Owned and Organized By

Home Agenda Speakers The 4th InfoSecurity Summit 2012 - Hong Kong Registration
For printable agenda, please click here
Time Agenda
09.00 - 09.30 Registration
09.30 - 10.30 Opening Keynote: Collective Defence: A Community Approach to Cyberspace

In today's dynamic environment and a connected landscape, people's data usage behaviour has changed significantly from desktop to mobile as well as moving data and information into the Cloud. The need for secure, private, and reliable services is growing from a technological concern within the industry to a societal concern for citizens around the world. The President of (ISC)² Singapore Chapter, Mr Alan Seow, will discuss how industry professionals can align the social, economic, political and technical concerns in the cyberspace towards a more secured platform.


Mr. Alan Seow
President, CISSP, CRISC
(ISC)² Singapore Chapter

10.30 - 11.00 Keynote One: 2013 Security Trends: Findings from our 3D Security Analysis

The Internet has dramatically changed and today, we use the Internet for almost everything ¡V personal and business. The Internet consists today of more than 700 million web sites and over 99 million types of malware. As technology evolves, so do the security challenges. This session will provide an insight into the cyber security events that occurred in organizations worldwide, shed light on the security risks organizations are exposed to on a daily basis and recommended actions to protect your network.


Mr. Clement Lee
Security Consultant
Check Point Software Technologies Ltd, South Asia

11.00 - 11.30 Keynote Two: New Model of Security: Before, During & After an Attack

The problem is simple: threats. On the network, in the endpoints, entering via malware, targeted attacks, BYOD, cloud-based applications and an increasing number of other new vectors. The industrialisation of hacking means that whole industries are being targeted, not just lone institutions, and it also means that the rewards are ever greater for hackers. Traditional defences are not enough and a desire to block all attacks is unrealistic. Before an attack, you should know what you are defending and have access controls in place; during an attack you must have the best threat detection and blocking capabilities; after an attack, you should be able to remediate and resume normal operations. We believe that the best approach to security is to address the entire attack continuum in a way that will create as secure an environment before, during and after an attack.


Mr. Ben Munroe
Director of Marketing Asia Pacific
Sourcefire
11.30 - 11.50 Morning Networking Coffee Break
11.50 - 12.20 Keynote Three: Data Protection in the Cloud with Encryption - Are There Alternatives ?


Mr. Khadir Fayaz
Director - Information Security, APAC
Carlson Wagonlit Travel

12.20 - 13.10 Panel Discussion One: Big Data - Opportunity or Vulnerability?

With great power of data comes great responsibility to Security Leaders. A Big Data initiative should not only focus on the volume or variety of the data, but also on the best possible way to protect it.

Around every corner in the online world there is always threat lurking in the shadows. It is vitally important to implement security controls to managing Big Data. CISOs must keep a bird's eyes on the system using actionable intelligence to deter any malicious activities, emerging threats and vulnerabilities.

In this session, the moderator and panelists will share their strategies and tactics to combat data theft.

Session discovery topics:
  • Understanding the Threat Landscape of Managing Big Data
  • Balancing Enterprise Risk & Business Innovation
  • Winning Strategies for Protecting your Big Data
Panel Chair:
Mr. Thio Tse Gan, Executive Director, Risk Consulting, Deloitte & Touche Enterprise Risk Services

Executive Panelists:
Mr. Winston Chew, Global Head of Application Security, Global Information Security & Technology Risk (GISTR), Barclays Capital
Ms. Miao Song, Group Chief Information Officer, Golden Agri-Resources
Mr. K L Teh, CIO, Great Eastern Life Assurance
Mr. Ramesh Narayanaswamy, CIO, Singapore Post Limited
13.10 - 14.15 Executive Networking Luncheon Roundtables
(By Invitation Only)
14.15 - 15.00 Panel Discussion Two: Securely Enabling Mobility and BYOD Across the Enterprise

Welcome to the Age of Mobile Devices! Smartphones and tablets have irreversibly changed our lives in terms of communication; meanwhile, they offer boundless business capabilities. With the huge increase in mobile applications and people's desire to always do more, how do CISOs stay ahead of the consumerization of IT and maintain security across the enterprise?

In this panel discussion, the moderator and panelists will look at some sound practices to securing mobile devices. We will also look at issues about BYOD policy frameworks and the crucial importance of cultivating security awareness while implementing mobility and BYOD programs within organizations.

Session discovery topics:
  • What are the Potential Risks associated with Mobility?
  • Sound Practices to Securely Enabling Mobility and BYOD Across the Enterprise
  • Lessons learnt and Strategies moving forward
Panel Chair:
Mr. Thio Tse Gan, Executive Director, Risk Consulting, Deloitte & Touche Enterprise Risk Services

Executive Panelists:
Mr. Charan Singh, SVP, Group Information Security Officer, Global Product Development, Citi
Mr. Khadir Fayaz, Director - Information Security, APAC, Carlson Wagonlit Travel
Mr. Manish Madan, CIO, Knowledge Universe
Mr. Joseph Teoh, Regional Head, IT, Supply Chain & Logistics, ZF Asia Pacific Pte Ltd
15.00 - 15.45 Afternoon Networking Coffee Break and Closing Remarks
*Topic is subject to change without prior notice
 
 

© 2013 Market Intelligence Group Limited All rights reserved