![]() |
||||
Home | Agenda | Speakers | Past Events | Registration |
For printable agenda, please click here | ||||
Time | Agenda | |||
08:15 - 09:00 | Registration | |||
08:50 – 09:00 | Opening Remarks
Victor Lam, JP |
|||
09:00 – 09:30 | Opening Keynote: Cyber Risk in a Digital World
Digitization is dramatically changing how organizations work, leading to increasing cyber risk concerns as it opens up the enterprise. Managing these inappropriately can either slow down business innovation or leave critical risks unaddressed. This session will share the core beliefs and key imperatives for handling cyber risk in the digital world, resulting in a resilient cybersecurity operating model and new ways of working for the digital enterprise. |
|||
09:30 – 10:00 | Keynote 1: Innovative Approach to Protect Against Advanced Persistent Threats (APTs)
As high-profile targeted attacks expand and evolve, enterprises and government departments must guard against complex, often invisible threats. A protection that goes beyond the limitations of standard defenses to detect and analyze attacks in real-time, actively prevents network intrusion and contains threats will help organisations achieve a new level of defense against advanced threats. In this session HP will join Trend Micro to introduce an innovative approach to defeat targeted attacks.
|
|||
10:00 – 10:30 | Keynote 2: It’s When, Not If.
1 Billion Data Records Stolen in 2014 |
|||
10:30 – 11:00 | Keynote 3: Highway to Hell or Stairway to Heaven? The privileged pathway of targeted attacks
Targeted attacks are the most emphasized growing cyber threat to organizations in recent years, and in the foreseeable future. Organizations that once relied on perimeter defenses understand that when targeted, their perimeter will not withstand the attack. Mitigation focus should shift to inside the network, so as to |
|||
11:00 – 11:15 | Morning Networking Coffee Break | |||
11:15 – 11:45 | Keynote 4: Remove the Fear Factor – Risk Assessment for Cloud
In a post-Snowden world, decision makers are facing the challenge to balance the risks and rewards of using cloud solution. |
|||
11:45 – 12:15 | Keynote 5: The Hunted becomes the Hunter - Combating Cyber Attacks Through Advanced Analytics, Intelligence & 24/7 Monitoring
Targeted attacks and advanced malware continue to create untenable cyber risk for even the best security teams. In this session, the speaker will take a data-driven look at the science behind this problem and talks real world techniques to advance the ball in incident detection and discuss how to go on the offensive and get farther back in the kill chain, leveraging applied intelligence and analytics concepts, 7x24 ISSS Security Devices Monitoring/SIEM via SOC used in the defense of the world’s largest wholly-owned facilities based network.
|
|||
12:15 - 13:05 | Panel Discussion One: Changing Security Strategy to Combat Today’s Sophisticated Threats
Panel Chair Geoff McClelland, Program Director, CIO Connect HK Executive Panelists Yann Chatreau, Head of IT & Risk Management, Asia Pacific, Allen & Overy Steve Ledzian, Systems Engineering Director – South Asia, Hong Kong & Taiwan, FireEye Steve Ledzian, Systems Engineering Director – South Asia, Hong Kong & Taiwan, FireEye Dominic Polisano, Vice President, Information Security and Business Continuity, Hong Kong Exchanges and Clearing Christoph Ganswindt, Executive Director, Information Technology & Sustainability, The Hong Kong Jockey Club Simon Hildenbrand, Director, Information Security Risk Management Specialist, UBS |
|||
13:05 - 14:05 | Lunch Break | |||
14:05 – 14:50 | Panel Discussion Two: Encryption and Access Control for Cloud and Big Data Environments
Panel Chair Kenneth Wong, Partner, PwC Executive Panelists Fuller Yu, Head of Technology Risk, AIA Anna Gamvros, Partner, IT/Communications & Commercial, Baker & McKenzie Epsilon Ip, Vice President & Head of Security Architecture, Hong Kong Exchanges and Clearing |
|||
14:50 – 15:20 | Keynote 6: Know Your Enemy
In today’s world, the reality is that a determined adversary can always get in. |
|||
15:20 – 15:50 | Keynote 7: APTs and me (or you)
Targeted attacks have now become an established part of the threat landscape. Such attacks can be highly complex and may make use of very sophisticated techniques to infiltrate an organisation and steal sensitive data. Nevertheless, many attacks start by 'hacking the human', i.e. by tricking employees into disclosing information that can be used to gain access to corporate resources. This presentation will look at APT trends, consider the human aspect of APTs and suggest some ways we can defend against them. |
|||
15:50 – 16:20 | Keynote 8: User-Based Threats: Identifying Activities and Intent
Are you monitoring your fastest growing threat? Identifying who or what is driving a data breach is crucial for successful remediation and recovery at multiple levels. Most companies focus on traditional infrastructure-based security prevention solutions designed to keep unauthorized users out. Unfortunately, today 76 percent of all breaches stem from user-based threats that involve validated account information that has either been stolen or misused. Because most companies have little visibility into what happens inside their systems, this type of security breach often goes undetected for months. |
|||
16:20 – 16:30 | Afternoon Networking Coffee Break | |||
16:30 – 17:00 | Closing Keynote: Cyber Security Compliance - the Asia Perspective
|
|||
17:00 | End of Conference | |||
Agenda is subject to change without prior notice |
© 2015 Market Intelligence Group Limited All rights reserved |