CYBER SECURITY WORLD

Virtual Conference / Summit
Cyber Security & Privacy

Date: 23 to 24 Sep '20
Price: Free

Visit Event Website


NO ONE COULD AFFORD TO IGNORE CYBER SECURITY...

Cyber Security World is where you will find these solutions – efficient, money-saving, hassle-free and smart cyber security solutions to ensure your businesses are locked down tight and most importantly, allow you to fearlessly employ the latest breakthroughs and business-winning technology.

GAIN THE LATEST SECURITY TRENDS AND INSIGHTS FROM INDUSTRY EXPERTS

Cloud Expo Asia Hong Kong and Singapore
will join hands for the first time to present the first ASIA’s Virtual Tech Show from 23 – 24 Sep. Across the 2-days event, you will experience 10 conference tracks covering the entire technology ecosystem, with hundreds of educational seminar sessions, dozens of real-life case studies and panel discussions, delivered by 160+ world-class international speakers. We are expecting 5,000 IT experts and business leaders around the world joining us online to celebrate the annual IT extravaganza!

Check out CYBER SECURITY WORLD'S  Co-Located Events:

CLOUD EXPO ASIA
BIG DATA WORLD
SMART IOT HONG KONG
DATA CENTRE WORLD
ECOMMERCE EXPO

Follow #CLOUDEXPOASIAHK for regular updates!

With increased global awareness on data privacy, CISOs, CIOs, info security leaders and technology professionals must work swiftly to secure data and protect their businesses from possible firewall breaches, on or off-premises, from shadow IT, the 'enemy within' and external cyber threats. In this track, you can hear from leading security visionaries sharing their insights on the cybersecurity landscape.

  • A CISOs Manual: Protecting Your Organisation Amidst the Evolution of Cyber Attacks

The impression that one`s organisation will never be targeted or fall prey to cyber-attacks should not be the mindset of CISOs. There has been an increasing rise in the number of cyber-attacks and threats that organisations around the globe are facing and this is a daunting occurrence. This session will highlight how cyber-attacks have the potential to compromise an organisations’ key infrastructure, better adopt risk management, understand better what to expect and how to adapt to the changing risk landscape in this digital era.

  • Organisation-wide Data Hack – The Hacker Hub Round Table Discussion

An intentional attack was made on a large enterprise with more than 2,000 employees, which resulted in a large scale data breach during the attack. The attack which was purposefully carried out by an organised group of hackers who were still able to successfully hack into the system despite the controls in place. We invite a few hackers to reveal how this could have happened and how technology could help minimise the recovery time after the attack occurred.

  • Breaking into popular php framework
  • CTG Digital-ICT Solutions
  • A single unified cloud integration platform – how does it work?
  • Security Microservices – a new trend
  • Rethinking Security within DevOps
  • Embrace SASE with Cisco Approach to drive security in cloud
  • Protecting Your Active Directory and Azure Active Directory in the Cloud Era
  • The Realities of Incident Response
  • Real World Incident Handling: Case Study, Lesson Learnt and Defense Solutions
  • The Next Generation of Digital Transformation: Are You Ready?
  • Data privacy management: Making data your safe asset
  • (ISC)² Certified Cloud Security Professional (CCSP®) Clinic
  • AI-enabled converged network management-as-a-service
  • Introduction to Proactive Prevention

MEET YOUR POTENTIAL CLIENTS

♦  Auditing Professionals
♦  Chief Information Security Consultants
♦  CISO/Chief Information Security Officers
♦  Compliance/Legal Officers
♦  Computer Security Incident Responders
♦  Disaster Recovery/Business Continuity
♦  Enterprise Internet of Things
♦  Enterprise Mobility Management
♦  Finance/Purchasing
♦  Governance Officers
♦  Heads of IT Security
♦  Information Security Assurance Analysts
♦  Information Security Officers
♦  IT Management
♦  IT Security & Privacy
♦  IT Security Engineers
♦  IT Security Professionals
♦  Legal Professionals
♦  Network/Infrastructure Management 
♦  Outsourcing and Systems Integrators  
♦  Penetration Testers
♦  Principal Cyber Security Managers 
♦  Principal Information Assurance Officers 
♦  Regional Information Security Analysts 
♦  Research & Product Development 
♦  Risk Management 
♦  Security Administrators
♦  Security Analysts 
♦  Security Architects 
♦  Security Consultant/Specialists 
♦  Security Engineers 
♦  Security Software Developers 
♦  Security Systems Administrators 
♦  Senior Information
♦  Security Assurance Consultant 
♦  Senior Information
♦  Security Risk Officers 
♦  Senior IT Security Consultants 
♦  Senior IT Security Operations
♦  Specialist 
♦  Systems Design/Software Engineering

With increased global awareness on data privacy, CISOs, CIOs, info security leaders and technology professionals must work swiftly to secure data and protect their businesses from possible firewall breaches, on or off-premises, from shadow IT, the 'enemy within' and external cyber threats. In this track, you can hear from leading security visionaries sharing their insights on the cybersecurity landscape.

  • A CISOs Manual: Protecting Your Organisation Amidst the Evolution of Cyber Attacks

The impression that one`s organisation will never be targeted or fall prey to cyber-attacks should not be the mindset of CISOs. There has been an increasing rise in the number of cyber-attacks and threats that organisations around the globe are facing and this is a daunting occurrence. This session will highlight how cyber-attacks have the potential to compromise an organisations’ key infrastructure, better adopt risk management, understand better what to expect and how to adapt to the changing risk landscape in this digital era.

  • Organisation-wide Data Hack – The Hacker Hub Round Table Discussion

An intentional attack was made on a large enterprise with more than 2,000 employees, which resulted in a large scale data breach during the attack. The attack which was purposefully carried out by an organised group of hackers who were still able to successfully hack into the system despite the controls in place. We invite a few hackers to reveal how this could have happened and how technology could help minimise the recovery time after the attack occurred.

  • Breaking into popular php framework
  • CTG Digital-ICT Solutions
  • A single unified cloud integration platform – how does it work?
  • Security Microservices – a new trend
  • Rethinking Security within DevOps
  • Embrace SASE with Cisco Approach to drive security in cloud
  • Protecting Your Active Directory and Azure Active Directory in the Cloud Era
  • The Realities of Incident Response
  • Real World Incident Handling: Case Study, Lesson Learnt and Defense Solutions
  • The Next Generation of Digital Transformation: Are You Ready?
  • Data privacy management: Making data your safe asset
  • (ISC)² Certified Cloud Security Professional (CCSP®) Clinic
  • AI-enabled converged network management-as-a-service
  • Introduction to Proactive Prevention

MEET YOUR POTENTIAL CLIENTS

♦  Auditing Professionals
♦  Chief Information Security Consultants
♦  CISO/Chief Information Security Officers
♦  Compliance/Legal Officers
♦  Computer Security Incident Responders
♦  Disaster Recovery/Business Continuity
♦  Enterprise Internet of Things
♦  Enterprise Mobility Management
♦  Finance/Purchasing
♦  Governance Officers
♦  Heads of IT Security
♦  Information Security Assurance Analysts
♦  Information Security Officers
♦  IT Management
♦  IT Security & Privacy
♦  IT Security Engineers
♦  IT Security Professionals
♦  Legal Professionals
♦  Network/Infrastructure Management 
♦  Outsourcing and Systems Integrators  
♦  Penetration Testers
♦  Principal Cyber Security Managers 
♦  Principal Information Assurance Officers 
♦  Regional Information Security Analysts 
♦  Research & Product Development 
♦  Risk Management 
♦  Security Administrators
♦  Security Analysts 
♦  Security Architects 
♦  Security Consultant/Specialists 
♦  Security Engineers 
♦  Security Software Developers 
♦  Security Systems Administrators 
♦  Senior Information
♦  Security Assurance Consultant 
♦  Senior Information
♦  Security Risk Officers 
♦  Senior IT Security Consultants 
♦  Senior IT Security Operations
♦  Specialist 
♦  Systems Design/Software Engineering

Stay Updated

Organizer

CloserStill Media

Stay Updated

Organizer

CloserStill Media

Copyright © 2020 Industry Events. All rights reserved. Site credit.