|08.30am||Registration with Morning Refreshments | Viewing of Technology Showcases|
|09.40am||Gaining Visibility & Control: Securing Your Organisation from Internal and Outsider Attacks
Controlling and monitoring privileged access is extremely important to mitigating the risks posed by insider threats, preventing data breaches, and meeting compliance requirements. But security and IT leaders have to walk a fine line between protecting the organization’s critical data to ensure business continuity, and enabling users and administrators to be productive.
Ho Nam Hoebeke, Channel & Strategic Alliance Director APAC, BeyondTrust
|10.10am||Cyber Security – Protecting Business, IOT, Cloud and Mobile Systems
The move to cloud, mobility and the explosion of IOT are fundamentally changing the way organisations do business. Unfortunately, they have also opened up new vulnerabilities that hackers are activity exploiting. BlackBerry, leveraging its well established pedigree of providing solutions to global organizations and governments around the world, looks at what tools BlackBerry Secure can provide to help organizations secure their critical data.
Simon Green, Channel Account Manager, SE Asia, BlackBerry
|10.40am||Addressing Compliance and Emerging Security Threats
Organizations today face increasing regulatory and compliance issues from nation and state levels to ensure the network and security infrastructure is continuously monitored and overall risk is reduced to an acceptable level.
This presentation will highlight the problematic issues surrounding continuous security in today’s market, along with the need to comply to various regulations, and how Tenable solutions has helped organizations across the world gain control and full visibility of their networks and security program to address these challenges.
Kannan Velayutham, Consultant, Tenable
|11.10am||Viewing of Technology Showcases | Break|
|11.30am||Simplifying & Securing Access to Business Application
As the demands of secure web access becomes more complex organizations face some formidable challenges. For today’s professionals, work is an activity, not a place. Meaning, today’s professionals cannot be disconnected from the business just because they are out of the office or on the road. The question is how to simplify access to services and resources without increasing risk to your business? How to protect your mission critical business application?
Fredric Teo, Sales Engineer, Micro Focus
|12.00pm||Using Artificial Intelligence (AI) and Mathematics to Combat Malicious Code
Kelvin Wee, APAC Senior Sales Engineer, Cylance
|12.30pm||Future of Application Protection
Web applications are both crucial to the operations and customer service of many organizations and particularly vulnerable to the Application and DDoS attacks occurring with such prevalence today. Attacker groups understand that preserving application availability is a high priority for most organizations because availability influences application revenue, and therefore any reduction in the quality of service can reduce revenue as well as damage the organization's reputation.
Detecting attack is the first step to mitigating it and preserving application availability. When trying to determine whether an application is under attacks, any change in the behavioral characteristics of the application should be taken under consideration, because combining information such as access and response rates can give us clear view of the state of the application.
Ewen Low, Solutions Consultant, F5 Networks
|01.00pm||Lunch | Viewing of Technology Showcases|
|01.45pm||Grand Lucky Draws|
© Copyright 2017. WestconGroup, Inc. All Rights Reserved.