Total Security Hong Kong Conference 2016

Intelligent security - Challenging today’s status quo

Security needs to get smarter. In a mobile, connected and sharing economy, we need to rewire our thinking about security. Forget about protecting edges and hiding behind layers of firewalls. Today’s companies need to think about securing mobile transaction data in transit, use secure containers and design applications where security is not bolted on--but built in.

Total Security conference, a brand new concept from Questex Asia, aims to answer this. Bringing today’s leading IT professionals together under the same roof with leading solution providers and analysts, the conference aims to  the challenge today’s security thinking about information security and be part of its evolution over time.

Delegates will discover new ways to innovate, create opportunity for improvements, share insights how we, as a community and as individuals, respond to incidents, roles and responsibilities.  Two afternoon workshops, one designed for those in security leadership roles, and the other to exchange proven practices, aim to increase knowledge and know-how in IT security. Ultimately, through challenging the status quo of thoughts and procedures, we aim to not only build better security, but one that is immensely more intelligent.


Key topics to be covered this year:
 
  • Customer-centric security
  • CISO trends
  • DevsecOps
  • Container and virtualization security
  • Cloud security
  • Mobile security
  • CISO vs CIRO
  • Internet of things
  • Cryptography
  • … and much more
     
What Distinguishes This Event?

Total Security 2016 presents the opportunity for delegates to network and build partnerships with peer level professionals, while learning new ideas and strategies that they can replicate within their own organizations, to build a best practices culture. The Total Security 2016 has the following distinguishing features:

  • Exclusive qualified senior level attendance (IT + LOB management)
  • Strategic conference sessions
  • Executive luncheon networking session
  • Showcasing leading solutions and services by industry leaders
  • When East Meets West - Experts, speakers and delegates, from East (China and SE Asia) and West (Overseas) to interact and exchange ideas
     
Who You Will Meet

To ensure the conference offers the highest degree of relevancy, only C-Level, Senior Executives and IT professionals from corporate, public and government agencies are invited to attend. This exclusive format allows delegates to connect with those peers whose insights they respect the most – through exceptional networking, business meetings and strategic information-sharing sessions.

AGENDA

8:30

Registration

9:00

Welcome Remarks

9:15

Opening Keynote

9:45

Keynote 2: 10 secrets that can make or break a CISO’s career

10:15

Keynote 3: One Step Ahead of Cyber Criminals

10:45

Coffee Break & Security Showcase

11:00

Keynote 4: Using Cloud security to solve large security headaches

11:30

Keynote 5: Are you ready coping with Cyber Threats in the New Era?

12:00

Panel Discussion

13:00

Executive Luncheon (by invitation only)

14:15

Track Sections (Part I)

14:45

15:15

15:55

Coffee Break & Security Showcase

16:10

Track Sections (Part II)

16:40

17:10

Lucky Draw and Closing Remarks

SPEAKERS

  • CF Chui

    Solutions Architect, Asia Pacific
    Arbor Networks

  • Albert Yung

    Technical Consultant – North Asia
    Barracuda Networks

  • Anwar McEntee

    Head of Security
    BT North East Asia

  • John Guo

    Director, Security Engineering, North Asia
    Check Point Software Technologies

  • Michael Leung

    Chief Information and Operations Officer
    China CITIC Bank International Limited

  • Geoff McClelland

    Program Director
    CIO Connect HK Limited

  • Sheila Lam

    Editor in Chief
    Computerworld Hong Kong

  • Zack Lau

    Consultant
    Control Risks

  • Mark Calvin Rittmayer

    Director
    CSC Asia Pacific Ltd

  • Ginnwann Teo

    Head of Pre-Sales , Asia Pacific Region
    Cyberbit

  • Queenie Li

    Country Manager, Greater China Region
    Dell Security Solution

  • Yamin Prabudy (Business networking luncheon speaker)

    Regional Business Development Manager, Security Business Unit
    Dimension Data Asia Pacific Pte Ltd

  • Allan Tan

    Content Director
    Enterprise Innovation

  • Daniel Lee

    APAC Security Solution Evangelist
    F5 Networks, Inc.

  • Lim Shih Hsien

    Head, Information Security
    Hong Kong Jockey Club

  • Christopher Church

    Digital Forensic Officer
    INTERPOL Global Cyber Complex for Innovation

  • Akhil Behl

    Business Strategy Consultant
    Juniper Networks

  • Anthony Lai

    General Manager
    Knownsec Hong Kong

  • Randall Arthur

    Partner
    Kobre & Kim

  • Charles Mok

    Legislative Councillor
    HKSAR Government

  • Shane Read

    CISO
    Noble Group

  • Anna Gamvros

    Partner
    Norton Rose Fulbright Hong Kong

  • Gary Tse

    Regional Head, Surveillance Analytics
    Standard Chartered Bank

  • Stephen Morgan

    Director
    Stroz Friedberg

SPONSORS

Platinum Sponsors

Gold Sponsors

Executive Luncheon Sponsor

Exhibition Sponsors

Printing Solutions Sponsor

Supporting Organizations

Supporting Media

Organizer

SPONSORSHIP

Sponsorship opportunities are available for service providers of
  • Business Intelligence / Analytics & Data Management, HK
  • IT Security & Risk Management
  • Core Banking & IT Transformation
  • Customer Relationship Management
  • Cloud, Data Centre & Mobility
  • Consultancy, BPO, Communication Systems, Recruitment Services

If you are looking to increase your market share, brand awareness or introduce a new product, this is an opportunity not to be missed.

For more information about becoming a sponsor, please contact:

Connie Yip

cyip@questexasia.com

+852 2589 1373

Carvin Lee

clee@questexasia.com

+852 2589 1350

 

 

Address
118 Nathan Road,Tsimshatsui, Kowloon, Hong Kong

DELEGATE INQUIRIES
Elisa Wong
ewong@questexasia.com
+852 2589 1308

SPEAKING OPPORTUNITIES
Winston Thomas
winston@questexasia.com

SPONSORSHIP OPPORTUNITIES
Connie Yip cyip@questexasia.com +852 2589 1373
Carvin Lee clee@questexasia.com +852 2589 1350

File Download

Keynote 4: Using Cloud security to solve large security headaches

Submit

File Download

Track Sections (Part I)

Submit

File Download

Submit

File Download

Track Sections (Part II)

Submit

Check Point

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.  

Cyberworld

Founded in 1991, Cyberworld (Asia) Ltd. has steadily established itself as a reputable IT products distributor in Hong Kong and obtained trust from both our valued customers and suppliers alike. We focus on distributing Network Infrastructure, Network Security, Remote Access Solution, Application Acceleration, Proxy Solution and Content Security.

Here at Cyberworld we are selective about the products that we offer. We distribute the best-of-breed IT solutions from industry leaders such as Juniper Networks, Blue Coat, FireEye, Infoblox, Rapid7, Nimble Storage, Pulse Secure, SSH.

Cyberworld (Asia) Ltd. is committed to providing the quality products, with exemplary support and service to our customers at competitive prices. We strive to be our customer’s number one choice for all their IT requirements in every sense. Our professional sales and technical staff provide customers with pre-sales and post-sales support along every step, as are required. Moreover, we cooperate with our valued-partners such as systems integrators and vendors in marketing campaigns to further enhance sales.

Our success is achieved through customer satisfaction and understanding. We know that in today’s market, it is important to bring in quality solutions to suit our customers’ needs in a timely and professional manner

F5 Networks

F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking (SDN) deployments to successfully deliver applications and services to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends

Juniper

Juniper Networks delivers innovation across routing, switching and security. Juniper Networks' innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Arbor Networks

Arbor Networks, the cyber security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor’s advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market-leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,” making network and security teams the experts.  For more information, please visit www.arbornetworks.com.

Barracuda Networks Inc.

Barracuda (NYSE: CUDA) simplifies IT with cloud-enabled solutions that empower customers to protect their networks, applications, and data, regardless of where they reside. These powerful, easy-to-use and affordable solutions are trusted by more than 150,000 organizations worldwide and are delivered in appliance, virtual appliance, cloud and hybrid deployments. Barracuda’s customer-centric business model focuses on delivering high-value, subscription-based IT solutions that provide end-to-end network and data security. For additional information, please visit barracuda.com.

Blackberry

BlackBerry is securing a connected world, delivering innovative solutions across the entire mobile ecosystem and beyond. We secure the world’s most sensitive data across all end points – from cars to smartphones – making the mobile-first enterprise vision a reality. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols “BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ. For more information, visit www.BlackBerry.com.

Cyberbit

CYBERBIT – Defeating the Unknown

The cyber security market has been going through tremendous changes recently.

Exponential increase in the number of attacks and their severity has caused a drastic decrease in the relevance and effectiveness of current generation security tools.

CYBERBIT confronts these challenges by protecting high risk, high value enterprises, critical infrastructures and governments against these advanced, signatures-less threats.

Detection and response cycles must become optimal and short, leveraging past knowledge and experience, automating processes and capabilities, and allowing the organization to be agile, alert and prompt.

That’s what CYBERSHIELD portfolio is all about – securing IP & SCADA networks against advanced and targeted threats.

CYBERBIT, based on its vast experience and field-proven technologies, leveraging the knowledge of our experienced cyber experts and system engineers, is securing today some of the most critical enterprises and national level infrastructures.

Data World Computer & Communication Ltd.

Established in 1983, Data World Computer and Communication Ltd (Data World C&C) is a leading technology services, IT business management and solutions company. Headquartered in Hong Kong, Data World C&C has established support centers in Mainland China (Shenzhen and Macau).We specialize in 4 keys areas: Network Security, Network Infrastructure, Network Communication and Network Management. With proven success in market development and technical expertise in the IT field, Data World C&C is dedicated to providing quality technical support and professional consultancy services to our channel partners and customers in order to ensure all parties can enjoy a win-win situation.

Dell Security

Dell SonicWALL solutions provide intelligent network security, email security and secure mobile access which enable the SMB through the enterprise to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the Dell SonicWALL Global Response Intelligent Defense (GRID) Network, the Dell SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats. Dell SonicWALL Research Labs continuously processes this information, proactively delivering countermeasures and dynamic updates that defeat the latest threats. 

Datalink

To provide the highest quality total solutions in our market- Information Security and Connectivity. Datalink Business Solutions since 1989, through actively working with the security and IT industry, bring state-of-the-art security and connectivity technologies into the region. The security and connectivity landscape will continue to evolve and new challenges and technologies develop at an accelerating pace. Our role, is to stay ahead and provide our clients with market and technology leading, comprehensive, and effective connectivity and security solutions.

Our exclusive focus on Information Security and Connectivity technologies enables us to provide the best level of services to our customers. Our experience in building and supporting global network security infrastructure, highly-available mission-critical security systems, and state-of-the-art data center security systems for more than a decade ensures our customers always get the best support and knowhow available. We back our solutions with a team of knowledgeable consulting and support professional that know the information security and connectivity technology intimately. Our consultants and support staffs are internationally trained and are equipped with the latest knowhow.

Ingram Micro

Ingram Micro helps businesses Realize the Promise of Technology™ by helping them maximize the value of the technology that they make, sell or use. With its vast global infrastructure and focus on cloud, mobility, supply chain services and technology solutions, Ingram Micro enables business partners to operate more efficiently and successfully in the markets they serve.

Ingram Micro delivers a broad and deep spectrum of technology and supply chain services to businesses around the world. Founded in 1979, Ingram Micro’s role as a leader and innovator in technology and supply chain solutions has fueled its rise to becoming the 62 nd-ranked corporation in the FORTUNE 500. Today, Ingram Micro remains at the forefront of the global technology marketplace, bringing the latest products and services to market and finding new ways to bring value to its customers. The company supports global operations through an extensive sales and distribution network throughout North America, Europe, Middle East, Turkey and Africa, Latin America and Asia Pacific.

Ipswitch

Ipswitch was founded in 1991 on a simple premise: to produce IT software that took what was possible and made it practical.

Our IT management software provides secure control over business transactions, applications and infrastructure. Our Unified Applications and Networking Monitoring software, WhatsUp Gold provides end-to-end insight, is extremely flexible and simple to deploy. Our Information Security and Managed File Transfer solutions, MOVEit enable secure, automated and compliant business transactions and file transfers for millions of users.

For over 20 years Ipswitch has been a leader in easy to try, buy and use IT management software. We’re known for fair prices, honest business practices, and software that works out of the box. The kind of simply powerful software needed to manage today’s cloud, virtual and networked environments. Enabling and delighting IT Teams everywhere to perform like never before. For more information, please visit www.ipswitch.com

RSA

RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.

Dimension Data

Founded in 1983, Dimension Data plc is an ICT services and solutions provider that uses its technology expertise, global service delivery capability, and entrepreneurial spirit to accelerate the business ambitions of its clients. Dimension Data is a member of the NTT Group.

For more information about Diension Data, please visit www.dimensiondata.com

CA Technologies

CA Technologies (NASDAQ: CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. CA Technologies is committed to ensuring our customers achieve their desired outcomes and expected business value through the use of our technology. To learn more about our customer success programs, visit ca.com/customer-success. For more information about CA Technologies go to ca.com.

Darktrace

Named ‘Technology Pioneer’ by the World Economic Forum, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects and responds to previously unidentified threats, powered by machine learning and mathematics developed by specialists from the University of Cambridge. Without using rules or signatures, Darktrace is uniquely capable of understanding the ‘pattern of life’ of every device, user and network within an organization, and defends against evolving threats that bypass all other systems. Some of the world’s largest corporations rely on Darktrace’s self-learning technology in sectors including energy and utilities, financial services, telecommunications, healthcare, manufacturing, retail and transportation. Darktrace is headquartered in Cambridge, UK and San Francisco, with offices in Auckland, Boston, Chicago, Dallas, London, Los Angeles, Milan, Mumbai, New York, Paris, Seoul, Singapore, Sydney, Tokyo, Toronto and Washington D.C.

KORNERSTONE

Training makes a difference”! The letter “K” stands for knowledge. KORNERSTONE believes that the cornerstone of every individual’s success is knowledge, which not only collectively determines the competitiveness of a company but also of the region at large. Upholding this core belief, through providing a series of top quality global certifications and corporate trainings, KORNERSTONE strives to ensure all learning experiences with us are enjoyable and practical because we believe “Training makes a difference”!

Trend Micro

Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 27 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.hk

Fuji Xerox (Hong Kong) Limited

Fuji Xerox (Hong Kong) is a leading information and communications technology (ICT) provider specializing in document consultancy. We provide document consultancy services and solutions to customers in every industry, through a full range of knowledge and document management solutions and services from multifunctional devices, production printing systems, document management and workflow software to Enterprise Print Services and Business Process Services.

For more information about Fuji Xerox Hong Kong, please visit http://www.fujixerox.com.hk.