Total Security Conference Hong Kong 2017

Challenging Security Norms - Forget IF, prepare for WHEN and learn the HOW.

A connected era demands a connected security mindset. With pervasive data sharing between companies, humans and machines challenging security norms, CISOs and security teams under siege. To break the siege, they need to balance network flexibility with the mitigation and elimination of increasingly sophisticated and profit-motivated threats.

Join the conversation, hear the questions and experience the answers at the Total Security Conference 2017. With a balance of renowned analysts, overseas and local C-level practitioners, and leading security solution providers, it aims to tackle the biggest questions that face today’s CISOs and keep them awake in the night. It will also end on an industry debate that tackles an ongoing dilemma that faces all Asian businesses: the fine balance between Privacy and Security.

Key topics to be covered this year:
  • Customer-centric security
  • CISO trends
  • DevsecOps
  • Container and virtualization security
  • Cloud security
  • Mobile security
  • CISO vs CIRO
  • Internet of things
  • Cryptography
  • … and much more
What Distinguishes This Event?

Total Security Conference 2017 presents the opportunity for delegates to network and build partnerships with peer level professionals, while learning new ideas and strategies that they can replicate within their own organizations, to build a best practices culture. The Total Security Conference 2017 has the following distinguishing features:

  • Exclusive qualified senior level attendance (IT + LOB management)
  • Strategic conference sessions
  • Executive luncheon networking session
  • Showcasing leading solutions and services by industry leaders
  • When East Meets West - Experts, speakers and delegates, from East (China and SE Asia) and West (Overseas) to interact and exchange ideas
Who You Will Meet

To ensure the conference offers the highest degree of relevancy, only C-Level, Senior Executives and IT professionals from corporate, public and government agencies are invited to attend. This exclusive format allows delegates to connect with those peers whose insights they respect the most – through exceptional networking, business meetings and strategic information-sharing sessions.

Business and IT professionals in enterprise-wide security, risk management, BCM or critical infrastructure:

  • CIOs, CISOs and CFOs, and chief security, risk, compliance, process and technology officer
  • IT vice presidents and directors
  •  Network security executives and directors
  •  Governance, risk, compliance, and privacy executives
  •  BCM and resilience continuity managers
  •  Finance, audit, legal risk and compliance regulators
  •  Enterprise and operational risk managers
Questex MediaComputerworld Hong KongNetwork World Asia



Registration & Morning Networking

The New Security Landscape


Welcome Remarks


Opening Keynote - Connected security: Sizing up the IoT, Cloud and Devops impact


Keynote 2 - The hidden risks of increased security: Lessons from economics, geopolitics, and networks


Keynote 3


Coffee Break & Security Showcase


Keynote 4


Keynote 5: Network Traffic Analysis to Fend Off Latest Cyber Threats


CISO Hot Seat - You have been hacked; so what's next?


Networking Lunch


Best Practices and new innovations




Coffee Break & Security Showcase


CISO Think Tank: Privacy vs Security - Debating the Asian dilemma


Closing Remarks & End of Program


  • CF Chui

    Principal Security Technologist
    Arbor Networks

  • Gabriel Chan

    Head of Information Security, Greater China
    ABN AMRO Bank

  • Michael Leung

    Chief Information & Operations Officer
    China CITIC Bank International Limited

  • Geoff McClelland

    Program Director
    CIO Connect HK Limited

  • Sheila Lam

    Editor in Chief
    Computerworld Hong Kong

  • Allan Tan

    Content Director
    Enterprise Innovation

  • Sylvester Wong

    Senior Director, IT Asia Pacific
    Fresenius Medical Care Asia Pacific

  • Kevin O'leary

    Chief Information Security Officer
    GE China

  • Junaid UR Rehman

    Security Advisor
    HP Inc.

  • Peter Bullock

    King & Wood Mallesons

  • Anna Gamvros

    Partner & Co-head of Technology & Innovation, Asia
    Norton Rose Fulbright, Hong Kong

  • Stephen Langley

    Deputy Chief Information Officer, Information Technology, Corporate Affairs
    Securities and Futures Commission

  • Paul Jackson

    Managing Director
    Stroz Friedberg

  • Rob Koepp

    Network Director
    The Economist Corporate Network


Diamond Sponsor

Platinum Sponsor

Gold Sponsors

Executive Luncheon Sponsor

Supporting Organizations

Organized By


Sponsorship opportunities are available for service providers of
  • Business Intelligence / Analytics & Data Management, HK
  • IT Security & Risk Management
  • Core Banking & IT Transformation
  • Customer Relationship Management
  • Cloud, Data Centre & Mobility
  • Consultancy, BPO, Communication Systems, Recruitment Services

If you are looking to increase your market share, brand awareness or introduce a new product, this is an opportunity not to be missed.

For more information about becoming a sponsor, please contact:

Connie Yip

+852 2589 1373

Carvin Lee

+852 2589 1350



118 Nathan Road,Tsimshatsui, Kowloon, Hong Kong

Elisa Wong
+852 2589 1308

Winston Thomas

Connie Yip +852 2589 1373
Carvin Lee +852 2589 1350

Arbor Networks

Arbor Networks, the cyber security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor’s advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market-leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,” making network and security teams the experts.  For more information, please visit

Citrix Systems Hong Kong Ltd.

Citrix (NASDAQ:CTXS) aims to power a world where people, organizations and things are securely connected and accessible to make the extraordinary possible. Its technology makes the world’s apps and data secure and easy to access, empowering people to work anywhere and at any time. Our holistic approach to information security gives IT powerful centralized control over the management, access, and hosting of business-critical apps and data. Citrix solutions provide 5 critical enterprise security capabilities to give you complete coverage over what matters most.

Identity & Access

Up-level your enterprise security beyond user names and passwords by controlling access, authentication, and authorization to your apps, data, and network for employees and third parties.

Network Security

Protect your network and provide encrypted delivery of apps and data while ensuring 100% uptime and performance. Achieve security, compliance, and risk mitigation through secure remote access, network segmentation, and access control.

App Security

Take control at the application level. Centralize your apps in the data center or cloud, and provide secure access regardless of device. This helps you protect sensitive business information and defend against zero-day and denial-of-service attacks.

Data Security

Secure enterprise data in the data center or cloud instead of on endpoint devices. Containerization, data encryption, and secure file sharing can reduce the risk of leaks and attacks, including on mobile devices, while helping ensure regulatory compliance.

Monitoring & Response

Advanced monitoring tools give you full visibility into your IT infrastructure. Detect threats, misconfigurations, and performance issues so you can respond fast and avoid user interruption. Comply with regulations and reduce the scope of security and compliance audits

Learn more at




Darktrace is a world-leading cyber-threat defense company. Its multi-award-winning Enterprise Immune System technology automatically detects and responds to emerging threats, powered by machine learning and mathematics developed by specialists from the University of Cambridge. Without using rules or signatures, Darktrace models the ‘pattern of life’ of every device, user and network within an organization, identifying and mitigating cyber-threats before damage is done. Darktrace’s self-learning technology has been deployed globally and across all sectors, including energy, retail, telecommunications, manufacturing, financial services and healthcare. The company is headquartered in San Francisco and Cambridge, UK, with over 20 global offices including London, New York, Milan, Mumbai, Paris, Singapore, Sydney, Tokyo and Toronto.

Dimension Data

Dimension Data harnesses the transformative power of technology to help organisations achieve great things in the digital era. As a member of the NTT Group, we focus on digital infrastructure, hybrid cloud, workspaces for tomorrow, cybersecurity, and network as the platform. With a turnover of USD 7.5 billion and offices in 58 countries, we deliver services wherever our clients are, at every stage of their technology journey. Accelerate your ambition.

In Asia Pacific, we operate in 50 offices across 13 countries. We help clients enable technology, operate their IT infrastructures and transform technology solutions that deliver value. It combines an expertise in networking, security, customer experience (CX) and collaboration, data centre and end-user computing, with advanced skills in IT outsourcing, IT-as-a-Service, Systems integration services and training. 


ACCA is the apex industry association representing the stakeholders of the cloud computing ecosystem in Asia-Pacific. The ACCA’s mission is to accelerate adoption of cloud computing in Asia by helping create a trusted and compelling market environment and a safe and consistent regulatory environment for cloud computing products and services.
The association works to ensure that the interests of the cloud computing community are effectively represented in the public policy debate. This is done through expert working groups where best practice recommendations and other thought leading outputs are produced. Membership is open to large corporations to small-medium enterprises.