Total Security Conference Hong Kong 2017
Challenging Security Norms - Forget IF, prepare for WHEN and learn the HOW.
A connected era demands a connected security mindset. With pervasive data sharing between companies, humans and machines challenging security norms, CISOs and security teams under siege. To break the siege, they need to balance network flexibility with the mitigation and elimination of increasingly sophisticated and profit-motivated threats.
Join the conversation, hear the questions and experience the answers at the Total Security Conference 2017. With a balance of renowned analysts, overseas and local C-level practitioners, and leading security solution providers, it aims to tackle the biggest questions that face today’s CISOs and keep them awake in the night. It will also end on an industry debate that tackles an ongoing dilemma that faces all Asian businesses: the fine balance between Privacy and Security.
Key topics to be covered this year:
- Customer-centric security
- CISO trends
- Container and virtualization security
- Cloud security
- Mobile security
- CISO vs CIRO
- Internet of things
- … and much more
What Distinguishes This Event?
Total Security Conference 2017 presents the opportunity for delegates to network and build partnerships with peer level professionals, while learning new ideas and strategies that they can replicate within their own organizations, to build a best practices culture. The Total Security Conference 2017 has the following distinguishing features:
- Exclusive qualified senior level attendance (IT + LOB management)
- Strategic conference sessions
- Executive luncheon networking session
- Showcasing leading solutions and services by industry leaders
- When East Meets West - Experts, speakers and delegates, from East (China and SE Asia) and West (Overseas) to interact and exchange ideas
Who You Will Meet
To ensure the conference offers the highest degree of relevancy, only C-Level, Senior Executives and IT professionals from corporate, public and government agencies are invited to attend. This exclusive format allows delegates to connect with those peers whose insights they respect the most – through exceptional networking, business meetings and strategic information-sharing sessions.
Business and IT professionals in enterprise-wide security, risk management, BCM or critical infrastructure:
- CIOs, CISOs and CFOs, and chief security, risk, compliance, process and technology officer
- IT vice presidents and directors
- Network security executives and directors
- Governance, risk, compliance, and privacy executives
- BCM and resilience continuity managers
- Finance, audit, legal risk and compliance regulators
- Enterprise and operational risk managers
Registration & Morning Networking
The New Security Landscape
Opening Keynote - Connected security: Sizing up the IoT, Cloud and Devops impact
Keynote 2 - The hidden risks of increased security: Lessons from economics, geopolitics, and networks
Printers are overlooked endpoints on network and organizations mostly ignore them while planning for overall cybersecurity or enterprise security. Unsecure printers are risks to enterprise security of any organization. Both US and Australian Departments of Defense have highlighted unsecure printers as potential source of cybersecurity incidents. This session will look into recent hacking incidents done through printers and how companies can secure their printers.
Coffee Break & Security Showcase
Keynote 5: Network Traffic Analysis to Fend Off Latest Cyber Threats
The threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage. A comprehensive approach for data protection needs to have network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies.
In this presentation, our security expert will explain why these solutions are a requirement and provide the most critical components necessary to identify and capture attacker movement before critical network resources and servers containing sensitive data are exposed.
He will also explain how identifying malicious and suspicious network traffic communications can be the key to faster detection and effective response. The last but not least, he will talk about how to rapidly identify the signs of intrusion and shut down malicious activity in the network, including ransomware.
CISO Hot Seat - You have been hacked; so what's next?
Best Practices and new innovations
|Track 1 - Blockchain Security||Track 2 - New Safeguards for Digital Business Models|
|[Track 1.3]||[Track 2.3]|
|SandBox Chat - How Blockchain changes the security equation?||Sandbox Chat - What CISOs secretly want from startups?|
|Track 1.3 Moderator||Track 2.3 Moderator|
Computerworld Hong Kong
|Track 1.3 Panelist||Track 2.3 Panelist|
King & Wood Mallesons
Coffee Break & Security Showcase
CISO Think Tank: Privacy vs Security - Debating the Asian dilemma
Closing Remarks & End of Program
Sponsorship opportunities are available for service providers of
- Business Intelligence / Analytics & Data Management, HK
- IT Security & Risk Management
- Core Banking & IT Transformation
- Customer Relationship Management
- Cloud, Data Centre & Mobility
- Consultancy, BPO, Communication Systems, Recruitment Services
If you are looking to increase your market share, brand awareness or introduce a new product, this is an opportunity not to be missed.
For more information about becoming a sponsor, please contact:
+852 2589 1373
+852 2589 1350