Registration, breakfast & showcase discovery


Welcome & Opening Address:
- Teng Fang Yih, Editor, Computerworld Malaysia


Keynote Presentation: “GRC: Driving the power of proactive security and risk management in 2011”
In the past few years, organisations have focused on enhancing their compliance and risk management initiatives. While they have been reaping the benefits of a more robust framework and processes to manage the organisation's risk, many worry about the sustainability and practicality of the established processes. A good security risk management program needs to be event-driven based on actual data with clear information delivered to the right stakeholders for decision making. In this presentation, we will discuss the key challenges and tenets of a proactive Governance, Risk, and Compliance initiative, and how organizations are benefiting from leveraging on technology to sustain their security risk management programs.

- Gerry Chng, Partner, Ernst & Young Advisory Pte. Ltd.


3D Security : Combining People, Policies and Enforcement for Unbeatable Protection
With threats such as Stuxnet, Wikileads and Operation Aurora escalating and becoming more sophisticated and targeted, how do you keep your enterprise secure? How many standalone security solutions can you afford to implement to fully protect your network, data and critical assets? To achieve the level of protection needed in the 21st century, security needs to grow from a collection of disparate technologies to an effective business process. With 3D Security, organizations can now implement a blueprint for security that goes beyond technology to ensure the integrity of all information security.

Learn how Check Point 3D Security redefines security as a business process combining policies, people and enforcement for stronger protection across all layers of security—including network, data, and applications.

- Derrick Ng, Regional Sales Manager, Check Point Software Technologies, Singapore


Gaining Back the Edge against Security Threats: New Strategies and Technologies to Survive in Today's Threat Landscape

All indications point to escalating numbers in malware proliferation in the last few years, with annual increases at exponential rates.  Current anti-malware technologies are fighting a losing battle against an army of malware writers who are mounting the war against systems and networks worldwide in an attempt to infiltrate and then steal personal and/or business-sensitive information.  Armed with readily available malware generation and attack toolkits, these malicious elements are creating malware in such volumes that traditional technologies are straining to keep up defenses. In addition, with the increased usage of social networks, cloud computing and virtualised IT infrastructures, individuals and businesses are facing ever increasing risks from exploits and loss of information.

We will analyse the threat trends that are existing currently, and also look at some of the strategies that individuals and businesses can adopt to better protect themselves against threats.  We will also look at the implications that new protection technologies have on the future growth and sophistication of malware.

- Eric Lam, Sales Director Enterprise, Symantec Protection Suites, Symantec APJ Specialist Group


Refreshment Break


The Identity Infused Enterprise
Identity and Access Management (IAM) is central to your overall security and compliance strategies. Yet a mix of physical, virtual and cloud environments, along with the proliferation of social media and new delivery models like SaaS, create a complex environment that poses major new IAM challenges.

Explore crucial IAM topics impacting your business, including:

- Creating an "Identity Infused" enterprise that enables continuous compliance and extends the enterprise to the cloud 
- How to maintain visibility and control of who's accessing sensitive data
- Business value of Identity and Access Management, getting the most from your dollar

- Anthony Turco, Vice President, Identity and Security, Novell Asia Pacific


Security without Compromise

Today’s networks are faster than ever, carrying more information and rich content - as well as potentially malicious payloads. The volume and sophistication of hacker-based attacks have also increased, requiring more accurate detection methods and the ability to block threats before they can do serious damage. Simultaneously, cost-reduction programs are forcing IT departments to consolidate network equipment and operating expenses wherever possible.

Fortinet’s consolidation security strategy and market leading technology enable you to improve security posture while reducing your costs and simplifying your security infrastructure. Learn how we address the needs of large enterprises and telecom operators within the ever-changing security landscape, so wherever you think of security, you’ll think of Fortinet.

- Filippo Cassini, Vice President, Systems Engineering, EMEA and APAC, Fortinet


Panel Discussion / Q&A Session: “Technology, Policy, Enforcement”
In this discussion, we try to determine and/or come to agreement to just how much weight and priority we should give each of the above. Responses to the following questions shall be solicited during this session.

- What can we do by way of smart technology use to secure our infrastructures and our connections with partners and customers?
- Is crowd-sourcing an option for information security?
- What can any organisation do to get the most value out of going the way of the Cloud and at the same time minimise the threats associated with it?
- Does the truly secure infrastructure really have to be one that just about totally sealed?

Participants: All Plenary session speakers, moderated by Computerworld Malaysia


Lunch & Showcase Discovery



When social networking becomes a malware vector; the trusted becomes unacceptable. Real-time Web security defense: your best clout over cybercrime.

The word is out. Cybercriminals are moving into social networking and cloud computing, hitting the most popular communications and enterprise platforms. The Blue Coat Security Report 2011 finds social networking the vector of choice for hackers while legitimate sites and acceptable Web categories have become the favorite hideouts for malware seeking to avoid traditional security solutions. At the rate today’s malware and web-based threats are shifting along with the way users are using the Internet, Enterprises are no longer safe from cybercriminals especially in the first few hours of a Web attack.  Enterprises need to upgrade their Web defenses and develop the right security architecture to protect their mission critical data and infrastructure with a dedicated Web security solution. Find out how to protect your network through the Blue Coat Cloud service where 73 million users collect and analyze real-time inputs of new dynamic links and unrated content to provide best-in-class protection for aggressive Web-borne threats.

- Jonathan Andresen, Director of Product Marketing, Asia Pacific, Blue Coat Systems


Are we secure?
As security professionals and managers, one of the key questions that we are often asked by the management is, “Are we secure?” While there is a growing awareness of the importance of information and IT security at the senior management level, the current compliance driven approach often short-sells security as a compliance issue with little or no demonstrable value to the enterprise business strategy.

The focus of this talk will examine the issues and challenges of the current approach to security, and look at how security can adopt a more business-centric approach to demonstrate its value to the organisation.

Part of the session will also cover how metrics can be designed and used to better assess the dynamic information and IT security risks to enable organisations to better manage their risks.

- Tee Chun Meng, Manager, Ernst & Young Advisory Pte Ltd


Maximum Security, Zero Compromise in Availability and Performance

The recent cyber attack on Nasdaq's IT network showed that even the most resource-rich systems are under constant threat by determined hackers. This latest incident of security breach serves as a reminder that if your business requires the network to secure and manage mission-critical data and services, you would need to be constantly updated on the latest tools and web application-level security solutions to ward off malicious entities plotting multi-angled covert attacks. Understand more about leveled up web application security, without compromising the performance and availability of your applications.

- Kunaciilan Nallappan, Senior Product Marketing Manager, F5 Networks


Lucky Draw
3.45PM End of Programme

BREAKOUT TRACK B; Emergency Procedures


Implementing Multi-layered IT security Strategy
Today’s organisations depend on email and the Internet for business-critical processes. As the importance of these vital communication channels has grown, so too have the malware threats and risks posed by cybercriminals. Malicious coders are now using more sophisticated methods to launch blended email- and web-based virus attacks. Meanwhile, as employees spend more time on the Internet accessing dynamic, user-generated content, corporate networks are more vulnerable to attack than ever before. This means it is now more important than ever for companies to have access to world-class corporate anti-malware protection for multi-platform IT infrastructures. This talk will show you the threat landscape and also how a high value solutions and cost-effective security systems can maximize business productivity and lower the Total Cost of Protection (TCP).

- Bryan Sat, Business Development Manager - SaaS/Cloud Services, SEA Region, Kaspersky Lab


All You Can Eat Cyber Security Incidents: What we saw at Cyber999

The Cyber999 Help Centre had handled 8090 incidents in 2010 and 3563 incidents in Q1 2011 alone. The security incidents handled ranges from intrusion to fraud and malware. 

In his talk, Adli will talk about how the incidents are affecting Malaysians, some initiatives taken and what are the challenges in addressing them.

- Adli Abdul Wahid, Vice President, Cyber Security Responsive Services Division, CyberSecurity Malaysia


Identifying the Threats : Where to Watch

95,000—that’s the number of malware pieces analyzed by SophosLabs every day in 2010, nearly doubling the number of malware pieces we tracked in 2009. This accounts for one unique file every 0.9 seconds, 24 hours per day, each day of the year. It’s a clear sign that the malware threat continues to grow at an alarming rate.  Today, more than ever before, hackers aren’t just producing malware for notoriety—they’re producing it for large financial gain. We track these methods of attack and constantly learn from them so we can block and protect your systems. Here’s a look at the more significant threats of 2010. It’s wise to keep watching these threats, as they’re likely to surface again in 2011.

- Clarence Phua, Director, Sales, South Asia & Korea, Sophos


Lucky Draw


End of Programme


Diamond Sponsors

Platinum Sponsors

Gold Sponsor

Silver Sponsor

Showcase Sponsors