• Date
  • 11 May, Thursday
  • Location
  • Solaire Resort & Casino
    Ballroom 2 and 5, Level 2
    Aseana Ave, Parañaque, Metro Manila
  • Time
  • 8.00am to 4.30pm

    Panel Moderator

    Attend to win


    Time Event Programme
    08.00am Registration with Morning Refreshments | Viewing of Technology Showcases
    09.00am Welcome
    09.10am Gaining Visibility & Control: Securing Your Organisation from Internal and Outsider Attacks

    Controlling and monitoring privileged access is extremely important to mitigating the risks posed by insider threats, preventing data breaches, and meeting compliance requirements. But security and IT leaders have to walk a fine line between protecting the organization’s critical data to ensure business continuity, and enabling users and administrators to be productive.

    Ho Nam Hoebeke, Channel & Strategic Alliance Director APAC, BeyondTrust
    09.40am The Future of SOC , Actionable Threat Intelligence

    Threat intelligence involves learning about new attacks, adversaries, campaigns, and malware families through distinct pieces of information often referred to as indicators of compromise, or IOCs. The more we make relevant information available to network defenders, the better the odds are that they will find answers to their questions.As security awareness in organisations of all sizes begins to expand, most people realize that they want to know which alerts should be made a priority and which threats the organization is subject to. Who are the threat actors? There is a big difference between commodity and targeted attacks. Answering these questions can lead you to implementing new controls that allow you to better secure the environment.

    Gelo Castro II, Solutions Architect, Palo Alto Networks Philippines
    10.10am Addressing Compliance and Emerging Security Threats

    Organizations today face increasing regulatory and compliance issues from nation and state levels to ensure the network and security infrastructure is continuously monitored and overall risk is reduced to an acceptable level.

    This presentation will highlight the problematic issues surrounding continuous security in today’s market, along with the need to comply to various regulations, and how Tenable solutions has helped organizations across the world gain control and full visibility of their networks and security program to address these challenges.

    Robert Healey, Senior Marketing Director, APAC, Tenable
    10.40am Coffee Break | Viewing of Technology Showcases
    11.00am Learn how SolarWinds is changing the way IT professionals monitor and manage IT infrastructure

    Learn how SolarWinds is changing the way IT professionals monitor and manage IT infrastructure with unexpected simplicity. During this interactive discussion, you will learn about SolarWinds top products, discuss new features and gain insight from real market use cases. The following product will be discussed:

    PerfStack - Visualizing and correlate data to improve troubleshooting
    NetPath – Troubleshoot network performance issues for on-premise, hybrid, and cloud environments
    AppStack– Prevent system downtime with a single view into your entire application stack

    Chris Tan, Regional Sales Manager, SolarWinds
    11.30am See what matters.™ The Gigamon Visibility Platform

    Organizations face increasing volumes of data, traveling faster and faster across diverse networks that span physical, virtual, and cloud environments, connecting to billions of devices. At the same time, they face more—and more varied—threats like cyberterrorism, malware, ransomware. The result is an ever-expanding universe of complexity, cost, and risk. Current approaches to managing, monitoring, and securing critical infrastructure only increase that complexity, cost, and risk. The solution is to simplify and provide pervasive visibility.

    Ng Yeok Chong, SE Director, APAC, Gigamon
    12.00pm Lunch | Viewing of Technology Showcases
    01.00pm Quiz & Games | Lucky Draws
    01.10pm Panel Discussion: Top Security Challenges and Best Practices when Moving to the Cloud and Securing the Cloud

    With an increased reliance on the cloud and more and more valuable data moved to it, CISOs, CIOs, senior info security and technology professionals must work swiftly to secure the data and protect from possible firewall breaches, on or off premise, from the shadow IT enemy within or external cyber threats.

    The weakest link in cloud security, however, is not in its architecture. It lies in the millions of remote devices accessing cloud resources. Cloud security depends on controlling who is let into the network and how much they are trusted.

    Archie Tolentino, Information Security officers Group (ISOG)

    Ho Nam Hoebeke, Channel & Strategic Alliance Director APAC, BeyondTrust
    Gelo Castro II, Solutions Architect, Palo Alto Networks Philippines
    Richard Bussiere, Technical Director, Tenable
    Chris Tan, Regional Sales Manager, SolarWinds
    Ng Yeok Chong, SE Director, APAC, Gigamon
    01.50pm The Pains of Growing with Technology

    Today, with the release of smart phone and technology advances, such as IoT (Internet of Things or Internet of Threat), Cloud, all-of-sudden we are living in a hyper-connected world, which is a new era after globalization.

    With this tremendous change in the world, businesses are seeing the world through the lens of connectivity, which leads to faster growth in business but lack of control. This model creates new opportunity but also brings us new threat!

    Edwyn Goh, Sales Engineer, ASEAN, FireMon
    02.20pm Coffee Break | Viewing of Technology Showcases
    02.40pm The Rise of the IoT sourced DDoS attacks – A Focus on IoT/Mirai botnet

    The IoT security issue has become a very serious concern, and the Mirai botnet was one of the largest IoT-based DDoS attacks observed. In this presentation, our security expert will talk about:

    the recent events that were connected to IoT/Mirai attacks
    what makes IoT/Mirai botnets a serious threat
    an analysis on the Mirai botnets activities from data captured by the Arbor Networks Research team

    Sachlany Kasman, Consulting Engineer, Arbor Networks
    03.10pm Transforming Security Through Visibility

    New devices join your network every hour. Unmanaged notebooks, smartphones and tablets. Internet of Things (IoT) devices of all shapes and sizes. Rogue endpoints. Servers. These devices significantly expand your attack surface yet are invisible to many security products. ForeScout will share how you can see them, control them and orchestrate system-wide response.

    Michael Lafuente, Systems Engineer, APAC, ForeScout Technologies
    03.40pm Solutions Integration Presentation
    04.30pm Grand Lucky Draws | Event End