Owned and Organized By
|
Home | Agenda | Speakers | Past Events | Registration |
For printable agenda, please click here | |
Time | Agenda |
08.15 - 08.50 | Registration |
08.50 - 09.00 | Opening Remarks
Ir. Daniel Lai, BBS, JP |
09.00 - 09.30 | Opening Keynote: Changing The Game - Adopting A New Cyber Philosophy
Information security has always been a high stakes game, one that demands a smart strategy, the right technology, and an unblinking focus on adversaries. Today, however, both the game and the opponents have changed. To win, businesses must play by new rules and bring advanced skills and strategy to the table. In this presentation, the speaker will share key findings from The Global State of Information Security Survey 2014 and discuss a new Cyber Security Philosophy that companies should adopt to stay ahead of Cyber Threats in this information age.
|
09.30 - 10.00 | Keynote 1: What Is A Secure Cloud?
Security represents one of the biggest challenges for the Industry every year and is often a main concern with the adoption of Cloud technologies. This session will share insight to considerations of what constitutes a secure Cloud, in which to help consumers make informed decisions regarding their Cloud vendors.
|
10.00 - 10.30 | Keynote 2: Data Center Security: Beyond Traditional Protection.
Mr. C.K. Lam |
10.30 - 11.00 | Keynote 3: Using Big Data Analytics To Improve Security And Compliance
Many heads of Security Services struggled with an underperforming traditional SIEM to keep the organization both secure and compliant. Learn how Splunk turned to a big data analytical approach to SIEM to more effectively perform incident investigations, uncover known and unknown threats, and create the reports and evidence required by auditors.
|
11.00 - 11.15 | Morning Networking Coffee Break and Showcase Tour |
11.15 - 11.45 | Keynote 4: Best Practices To Combat The Advanced Persistent Threat
The typical advanced attacker operates undetected for 243 days in a victim's network. When they are discovered, security teams often lack the investigative expertise, adversary intelligence and capabilities to formulate an effective response. Join Justin Harvey, Chief Solution Strategist at FireEye as he examines effective strategies to respond to computer security incidents using the latest case study illustrations.
|
11.45 - 12.15 | Keynote 5: Innovative Approach To Protect Against Advanced Persistent Threats (APTs)
As high-profile targeted attacks expand and evolve, enterprises and government departments must guard against complex, often invisible threats. A protection that goes beyond the limitations of standard defenses to detect and analyze attacks in real-time, actively prevents network intrusion and contains threats will help organisations achieve a new level of defense against advanced threats. In this session HP will join Trend Micro to introduce an innovative approach to defeat targeted attacks.
|
12.15 - 13.05 | Panel Discussion One: Maintaining Privacy And Security In The Cloud
Panel Chair: |
13.05 - 14.05 | Executive Networking Luncheon Roundtable (By Invitation Only) Sponsored by CheckPoint & Dimension Data Topic: Today's Security For Tomorrow's Threats Mr. Allan Wong Director, Professional Services Dimension Data |
14.05 - 14.50 | Panel Discussion Two: Managing The Evolving World Of Mobility
Panel Chair: |
14.50 - 15.20 | Keynote 6: Intelligent Cybersecurity For The Real World
To truly protect against all possible attack vectors, IT professionals must accept the nature of modern networked environments and devices and start defending them by thinking like defenders responsible for securing their infrastructure. Critical to accomplishing this is first understanding the modern threat landscape and how a threat-centric approach to security can increase the effectiveness of threat prevention. The session will begin with a detailed review of the most common threats, as well as an overview of how both open source technologies such as Snort and ClamAV play a role in protecting enterprise environments. Enterprise security administrators and architects, CISOs and even CIOs will also benefit from learning about advanced malware protection and network security platform approaches that protect their environments across the attack continuum - before, during and after an attack.
|
15.20 - 15.50 | Keynote 7: Data Center Security - The Third Pillar Of Enterprise Security
The threat landscape has changed dramatically in the past decade, from pranksters to extremely sophisticated operations. Yet security spending is not keeping pace with today's modern threats. While endpoint and network security solutions are the first and second pillars of enterprise security, you cannot conduct business safely without the third pillar - data center security. This session will introduce Imperva SecureSphere comprehensive, integrated security solutions for the data service, enabling your organization to safely realize the benefits of the hyper-connected world.
|
15.50 - 16.20 | Keynote 8: Future Shock: How Distributed Enterprises Should Completely Rethink Security
No single change in enterprise computing will have a greater impact on end-user security than the rapid dissolution of the enterprise perimeter. Users are increasingly working in very distributed environment which is built up by a lot of small branch offices and laptop globally. Despite this fact, the majority of enterprises continue to employ traditional security solutions that rely on appliances or host based software - solutions that cannot consistently outside the corporate network. Enterprises need to completely rethink their approach to end user security in this new paradigm.
|
16.20 - 16.30 | Afternoon Networking Coffee Break and Showcase Tour |
16.30 - 17.00 | Keynote 9: Compliance Does Not Equal Security
Recent breaches like the ones at Target and South Korean banks have proven that simply passing a PCI audit doesn't mean customer data cannot be compromised. Being compliant is important, but it's not enough to mitigate probable attacks and protect critical information. Organizations need to focus on securing the business first, then documenting the process to prove compliance, not the other way around.
In order for organizations to move from a compliance-focused to a risk-focused security program, they need to think like an attacker (not an auditor) and understand the threat landscape. |
17.00 - 17.30 | Panel Discussion Three: Formulating A Comprehensive IT Risk Management Strategic Road Maps For 2014 And Beyond
Panel Chair: |
17.30 | End of Conference |
*Topic is subject to change without prior notice |
© 2014 Market Intelligence Group Limited All rights reserved. |