CYBER SECURITY


Conference Track
Date 24 Aug 2022 - 25 Aug 2022
Time 09:30 - 17:30 
Asia World Expo  Hong Kong 

With the surge in high-profile ransomware attacks, combined with problems caused by digitalisation and remote working, cyber peril becomes the biggest concern for businesses across the globe, according to Allianz Risk Barometer 2022. The commercialisation of cybercrime makes it easier to exploit vulnerabilities on a massive scale – apart from the growth in the use of “double extortion”, attackers also attempt to encrypt or delete backups, harass employees to gain access to systems, or even go directly to senior executives to demand ransoms. Specific industries that dealt with personal data are no longer the only targets, cyberattacks these days are indiscriminate, affecting businesses and organisations of all sizes across all sectors.

This track will provide expert insights on what matters most in the cybersecurity landscape now and get you prepared for what’s ahead.

•    Infrastructure Protection Strategies
•    Cybersecurity Decentralisation
•    AI in cybersecurity
•    Insider Threats – Workplace Disinformation
•    Identity Fabrics
•    Seamless Access Experience
•    Cyber Insurance
•    Zero Trust
•    Multi-Factor, Passwordless, Frictionless
•    Secure Access Service Edge (SASE)
•    Cyber Resilience
•    Privacy & Consent
•    Anti-Fraud
•    DevSecOps & Software Integrity
•    Hackers & Threats
•    Human Element
 

Programme

Cities like Hong Kong are rapidly evolving, driven by governments, talents in the cities and more and more importantly, technology. Where does the future of Hong Kong as a global city look like in the future? How will technology and innovation reshape the way Hong Kong is structured? Joining us with the insightful dialogue about our paveway to revive Hong Kong with energy, technology and future-proof city map.

Security matters. When businesses are turning digital-first in every aspect of their operations, securing these systems at the earliest phase of the development cycle, resulting to the rise of the latest buzzword, DevSecOps. 

On top of testing code and looking for vulnerabilities early in the development process, the shift-left movement is extended to the heart of the systems, including applying zero trust principals in applications and exploring confidential computing by encrypting data in use in memory. This panel will explore different aspect of the shift-left movement and its impact in the culture dynamics of the entire IT operation.

As the old outsourcing model is outdated, it is time for a new paradigm. In this session, we will look into the risks of not adopting a Managed Services model and how it can help improve and accelerate your business operations. We will also discuss how much time CIOs, CTOs, and IT leaders spend on recruiting top talent.

Veeam recently published the results of the largest independent research project in the data protection industry, from 3,393 unbiased organizations across 28 countries. One of the key findings in that research revealed that only 24% were not attacked by ransomware. Undoubtedly, ransomware attacks are one the rise. Having a data backup is only the first step to protect your digital enterprise. In this section, Chris will share the best practises of data protection against ransomware attack, as well as some useful tips if you have used public clouds in your environment.

The shift to Security Service Edge (SASE) as the security architecture of choice together with the adoption of Zero Trust, continues to gain momentum amongst organizations across the globe.
Driven by network modernization and digital transformation projects, SSE and Zero Trust have become highly sought-after approaches to deliver agility and flexibility while increasing the security and protection of staff and critical business data, no matter where they reside. Are you ready to adopt these approaches? Are you prepared to make the change?
 
In this session, we’ll share insights into key network and security transformation considerations to prepare your network and business for SSE and Zero Trust. We’ll also offer valuable resources to take away and allow time for a Q&A session at the end, so have your questions ready for me on the day!

As Office 365 adoption grows, AD security has never been more critical. Many businesses are running a hybrid AD environment with on-premises AD providing authentication and authorization services. That means, if AD isn’t properly secured, Office 365 won’t be either.
 
Quest | One Identity solutions for hybrid AD security enable you to take control of your hybrid AD infrastructure and improve your security posture both on premises and in the cloud that helps you: 1) Understand who has access to what resources; 2) Know when suspicious activities occur; 3) Remediate unauthorized actions immediately; 4) Recover from security incidents.

The pandemic has accelerated the digital transformation of enterprises to meet with the changing needs of the employees, the customers and the stakeholders. Enterprises are migrating workloads to hybrid clouds and multi-clouds which require enhanced connections to the cloud service providers to access their applications. Enterprises are moving applications from on-prem to SaaS to reduce cost, improve scalability and reliability in which application performance is based on the internet connection. Enterprises are moving into hybrid work environments which require a distributed approach to secure remote access from the employees. Enterprises are responding to growing cyber-security threats with increased reliance on internet to access applications and remote employees working anywhere. By adopting SD WAN and SASE, enterprises can modernize the networks to enable better application performance, enhance user experience and increase security. 

Cyber Resilient is becoming a more important consideration for business to minimize potential operational impact by ransomware attacks. Dell PowerProtect Cyber Recovery provides a proven and effective approach for business to achieve a mature level of cyber resilient readiness. We shall explore in details ransomware attacks from a business continuity perspective as a more effective approach.

You probably have heard of Blockchain, NFT, smart contract, Web3…but do you really understand them? What are the difference between Web2 and Web3? Chris Chan, Head of Cybersecurity Research of UD, will share everything you need to know about Web3 with a focus on the security aspect. What are the common web3 security concerns? What security measures should you adopt? Join Chris to find out more. 

According to Radware’s research, 70% of production applications now run in the public cloud. This means that increasingly, ‘cloud’ security is becoming synonymous with cyber security. The issue of identity and access management in the public cloud is now becoming a big concern.

Join Radware to learn more about today’s evolving and dynamic threats and some of the best practices to securing cloud environments.

Headline breaches, ransomware and even common hacks all routinely exploit well-known attack paths. By identifying, understanding and disrupting these attack paths before exploitation, you greatly reduce the probability of a breach. Join us to learn how Tenable will enable your security team to preemptively focus response ahead of attacks through our combined attack path analysis and prioritization capabilities.

Multi-Cloud Data Services, enables customers to connect file, block and object storage consumed as a service, directly to the public cloud or multiple clouds of their choice (VMC on AWS, AWS, Azure, GCP) for Disaster Recovery as well as many multi-cloud use cases such as analytics, test/dev, or to support specific use cases in select vertical markets where compute intensive file workloads require high throughput and low latency.  This is done through a high-speed, low latency connection from Dell storage at a managed service provider to the cloud(s).  Organizations gain an on demand, cloud consumption model for both compute workloads and storage, compliance, sovereignty and the high performance, up to 6-9s availability, and scalability of Dell storage.

Moving to Cloud bring along new challenges for cybersecurity, and on the other hand Cloud-assist bringing greater capability to cybersecurity solutions. How to chose the perfect mix and create the ideal secured Hybrid environment for your organization? What are the main factors to consider to build a effective defence against new cyber-attacks – with and without, public or private cloud?

With the rise of mobile devices, cloud computing, and digital services, we are seeing a massive shift in how we work. This change creates a new normal characterized by a combination of physical offices and remote workers. In this session, we will dive into workforce mobility, security concerns, resource allocation and cost efficiencies.

Today’s ransomware attacks have become more impactful because of their growing industrialization through the Ransomware-as-a-Service (RaaS) affiliate model and the increasing trend of double extortion. Join this session to hear from our Security expert's sharing on our observations on the prevalent threat and prime example like BlackCat Ransomware and learn how to leverage the latest threat intelligence innovations to protect your organization from today's attacks - and be prepared for tomorrow's.

The cloud has changed the game for everyone. Nearly 70% of organizations host more than half their workloads in the cloud today - up from just 31% in 2020 - and yet, research found 50% of organizations indicate a lack of internal knowledge about cloud-native security.  The longer it’s ignored, the greater the risk.  Let's find out how we can confidently steer clear of them.

In building over 100+ products and ventures in IoT, robotics, consumer electronics and even aerospace, learn how you can create prototypes and products that are:
•    Faster than the usual 12 to 18 months most agencies propose,
•    Better than most experienced founders and teams (even with poor tech skills), and
•    Cheaper than what consulting and engineering firms or industrial partners would recommend.

Extended Security Posture Management is a comprehensive approach to security validation and optimization. It maps security gaps, the attack surface, and infiltration routes, providing a holistic view for those willing to shore their defenses up. Join this presentation to learn how can any security team leverage this technology to customize, scale, and automate the day-to-day security practices. Roll out a threat-informed program to eventually maximize operational efficiency, minimize risk exposure, and measure and communicate success to leadership. With XSPM, each team can reach its goal, whether it is better prevention, better detection and incident response, or even better adversarial skills.

We knew security could be different. Fast enough to keep up with dynamic threats. Intelligent enough to learn from them. Constantly evolving to keep the upper hand.

We are Trellix. A global company redefining the future of cybersecurity.

Trellix brings you a living XDR architecture that adapts at the speed of threat actors and delivers advanced cyber threat intelligence. We’re changing what security means and what it can do, giving everyone in your organization the confidence that comes with being more secure, every day.

 

Living security starts here.

 

An overview of Trellix as a newly formed company, our mission, and the gaps that we address in the market. This session will focus on Trellix’s XDR portfolio and its key use cases.