-
About
-
Schedule
-
Sponsor
-
Venue
-
Contact Us
<
>
CSA APAC Summit 2016
3rd May, 2016
SUNTEC CONVENTION CENTRE, SINGAPORE
3rd May, 2016
SUNTEC CONVENTION CENTRE, SINGAPORE
Organizations thrive and survive in the rapidly changing and vapidly competitive world of today by leveraging on every advantage possible. Technology, being the lifeblood of communications and transactions, forms an intrinsic and indispensable tool for nations, enterprises, and individuals.
Cloud technology has evolved from an exciting technology novelty into a white hot resource. Yet, adoption is far from optimal, and technological innovation within the feld continues unabated. Never before has technology been so entwined with organizational optimization as with the advent of cloud. Charting viable directions from the myriad technology permutations for both users and their technology providers can be a daunting proposition.
Which is why we are putting together the CSA APAC Summit 2016. To discuss, update, explain, clarify, and help out map out your future in the Cloud. Brought to you by the people who know Cloud best, the summit will:
Cloud technology has evolved from an exciting technology novelty into a white hot resource. Yet, adoption is far from optimal, and technological innovation within the feld continues unabated. Never before has technology been so entwined with organizational optimization as with the advent of cloud. Charting viable directions from the myriad technology permutations for both users and their technology providers can be a daunting proposition.
Which is why we are putting together the CSA APAC Summit 2016. To discuss, update, explain, clarify, and help out map out your future in the Cloud. Brought to you by the people who know Cloud best, the summit will:
- Provide a knowledge pool of technology updates.
- Engage users in the most relevant vertical sectors to share successes and lessons learnt.
- Explore the opportunities and challenges of Cloud usage in the diverse markets of the vibrant APAC region.
- Gather the brightest minds in Cloud.
- Hotwire your cloud implementation by showcasing the best of breed experiences in case studies.
- Driving business innovation through new windows of possibilities offered by Cloud adoption.
Conference Organizer
Supporting Organisations
Time |
Topic |
0900 - 0930 |
Registration |
0930 - 0940 |
Welcome Address Aloysius Cheang, Executive Vice President, Asia Pacific of Cloud Security Alliance |
0940 - 1000 |
Opening Keynote Khoong Hock Yun, Assistant Chief Executive Officer (Development) and Chief Data Officer of Infocomm Development Authority of Singapore (IDA) |
1000 - 1030 |
Opening Keynote Jim Reavis, Co-founder and CEO of Cloud Security Alliance |
1030 - 1100 |
Cybersecurity Threat and Operating in a Trusted Cloud Environment Wally Lee, Cybersecurity Architect, Cybersecurity Global Practice of Microsoft The world has gotten more complex. Cybersecurity threats make security harder now for everyone, but public cloud makes it easier as it shifts security load to provider instead of the user. However, moving workloads to cloud requires an organization to learning to trust (establish, validate, maintain) the cloud and shift their security focus to data, identity, and application. During this session we will discuss how organizations can introduce simple security best practices in their cloud journey to make it smoother and secure. |
1100 - 1115 |
Morning Tea |
1115 - 1145 |
Business Beyond Boundaries, Information In Motion Todd Partridge, Director of Product Marketing of Intralinks Holdings, Inc. Across all industries exists the challenge of efficiently managing company data in accordance with defined controls. While there are many tried and true strategies and technologies focused on managing information at rest, today’s enterprise is also tasked with protecting information in motion. As technology becomes more accessible to business users, the enterprise needs to ensure that information security and compliance standards are met. Faced with information leaving the enterprise through a variety of tools outside their control, companies quickly need to address the causes of uncontrolled data leakage and identify solutions for protecting their content. |
1145 - 1215 |
Why You Must Encrypt – And Why The Government Doesn’t Want You To Daniel Lee, APAC Security Solution Evangelist of F5 Networks, Inc. Data-security regimes are being challenged by greater movement of often sensitive corporate data to and from mobile devices and cloud services. The industry's answer has been to progressively mandate the use of encryption everywhere – but with governments pursuing investigatory decryption powers, is encryption really all the protection it's cracked up to be? This session will explore available encryption techniques; strategies for deciding what to encrypt and how; encryption's role in good data governance; and the potential implications of government decryption powers. |
1215 - 1245 |
Panel Discussion: “Overcoming the Top Threats to Cloud Computing” Moderator:
Cloud computing represents the next generation of IT, and can be the more secure option, if understood and managed properly. In this panel, leading industry experts discuss the top security threats to cloud computing usage as defined by Cloud Security Alliance. This panel will review the threat vectors that are unique to or magnified by cloud computing, and discuss proactive security measures that can be deployed to mitigate security risks. From data protection to policy compliance to attack detection and remediation, the panel will provide state of the art advice that attendees can use today to protect their cloud investments. |
1245 - 1400 |
Lunch |
1400 - 1430 |
Application Security Fast Screening and Classification Keng Lee, COO of Gapertise Inc. Mobile applications have not only become indispensable to modern life, but have also become part of all organizations. With the emergence of cloud computing technology, organizational reinforcement is needed to adapt to this fundamental change. Cloud computing enables real-time use of applications, offering the enterprise enormous flexibility. Accompanied by the convenience; with the inclusion of applications, security problems resulting from the lack of transparency present challenges to risk management. Cloud Security Alliance Mobile Application Security Testing Initiative strives to create a more secured cloud ecosystem to protect mobile applications. Engineering methods are established by system protection and applied to structure, design testing, and review of applications. The working group co-chair Keng Lee from Gapertise will be sharing our recently released Mobile Application Security Testing whitepaper in this session. |
1430 - 1500 |
The Future of Cloud & IoT Security Evan Dumas, Head, Emerging Technologies APAC, Middle East, & Africa of Check Point Data center virtualization has come a long way transforming from a hardware focused approach to application focused approach. This has created unique challenges. To complicate matters, cloud environments are becoming more complex with organisations buying from multiple cloud vendors. The Internet of Things (IOT) trend has also further new challenges. In this session, we will share our security strategy in the face of this vulnerability. |
1500 - 1530 |
Enabling Cloud Adoptions with Security & Trust Dr. Meng-Chow Kang, CISO, APJC Region of Cisco Systems, Inc. Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, and businesses are increasing using cloud. Despite this, many IT executives remain hesitant to endorse a “cloud-first” approach. While there may be security and privacy challenges, reluctance to migrate to the cloud can potentially increase an organization’s risk rather than mitigating it. This session discusses Cisco's approach towards designing security and trust, addressing the underlying challenges, and enabling rapid cloud adoptions in its enterprise. |
1530 - 1600 |
Afternoon Tea |
1600 - 1630 |
Managing Cloud Computing Paradoxes David Shearer, CEO of (ISC)2 As pressure mounts to leverage the operational expense (OpEx) verse capital expense (CapEx) model that cloud solutions and services provide, many organizations are caught up in a series of perceived and real paradoxes. For example, some organizations feel it’s more difficult to secure information in the cloud, while others believe moving your data to the cloud can actually improve an organization’s information security posture. Some organizations are drawn to the price point of cloud-based solutions verses on-premises solutions based on price-point, speed of deployment, implementation, adaptability, and elasticity of the cloud. Conversely, other organizations are seeing rapid sprawl of cloud solutions across their enterprise with often sobering security consequences. This session will provide some suggestions for dealing with paradoxes like these and embracing cloud solutions and services in a more predictable way. |
1630 - 1700 |
Panel Discussion: "Cloud and the Enterprise 2016" Moderator:
Large enterprises accelerated their cloud adoption in 2015, and many are reporting to be "all in". Our panelists have been at the forefront in addressing enterprise security and compliance needs in cloud and will be providing their insights on security innovations in the cloud. Attendees will learn about the key security lessons learned from the perspective of cloud providers. Which best practices are well suited for cloud and which are becoming obsolete? What trends to providers expect to see in 2016 to improve cloud security? Hear from the best and the brightest among cloud providers to learn from their experiences partnering with customers to deliver secure enterprise cloud computing. Understand where Cloud is gaining traction by hearing our findings on Cloud Adoption in APAC! |
1700 - 1730 |
Closing Keynote Martin Leo, Executive Director of Morgan Stanley Investment Management |
1800 - 2100 |
Cocktail Reception |
Silver Sponsor |
Qualys
Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions with over 7,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, Infosys, NTT, Optiv, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). For more information, please visit www.qualys.com. |
Contact Us |