With the surge in high-profile ransomware attacks, combined with problems caused by digitalisation and remote working, cyber peril becomes the biggest concern for businesses across the globe, according to Allianz Risk Barometer 2022. The commercialisation of cybercrime makes it easier to exploit vulnerabilities on a massive scale – apart from the growth in the use of “double extortion”, attackers also attempt to encrypt or delete backups, harass employees to gain access to systems, or even go directly to senior executives to demand ransoms. Specific industries that dealt with personal data are no longer the only targets, cyberattacks these days are indiscriminate, affecting businesses and organisations of all sizes across all sectors.
This track will provide expert insights on what matters most in the cybersecurity landscape now and get you prepared for what’s ahead.
• Infrastructure Protection Strategies
• Cybersecurity Decentralisation
• AI in cybersecurity
• Insider Threats – Workplace Disinformation
• Identity Fabrics
• Seamless Access Experience
• Cyber Insurance
• Zero Trust
• Multi-Factor, Passwordless, Frictionless
• Secure Access Service Edge (SASE)
• Cyber Resilience
• Privacy & Consent
• Anti-Fraud
• DevSecOps & Software Integrity
• Hackers & Threats
• Human Element
Our Speakers
Cities like Hong Kong are rapidly evolving, driven by governments, talents in the cities and more and more importantly, technology. Where does the future of Hong Kong as a global city look like in the future? How will technology and innovation reshape the way Hong Kong is structured? Joining us with the insightful dialogue about our paveway to revive Hong Kong with energy, technology and future-proof city map. Security matters. When businesses are turning digital-first in every aspect of their operations, securing these systems at the earliest phase of the development cycle, resulting to the rise of the latest buzzword, DevSecOps. On top of testing code and looking for vulnerabilities early in the development process, the shift-left movement is extended to the heart of the systems, including applying zero trust principals in applications and exploring confidential computing by encrypting data in use in memory. This panel will explore different aspect of the shift-left movement and its impact in the culture dynamics of the entire IT operation. As the old outsourcing model is outdated, it is time for a new paradigm. In this session, we will look into the risks of not adopting a Managed Services model and how it can help improve and accelerate your business operations. We will also discuss how much time CIOs, CTOs, and IT leaders spend on recruiting top talent. Veeam recently published the results of the largest independent research project in the data protection industry, from 3,393 unbiased organizations across 28 countries. One of the key findings in that research revealed that only 24% were not attacked by ransomware. Undoubtedly, ransomware attacks are one the rise. Having a data backup is only the first step to protect your digital enterprise. In this section, Chris will share the best practises of data protection against ransomware attack, as well as some useful tips if you have used public clouds in your environment. The shift to Security Service Edge (SASE) as the security architecture of choice together with the adoption of Zero Trust, continues to gain momentum amongst organizations across the globe. As Office 365 adoption grows, AD security has never been more critical. Many businesses are running a hybrid AD environment with on-premises AD providing authentication and authorization services. That means, if AD isn’t properly secured, Office 365 won’t be either. The pandemic has accelerated the digital transformation of enterprises to meet with the changing needs of the employees, the customers and the stakeholders. Enterprises are migrating workloads to hybrid clouds and multi-clouds which require enhanced connections to the cloud service providers to access their applications. Enterprises are moving applications from on-prem to SaaS to reduce cost, improve scalability and reliability in which application performance is based on the internet connection. Enterprises are moving into hybrid work environments which require a distributed approach to secure remote access from the employees. Enterprises are responding to growing cyber-security threats with increased reliance on internet to access applications and remote employees working anywhere. By adopting SD WAN and SASE, enterprises can modernize the networks to enable better application performance, enhance user experience and increase security. Cyber Resilient is becoming a more important consideration for business to minimize potential operational impact by ransomware attacks. Dell PowerProtect Cyber Recovery provides a proven and effective approach for business to achieve a mature level of cyber resilient readiness. We shall explore in details ransomware attacks from a business continuity perspective as a more effective approach. You probably have heard of Blockchain, NFT, smart contract, Web3…but do you really understand them? What are the difference between Web2 and Web3? Chris Chan, Head of Cybersecurity Research of UD, will share everything you need to know about Web3 with a focus on the security aspect. What are the common web3 security concerns? What security measures should you adopt? Join Chris to find out more. According to Radware’s research, 70% of production applications now run in the public cloud. This means that increasingly, ‘cloud’ security is becoming synonymous with cyber security. The issue of identity and access management in the public cloud is now becoming a big concern. Join Radware to learn more about today’s evolving and dynamic threats and some of the best practices to securing cloud environments. Headline breaches, ransomware and even common hacks all routinely exploit well-known attack paths. By identifying, understanding and disrupting these attack paths before exploitation, you greatly reduce the probability of a breach. Join us to learn how Tenable will enable your security team to preemptively focus response ahead of attacks through our combined attack path analysis and prioritization capabilities. Multi-Cloud Data Services, enables customers to connect file, block and object storage consumed as a service, directly to the public cloud or multiple clouds of their choice (VMC on AWS, AWS, Azure, GCP) for Disaster Recovery as well as many multi-cloud use cases such as analytics, test/dev, or to support specific use cases in select vertical markets where compute intensive file workloads require high throughput and low latency. This is done through a high-speed, low latency connection from Dell storage at a managed service provider to the cloud(s). Organizations gain an on demand, cloud consumption model for both compute workloads and storage, compliance, sovereignty and the high performance, up to 6-9s availability, and scalability of Dell storage. Moving to Cloud bring along new challenges for cybersecurity, and on the other hand Cloud-assist bringing greater capability to cybersecurity solutions. How to chose the perfect mix and create the ideal secured Hybrid environment for your organization? What are the main factors to consider to build a effective defence against new cyber-attacks – with and without, public or private cloud? With the rise of mobile devices, cloud computing, and digital services, we are seeing a massive shift in how we work. This change creates a new normal characterized by a combination of physical offices and remote workers. In this session, we will dive into workforce mobility, security concerns, resource allocation and cost efficiencies. Today’s ransomware attacks have become more impactful because of their growing industrialization through the Ransomware-as-a-Service (RaaS) affiliate model and the increasing trend of double extortion. Join this session to hear from our Security expert's sharing on our observations on the prevalent threat and prime example like BlackCat Ransomware and learn how to leverage the latest threat intelligence innovations to protect your organization from today's attacks - and be prepared for tomorrow's. The cloud has changed the game for everyone. Nearly 70% of organizations host more than half their workloads in the cloud today - up from just 31% in 2020 - and yet, research found 50% of organizations indicate a lack of internal knowledge about cloud-native security. The longer it’s ignored, the greater the risk. Let's find out how we can confidently steer clear of them. In building over 100+ products and ventures in IoT, robotics, consumer electronics and even aerospace, learn how you can create prototypes and products that are: Extended Security Posture Management is a comprehensive approach to security validation and optimization. It maps security gaps, the attack surface, and infiltration routes, providing a holistic view for those willing to shore their defenses up. Join this presentation to learn how can any security team leverage this technology to customize, scale, and automate the day-to-day security practices. Roll out a threat-informed program to eventually maximize operational efficiency, minimize risk exposure, and measure and communicate success to leadership. With XSPM, each team can reach its goal, whether it is better prevention, better detection and incident response, or even better adversarial skills. We knew security could be different. Fast enough to keep up with dynamic threats. Intelligent enough to learn from them. Constantly evolving to keep the upper hand. We are Trellix. A global company redefining the future of cybersecurity. Trellix brings you a living XDR architecture that adapts at the speed of threat actors and delivers advanced cyber threat intelligence. We’re changing what security means and what it can do, giving everyone in your organization the confidence that comes with being more secure, every day. Living security starts here. An overview of Trellix as a newly formed company, our mission, and the gaps that we address in the market. This session will focus on Trellix’s XDR portfolio and its key use cases. Programme
Driven by network modernization and digital transformation projects, SSE and Zero Trust have become highly sought-after approaches to deliver agility and flexibility while increasing the security and protection of staff and critical business data, no matter where they reside. Are you ready to adopt these approaches? Are you prepared to make the change?
In this session, we’ll share insights into key network and security transformation considerations to prepare your network and business for SSE and Zero Trust. We’ll also offer valuable resources to take away and allow time for a Q&A session at the end, so have your questions ready for me on the day!
Quest | One Identity solutions for hybrid AD security enable you to take control of your hybrid AD infrastructure and improve your security posture both on premises and in the cloud that helps you: 1) Understand who has access to what resources; 2) Know when suspicious activities occur; 3) Remediate unauthorized actions immediately; 4) Recover from security incidents.
• Faster than the usual 12 to 18 months most agencies propose,
• Better than most experienced founders and teams (even with poor tech skills), and
• Cheaper than what consulting and engineering firms or industrial partners would recommend.
We are committed to protecting your privacy. We will never collect information about you without your explicit consent.
Register your interest and we will make sure you receive the latest information about the industry, our events and exclusive offers!
We are committed to protecting your privacy. We will never collect information about you without your explicit consent.
We are committed to protecting your privacy. We will never collect information about you without your explicit consent.
We are committed to protecting your privacy. We will never collect information about you without your explicit consent.
We are committed to protecting your privacy. We will never collect information about you without your explicit consent.
Matthew Wong is Senior Security Cloud Solution Architect in Microsoft with more than 20 years of Cyber Security experience, he has been in Regional Technical Consultant role cover APAC regions. He worked as pre-sales, product management, customer success roles in several listed security companies and involved in many regional sizable network / security projects. Matthew holds more than 40 IT certificates from ICS2, Microsoft, AWS, FireEye, Cisco, Juniper, Websense, Bluecoat, Ciphertrust, Packeteer, and Allied Telesis. He holds a Master degree of Philosophy (M. Phil) from Hong Kong Polytechnic University researched on Network QoS/Routing Algorithm with released Journal papers. He also gained his Bachelor of Electrical and Electronic Engineering at the University of Auckland during his 6-year stay in New Zealand.
Felix Cheng is the Systems Engineering Manager of Palo Alto Networks Hong Kong and Macau. When he joined the company, he focused on helping customers to secure their cloud environments , containers environments and software supply chains. In his previous roles, he designed and deployed mission critical infrastructure for service providers, airports and casinos.
Chris Chan, the Head of Cyber Security Research of UD, has been a professional bug hunter for over 10 years. His expertise lies in web application security, penetration test and malware analysis, with earned certifications including Common Vulnerabilities and Exposures (CVEs) and Offensive Security Certified Expert (OSWP, OSCP, OSCE, OSWE, OSEE). He has reported vulnerabilities to tech companies including ASUS, Yahoo, eBay and Apple, and contributed to the malware analysis for a Hong Kong Threat Intelligence Sharing Platform.
Sheila Lam was a seasoned journalist covering the enterprise IT market for 20 years. She has extended her journalistic experience into the content marketing arena and started Ignite Content Marketing. Formerly Editor-in-Chief of Computerworld Hong Kong—a publication with more than 30 years of history in Hong Kong— Sheila witnessed and covered the emergence, development and maturity of different technologies. Through telling these stories, she has built knowledge across a wide variety of IT topics including data science, agile architecture, cloud computing, digital transformation and cybersecurity. She was also previously an industry analyst with IT research firm IDC Asia/Pacific, covering the regional enterprise software and SaaS market. Riding on her storytelling skills and technical knowledge, Sheila develops content marketing strategies and offers research services to many technology providers. She is also a recognized conference moderator and producer, hosting and producing events of various sizes from roundtables to seminars and conferences.
Zane Lim is the Regional Director, APAC at Cymulate with more than 9 years of experience in the IT industry. He leads Cymulate beyond Singapore into regional countries, by working with enterprises, governments and other industry experts. Zane consistently engages with CIOs, CISOs and CSOs in APAC to understand the challenges of securing modern hybrid environments and empowers their businesses through effective cybersecurity strategies. A firm advocate of reframing mindsets, Zane enjoys helping executives navigate through the fog and prioritise the needs of their organization. Prior to Cymulate, Zane held positions focused on regional growth covering APAC with SolarWinds, MWR Infosecurity (now WithSecure) and others.
Eric possesses over 20 years’ experience in cybersecurity and have been invited to give speech in various public and industry events. As general manager of Lapcom, the sole distributor of Kaspersky, he oversees the vendor's marketing to post-sales support and has successfully placed the brand at a leading position in Hong Kong cybersecurity solution market. Eric has gained extensive first-hand experience from delivering security consultation and support to clients from different sectors.
Chris has over 10 years of experience in IT infrastructure consulting roles in the technology industry. He has extensive experiences in architecting complex IT infrastructure environment and developing business continuity and disaster recovery plans for different enterprises. Prior to Veeam, he served as Senior Systems Engineer for Nutanix and Solution Architect in Hewlett Packard Enterprise. Chris received his bachelor degree in engineering from The Chinese University of Hong Kong.
Angus Yuen has over 10 years of experience in providing cyber security consultation service in Greater China region. His focus areas including SASE, data privacy, IT GRC, IT infrastructure security, etc. Prior to Forcepoint, he has worked in several multi-national corporations, including EY, Dell EMC, HSBC, etc.
Daby Cheng is the Senior Solution Architect at Quest Software Hong Kong Limited. He received a Bachelor’s Degree of Arts with Honors. He has been active and specialize in the networking and cybersecurity solutions for over 10 years. Daby has been certified as Certified Information System Security Professional and certified various cybersecurity products.
Disney Cheng is Tenable’s Principal Security Engineer for the Asia Pacific Region. He evangelizes the criticality of Cyber Exposure, the importance of vulnerability assessment and how to move ahead to vulnerability management. Disney also helps different organizations to address fundamental needs of Cyber Security – inventory assets, identify vulnerabilities, and devices’ configuration as we as Active Directory Security. And ultimately organizations can enhance security posture by automating the process, analyzing the outcome and adjusting their security planning and policy accordingly. Disney has more than 20 years of experience in the information technology industry, with expertise in information security. He has led and participated in a wide array of IT security projects and solutions such as remote penetration tests, security assessments, network security and content security solutions across various counties in APAC, including Hong Kong, Singapore, China, Taiwan, Japan and Australia.
Currently working as sales engineer of Radware Hong Kong, Li Yang has more than 20 years of experience in network and security infrastructure architect helping various vendors and service providers, like Cisco, China Mobile and Verizon.
Kok-Tin is a Partner in PwC’s Cyber Security & Privacy practice with over 17 years of experience. Kok Tin is also the founder of PwC’s Darklab, Hackaday and Hackbot. Kok Tin is currently the Vice Chairman of ITSMf HK Chapter and the member of security committee of Fintech Association of HK. Kok-Tin’s key areas of expertise and experience include Cyber security strategy, framework, IT security framework (ISO27001, NIST, Multi Level Protection), application security (OWASP, OWASP Mobile) and data security (e.g., PCI DSS), secure development life cycle, DevSecOps, Cloud security, IT risk, security / technology architecture and white hat hacking. Kok-Tin has co-authored a number of cyber security and technology risk related guidelines for the Regulators in the Asia Pacific Region. Kok-Tin has led ~300 small to large size of security assessment / transformation engagements and has worked across different continents including, Asia, America, Europe and Africa. Kok Tin is a TED talk speaker and he also founded a dot.com company during his early days of his career.
With 14 years of experience in IT and Security world, Varun is passionate towards raising awareness about the field. Varun currently heads the Cyber Security division for Tricor Group. His past experiences in roles with large SI's as well as in-house, from being a very hands-on tech to a thought leader, have and continue to help him deliver bespoke end-to-end quality information/cybersecurity and infrastructure solutions/processes and effectively manage diverse teams for large and complex environments. Varun's experience spanning across various industries (Telecom, Logistics, Luxury Retail, Finance etc.), geographies (India, Australia, UK & Hong Kong) & cultures enable him to be an effective communicator at all levels of an organisation.
John is a seasoned business development professional with a robust track record of over 15 years in providing consultative solutions to a diverse array of multinational organizations across several continents. Beginning his career in London, John spent 4 years working in Sydney before moving to Hong Kong in 2007 where he has since built up a comprehensive understanding of the Asia-Pacific business landscape. At ITCS Group, his focus is on communicating and delivering technology solutions that have a real, tangible benefit to clients. As businesses continue to evolve at an unprecedented pace, John’s priority is to leverage the group’s expertise to enable clients to concentrate on their core business objectives.
Dr. Peter Wong is the Chief Technology Officer of Prenetics. Since he joined in 2017, Dr. Wong has been leading Prenetics’ global technology vision and roadmap, and engineering delivery. Prior to Prenetics, Dr. Wong was the Head of Engineering at Travelex, where he led Travelex’s first digital transformation and B2B business. Dr. Wong also successfully delivered a brand new international money transfer service, Travelex Wire, and launched Travelex’s first international payment platform with the World Bank Group. Dr. Wong has experience across various industries including investment banking and eCommerce; and is a frequent speaker at technology events including AWS Summit and various universities. Dr. Wong holds a Doctorate degree in Computer Science from the University of Oxford, and B.Sc. and M.Sc. degrees in Computer Science from the University of Warwick.
Patrick is Dell Technologies Advisory System Engineer on Data Protection Solution with more than 20+ years of industrial experience. His specialized on various generation of data protection technologies and is passionate in engaging with customers on latest cutting-edge data protection technologies for productivity and efficiency improvements.
CEO, Ksapersky Lab
Nir Zuk brings a wealth of network security expertise and industry experience to Palo Alto Networks. Prior to co-founding Palo Alto Networks, Zuk was CTO at NetScreen Technologies, which was acquired by Juniper Networks in 2004. Prior to NetScreen, Zuk was co-founder and CTO at OneSecure, a pioneer in intrusion prevention and detection appliances. Zuk was also a principal engineer at Check Point Software Technologies, and was one of the developers of stateful inspection technology.