Loading
Slider Image
9 May 2019
4th Total Security Conference Hong Kong
Integrated and Efficient Security and Risk Governance for Digital Enterprises
21
DAYS
:
10
HOURS
:
48
MINUTES
:
37
SECONDS

09 May 2019

Hong Kong

ADD TO CALENDAR

4th Total Security Conference Hong Kong

"Cyber-crime is the greatest threat to every company in the world."

- Ginni Rometty, Chairman, President and CEO, IBM

 

A recent Gartner report predicts that worldwide spending on information security products and services will grow to 8.7 percent to $124 billion in 2019. The major block of that investment from enterprises is on acquiring end-to-end and integrated security services.

As more enterprises are becoming digital-native at a faster pace and rely heavily on hybrid/public cloud, increased data generation and consumption through powerful analytic engines and are adopting to XaaS as the way forward for their solution procurement and integration, the security vulnerabilities increase multiple folds.

Attempting to handle such exponential security threats, within emerging network systems such as WAN, within unknown threats presented from increased sensorization from IoT and crypto/blockchain integration challenges, is fast becoming a complicated matrix.v

The 4th Annual Total Security Conference Hong Kong will provide a comprehensive coverage on new threats and challenges for critical enterprise assets, emerging from three new approaches: strategic trends such as digital transformation, cloudification, XaaS, and WAN; tactical trends such as mobility, blockchain, web security, app security, and ecommerce issues; and new threat vectors in phishing, ransomware, malware, DDoS etc.

 

Key topics discussed in 2019 to enhance your security strategies:

  • Addressing Cybersecurity Threats Efficiently for Sustainable Enterprise Transformation
  • Protecting Critical Information and Digital Assets in the age of agile cloud adaptability
  • Minimizing security vulnerabilities in virtual, data-centric operations that relies on XaaS
  • Neutralizing cyberphysical threats arisen from autonomous, IoT and industry 4.0 applications
  • Exploring Blockchain’s alienating capabilities in enhancing end-point security

 

Who will attend?

To ensure the conference offers the highest degree of relevancy, only C-Level, Senior Executives and IT professionals from corporate, public and government agencies are invited to attend. This exclusive format allows delegates to connect with those peers whose insights they respect the most – through exceptional networking, business meetings and strategic information-sharing sessions.

Business and IT professionals in enterprise-wide security, risk management, BCM or critical infrastructure:

  • Chief Information Security Officer
  • CSO
  • CDO
  • CIO
  • CTO
  • Head / Director / VP – IT Security
  • Head / Director / VP – Technology Risk
  • Head / Director / VP – Business Continuity Management
  • Head / Director / VP – IT Security & Assurance
  • Head / Director / VP – Information Security Risk\
  • Head – Technical Architecture

200+

IT & Business Leaders

25+

Expert Speakers

10+

Industries

Why Should You Attend

#1More than 25 experts sharing case studies and technology updates – the only Hong Kong event to feature as many success stories.

#2 - Focused agenda addressing the needs of Leading Hong Kong companies and multinationals

#3 - Exciting new format featuring case studies, executive dialogues, debates and round table sessions



AGENDA

 

8:30

Registration & Morning Networking

9:00

Chair's Opening Remarks

9:10

Ice Breaking Session

Addressing Cybersecurity Threats Efficiently for Sustainable Enterprise Transformation

9:15

OPENING KEYNOTE: Digital Transformation Needs for Enterprises

9:30

Technology Session: End-to-End Security Enhancement

9:55

PANEL DISCUSSION: Protecting Critical Information and Digital Assets of Enterprises: How to Ride the Dual Wave of Agile Cloud Adaptability and Matching Security Preparedness

10:35

Coffee Break & Security Showcase

11:00

Technology Session: Hybrid Cloud Security

11:25

Technology Session: AI Integration with Ideal Cybersecurity

11:50

PANEL DISCUSSION: Can Uniform Data Governance Policies for Enterprises Ensure Impregnable Cybersecurity?

12:30

Networking Lunch Break

14:00

14:25

15:00

Coffee Break & Security Exhibition Showcase

15:20

15:45

16:15

Closing Remarks & End of Conference

Testimonials

"Very informative and well-structured event."

Director, Information Security - Allianz Global Investors

"Highly recommended. Vendor neutral conference is needed to have clear understanding of current IT security update."

Senior Manager – IT Security - Prudential Life Assurance

"Always well organized, informative. Would come again."

President - The Computer Ethics Society

WHY SPONSOR

REQUEST SPONSORSHIP INFORMATION

* Top 7 reasons why you should Sponsor * 

1. Interact with Key Buyers, influencers and decisions makers from across the Asia Pacific Region

2. Generate quality leads at you network directly with your targeted audience through this curated event

3. Increase your business opportunities with ease in the Asia Pacific Region

4. Achieve business growth through the multitude of opportunities made available to you

5. Amplify your brand positioning to create Top-of-Mind-awareness among senior industry executives

6. Enjoy a wide reach as your company brand and solutions are amplified at this strategic platform

7. Succeed in engaging your targeted audience through an array of customizable sponsorship packages

REQUEST SPONSORSHIP INFORMATION

SPONSORS

Coming soon...

Supporting Organizations

VENUE

Address
Hong Kong
Questions about the event? For more information on how to participate, please contact:

DELEGATE INQUIRIES
Polly Tan
pollytan@questexasia.com
+65 6395 4583

SPEAKING OPPORTUNITIES
IB Saravanan
ibsaravanan@questexasia.com
+65 6395 6787

SPONSORSHIP OPPORTUNITIES
Simon Yeung
syeung@questexasia.com
+852 2589 1370