes termed as Advanced Persistent Threat (APT)), which makes traditional individual security component unable to protect enterprise assets. Join this session to learn how the new approach can cover the whole threat cycle from all aspects - from applications, users, contents, standard vulnerabilities to unknown threats.

Mr. Jones Leung
Systems Engineering Manager, Greater China
Palo Alto Networks

15.50 - 16.20 Keynote Eight: User Key Auditing and Remediation in Encrypted Environments

SSH Communications Security, the inventor of the SSH protocol, will discuss user authentication key remediation, key lifecycle management and key policy enforcement. Most organisations are exposed to risk without managing, removing and cycling access-granting keys, violating SOX, PCI-DSS, ISO27001 and other compliance requirements. This session will provide real case examples and demonstrate approaches to user key management for ensuring regulatory compliance and audit capability over privileged user activities, as well as providing visibility, control, alerts, intrusion detection and data loss prevention for encrypted external user access (e.g. contractors, outsourced IT, maintenance providers).

Topics of discussion are:

1) Current state of encrypted network connections
2) Real world example - A Global Top 5 Bank managing 1.5 million keys
3) Best practices for key remediation
4) Overview of encrypted channel auditing
5) Approaches to resolving enterprise challenges

Mr. Ricky Ho
Regional Director, APAC
SSH Communications Security
16.20 - 16.30 Afternoon Networking Coffee Break & Showcase Tour
16.30 - 17.00 Keynote Nine: Layered Defensed Strategy For Today's Security Threats

Security in today's world of BYOD, advanced persistent threats (APT) and cyber-attacks requires a systematic approach to security your organization. Organizations cannot rely solely on point solutions that protect against only one aspect of vulnerabilities to defend against latest attack techniques. In this session, we will discuss how hackers target organizations and the solutions required to defend against these new threats.

Mr. Oliver Wai
Product Marketing Manager
Barracuda Networks

17.00 - 17.30

Panel Discussion Three: Strategy Into Action - Road Maps to Secure the Enterprise

In this panel discussion, the moderator and the panelists will discuss how enterprise success depends on security and risk management, making it necessary for security leaders to define multiyear strategic road maps and simultaneously drive tactical operations that respond effectively and efficiently to changing business needs and rapidly evolving threats. The panel discussion will also explore what it means to translate strategy into action through a strategic road map that drives business success.

Panel Chair:
Mr. WT Cheah, Director, Risk Advisory Services, RSM Nelson Wheeler

Executive Panelists:
Mr. Lewis Tam, Head of Information Security, Ping An Insurance (Group) Company of China
Mr. Gerrit Bahlman, Director of IT, The Hong Kong Polytechnic University
Mr. Christophe Gabioud, APAC Information Security Officer, Operational Risk Control, UBS

17.30 Closing Remarks
*Topic is subject to change without prior notice
 
 

© 2013 Market Intelligence Group Limited All rights reserved