MALAYSIA
  • Date
  • 05 July 2017, Wednesday
  • Location
  • Aloft Kuala Lumpur Sentral
    Ballroom A, Level 2
    5, Jalan Stesen Sentral, Kuala Lumpur Sentral,
    50470 Kuala Lumpur
  • Time
  • 8.30am to 2.00pm

    Attend to win


    Agenda

    Time Event Programme
    08.30am Registration with Morning Refreshments | Viewing of Technology Showcases
    09.30am Welcome
    09.40am Gaining Visibility & Control: Securing Your Organisation from Internal and Outsider Attacks

    Controlling and monitoring privileged access is extremely important to mitigating the risks posed by insider threats, preventing data breaches, and meeting compliance requirements. But security and IT leaders have to walk a fine line between protecting the organization’s critical data to ensure business continuity, and enabling users and administrators to be productive.

    Ho Nam Hoebeke, Channel & Strategic Alliance Director APAC, BeyondTrust
    10.10am Cyber Security – Protecting Business, IOT, Cloud and Mobile Systems

    The move to cloud, mobility and the explosion of IOT are fundamentally changing the way organisations do business. Unfortunately, they have also opened up new vulnerabilities that hackers are activity exploiting. BlackBerry, leveraging its well established pedigree of providing solutions to global organizations and governments around the world, looks at what tools BlackBerry Secure can provide to help organizations secure their critical data.

    Simon Green, Channel Account Manager, SE Asia, BlackBerry
    10.40am Addressing Compliance and Emerging Security Threats

    Organizations today face increasing regulatory and compliance issues from nation and state levels to ensure the network and security infrastructure is continuously monitored and overall risk is reduced to an acceptable level.

    This presentation will highlight the problematic issues surrounding continuous security in today’s market, along with the need to comply to various regulations, and how Tenable solutions has helped organizations across the world gain control and full visibility of their networks and security program to address these challenges.

    Kannan Velayutham, Consultant, Tenable
    11.00am Viewing of Technology Showcases | Break
    11.20pm Simplifying & Securing Access to Business Application

    As the demands of secure web access becomes more complex organizations face some formidable challenges. For today’s professionals, work is an activity, not a place. Meaning, today’s professionals cannot be disconnected from the business just because they are out of the office or on the road. The question is how to simplify access to services and resources without increasing risk to your business? How to protect your mission critical business application?

    Fredric Teo, Sales Engineer, Micro Focus
    11.50pm Using Artificial Intelligence (AI) and Mathematics to Combat Malicious Code

    Applying the underlying fundamentals of AI to address the ever growing threat landscape faced by businesses today
    How AI can both prevent attacks and save valuable resources time
    Achieving maximum scrutiny to every file inspected, substantially reducing the risk associated with traditional tiered inspection models

    Kelvin Wee, APAC Senior Sales Engineer, Cylance
    12.20pm Future of Application Protection

    Web applications are both crucial to the operations and customer service of many organizations and particularly vulnerable to the Application and DDoS attacks occurring with such prevalence today. Attacker groups understand that preserving application availability is a high priority for most organizations because availability influences application revenue, and therefore any reduction in the quality of service can reduce revenue as well as damage the organization's reputation.

    Detecting attack is the first step to mitigating it and preserving application availability. When trying to determine whether an application is under attacks, any change in the behavioral characteristics of the application should be taken under consideration, because combining information such as access and response rates can give us clear view of the state of the application.

    Ewen Low, Solutions Consultant, F5 Networks
    12.50pm Lunch | Viewing of Technology Showcases
    02.00pm Grand Lucky Draws
    SPONSORS

    client
    client
    client
    client
    client
    client