Total Security Conference Hong Kong 2017
Challenging Security Norms - Forget IF, prepare for WHEN and learn the HOW.
A connected era demands a connected security mindset. With pervasive data sharing between companies, humans and machines challenging security norms, CISOs and security teams under siege. To break the siege, they need to balance network flexibility with the mitigation and elimination of increasingly sophisticated and profit-motivated threats.
Join the conversation, hear the questions and experience the answers at the Total Security Conference 2017. With a balance of renowned analysts, overseas and local C-level practitioners, and leading security solution providers, it aims to tackle the biggest questions that face today’s CISOs and keep them awake in the night. It will also end on an industry debate that tackles an ongoing dilemma that faces all Asian businesses: the fine balance between Privacy and Security.
Key topics to be covered this year:
- Customer-centric security
- CISO trends
- Container and virtualization security
- Cloud security
- Mobile security
- CISO vs CIRO
- Internet of things
- … and much more
What Distinguishes This Event?
Total Security Conference 2017 presents the opportunity for delegates to network and build partnerships with peer level professionals, while learning new ideas and strategies that they can replicate within their own organizations, to build a best practices culture. The Total Security Conference 2017 has the following distinguishing features:
- Exclusive qualified senior level attendance (IT + LOB management)
- Strategic conference sessions
- Executive luncheon networking session
- Showcasing leading solutions and services by industry leaders
- When East Meets West - Experts, speakers and delegates, from East (China and SE Asia) and West (Overseas) to interact and exchange ideas
Who You Will Meet
To ensure the conference offers the highest degree of relevancy, only C-Level, Senior Executives and IT professionals from corporate, public and government agencies are invited to attend. This exclusive format allows delegates to connect with those peers whose insights they respect the most – through exceptional networking, business meetings and strategic information-sharing sessions.
Business and IT professionals in enterprise-wide security, risk management, BCM or critical infrastructure:
- CIOs, CISOs and CFOs, and chief security, risk, compliance, process and technology officer
- IT vice presidents and directors
- Network security executives and directors
- Governance, risk, compliance, and privacy executives
- BCM and resilience continuity managers
- Finance, audit, legal risk and compliance regulators
- Enterprise and operational risk managers
Registration & Morning Networking
The New Security Landscape
Opening Keynote - The Digital Industrial Security Challenge – Enabling the convergence of IIOT, Cloud and Devops
The presentation will explore three related cybersecurity challenges:
- The convergence of traditional IT and Operational Technology: How mature IT systems and applications are increasingly integrated with legacy proprietary or aged Operational Technology.
- The move to Digital Industry and the IIOT: Understanding the risks when moving to concepts of Digital Thread and analytics, based on the IT/OT convergence.
- Managing agile Devops: How cybersecurity needs to enable the Digital Industrial vision
Keynote 2 - The hidden risks of increased security: Lessons from economics, geopolitics, and technology
The human desire for security is universal. But when pushing forward in the quest for enhanced security, ignored or unnoticed risks can likewise build in ways that make what seems “safer” actually more prone to unexpected, destabilizing consequences. This talk will highlight how hidden risks with major undertakings in economics, geopolitics and technology have backfired (or still have potential to) and some of the fundamental lessons that these cases provide.
Keynote 3: Protect your Business with HP Print Security
Printers are overlooked endpoints on network and organizations mostly ignore them while planning for overall cybersecurity or enterprise security. Unsecure printers are risks to enterprise security of any organization. Both US and Australian Departments of Defense have highlighted unsecure printers as potential source of cybersecurity incidents. This session will look into recent hacking incidents done through printers and how companies can secure their printers.
Coffee Break & Security Showcase
Keynote 4: The Changing Cybersecurity Landscape: How to focus on the things that will get you fired
The cyber threat landscape is evolving rapidly and cybercriminals are becoming more sophisticated. While organisations would ideally like a large cybersecurity budget to protect themselves, most cannot afford to implement all the measures they would like. There needs to be actionable visibility of the threats in play at any point in time, and a logical approach tied to measurable outcomes that drive cybersecurity investment. This session covers the key considerations and strategies that will help focus on the things that matter most, thus ensuring budgets are spent appropriately to maximise cyber risk reduction.
Keynote 5: To Fend Off the Latest Cyber Threats using Network Traffic Analysis
The threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage. A comprehensive approach for data protection needs to have network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies.
In this presentation, our security expert will explain why these solutions are a requirement and provide the most critical components necessary to identify and capture attacker movement before critical network resources and servers containing sensitive data are exposed.
He will also explain how identifying malicious and suspicious network traffic communications can be the key to faster detection and effective response. The last but not least, he will talk about how to rapidly identify the signs of intrusion and shut down malicious activity in the network, including ransomware.
CISO Hot Seat - You have been hacked; so what's next?
Best Practices and new innovations
|Track 1 - Blockchain Security||Track 2 - New Safeguards for Digital Business Models|
|[Track 1.1]||[Track 2.1]|
|Consensus in adversarial networks - Blockchains and their security model||Application Security and SDP|
Senior Director, NetScaler Product Management,
|[Track 1.2]||[Track 2.2]|
|Responding to Unknown Threats||
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
|[Track 1.3]||[Track 2.3]|
|SandBox Chat - How Blockchain changes the security equation?||Sandbox Chat - What CISOs secretly want from startups?|
|Track 1.3 Moderator||Track 2.3 Moderator|
Computerworld Hong Kong
|Track 1.3 Panelist||Track 2.3 Panelist|
Industry-leading Global Risk Consulting Firm
Partner, Fraud Investigation and Disputes Services
King & Wood Mallesons
Founder and Chief Executive Officer
XNotes Alliance Limited
Coffee Break & Security Showcase
CISO Think Tank: Privacy vs Security - Debating the Asian dilemma
Closing Remarks & End of Program
Sponsorship opportunities are available for service providers of
- Business Intelligence / Analytics & Data Management, HK
- IT Security & Risk Management
- Core Banking & IT Transformation
- Customer Relationship Management
- Cloud, Data Centre & Mobility
- Consultancy, BPO, Communication Systems, Recruitment Services
If you are looking to increase your market share, brand awareness or introduce a new product, this is an opportunity not to be missed.
For more information about becoming a sponsor, please contact:
+852 2589 1373
+852 2589 1350