Registration, breakfast & showcase discovery
Welcome & Opening Address:
Keynote Presentation: “GRC: Driving the power of proactive security and risk management in 2011”
3D Security : Combining People, Policies and Enforcement for Unbeatable Protection
- Derrick Ng, Regional Sales Manager, Check Point Software Technologies, Singapore
Gaining Back the Edge against Security Threats: New Strategies and Technologies to Survive in Today's Threat Landscape
All indications point to escalating numbers in malware proliferation in the last few years, with annual increases at exponential rates. Current anti-malware technologies are fighting a losing battle against an army of malware writers who are mounting the war against systems and networks worldwide in an attempt to infiltrate and then steal personal and/or business-sensitive information. Armed with readily available malware generation and attack toolkits, these malicious elements are creating malware in such volumes that traditional technologies are straining to keep up defenses. In addition, with the increased usage of social networks, cloud computing and virtualised IT infrastructures, individuals and businesses are facing ever increasing risks from exploits and loss of information.
We will analyse the threat trends that are existing currently, and also look at some of the strategies that individuals and businesses can adopt to better protect themselves against threats. We will also look at the implications that new protection technologies have on the future growth and sophistication of malware.
- Eric Lam, Sales Director Enterprise, Symantec Protection Suites, Symantec APJ Specialist Group
The Identity Infused Enterprise
- Creating an "Identity Infused" enterprise that enables continuous compliance and extends the enterprise to the cloud
- Anthony Turco, Vice President, Identity and Security, Novell Asia Pacific
Security without Compromise
Fortinet’s consolidation security strategy and market leading technology enable you to improve security posture while reducing your costs and simplifying your security infrastructure. Learn how we address the needs of large enterprises and telecom operators within the ever-changing security landscape, so wherever you think of security, you’ll think of Fortinet.
- Filippo Cassini, Vice President, Systems Engineering, EMEA and APAC, Fortinet
Panel Discussion / Q&A Session: “Technology, Policy, Enforcement”
- What can we do by way of smart technology use to secure our infrastructures and our connections with partners and customers?
Participants: All Plenary session speakers, moderated by Computerworld Malaysia
Lunch & Showcase Discovery
BREAKOUT TRACK A; Zero Defence
When social networking becomes a malware vector; the trusted becomes unacceptable. Real-time Web security defense: your best clout over cybercrime.
The word is out. Cybercriminals are moving into social networking and cloud computing, hitting the most popular communications and enterprise platforms. The Blue Coat Security Report 2011 finds social networking the vector of choice for hackers while legitimate sites and acceptable Web categories have become the favorite hideouts for malware seeking to avoid traditional security solutions. At the rate today’s malware and web-based threats are shifting along with the way users are using the Internet, Enterprises are no longer safe from cybercriminals especially in the first few hours of a Web attack. Enterprises need to upgrade their Web defenses and develop the right security architecture to protect their mission critical data and infrastructure with a dedicated Web security solution. Find out how to protect your network through the Blue Coat Cloud service where 73 million users collect and analyze real-time inputs of new dynamic links and unrated content to provide best-in-class protection for aggressive Web-borne threats.
- Jonathan Andresen, Director of Product Marketing, Asia Pacific, Blue Coat Systems
Are we secure?
The focus of this talk will examine the issues and challenges of the current approach to security, and look at how security can adopt a more business-centric approach to demonstrate its value to the organisation.
Part of the session will also cover how metrics can be designed and used to better assess the dynamic information and IT security risks to enable organisations to better manage their risks.
- Tee Chun Meng, Manager, Ernst & Young Advisory Pte Ltd
Maximum Security, Zero Compromise in Availability and Performance
The recent cyber attack on Nasdaq's IT network showed that even the most resource-rich systems are under constant threat by determined hackers. This latest incident of security breach serves as a reminder that if your business requires the network to secure and manage mission-critical data and services, you would need to be constantly updated on the latest tools and web application-level security solutions to ward off malicious entities plotting multi-angled covert attacks. Understand more about leveled up web application security, without compromising the performance and availability of your applications.
- Kunaciilan Nallappan, Senior Product Marketing Manager, F5 Networks
|3.45PM||End of Programme|
BREAKOUT TRACK B; Emergency Procedures
Implementing Multi-layered IT security Strategy
- Bryan Sat, Business Development Manager - SaaS/Cloud Services, SEA Region, Kaspersky Lab
All You Can Eat Cyber Security Incidents: What we saw at Cyber999
In his talk, Adli will talk about how the incidents are affecting Malaysians, some initiatives taken and what are the challenges in addressing them.
- Adli Abdul Wahid, Vice President, Cyber Security Responsive Services Division, CyberSecurity Malaysia
Identifying the Threats : Where to Watch
95,000—that’s the number of malware pieces analyzed by SophosLabs every day in 2010, nearly doubling the number of malware pieces we tracked in 2009. This accounts for one unique file every 0.9 seconds, 24 hours per day, each day of the year. It’s a clear sign that the malware threat continues to grow at an alarming rate. Today, more than ever before, hackers aren’t just producing malware for notoriety—they’re producing it for large financial gain. We track these methods of attack and constantly learn from them so we can block and protect your systems. Here’s a look at the more significant threats of 2010. It’s wise to keep watching these threats, as they’re likely to surface again in 2011.
End of Programme