Cloud Security Alliance APAC
  • Home
  • About
    • About Us & Our Team
    • APAC Chapters
    • Newsletter
  • Press Release
  • Research
    • APAC Research Advisory Council (APRAC)
    • APAC Research Initiatives
    • Reports
    • C-STAR
  • Training
    • CCSK Success Stories
  • Events
    • Past & Upcoming Events
    • CXO Roundtable Series
  • CONTACT
    • Contact Us
    • Privacy Notice
  • Home
  • About
    • About Us & Our Team
    • APAC Chapters
    • Newsletter
  • Press Release
  • Research
    • APAC Research Advisory Council (APRAC)
    • APAC Research Initiatives
    • Reports
    • C-STAR
  • Training
    • CCSK Success Stories
  • Events
    • Past & Upcoming Events
    • CXO Roundtable Series
  • CONTACT
    • Contact Us
    • Privacy Notice
  • About
  • Schedule
  • Sponsor
  • Venue
  • Contact Us
<
>
CSA APAC Summit 2016
3rd May, 2016
SUNTEC CONVENTION CENTRE, SINGAPORE
Organizations thrive and survive in the rapidly changing and vapidly competitive world of today by leveraging on every advantage possible. Technology, being the lifeblood of communications and transactions, forms an intrinsic and indispensable tool for nations, enterprises, and individuals.
Cloud technology has evolved from an exciting technology novelty into a white hot resource. Yet, adoption is far from optimal, and technological innovation within the feld continues unabated. Never before has technology been so entwined with organizational optimization as with the advent of cloud. Charting viable directions from the myriad technology permutations for both users and their technology providers can be a daunting proposition.
Which is why we are putting together the CSA APAC Summit 2016. To discuss, update, explain, clarify, and help out map out your future in the Cloud. Brought to you by the people who know Cloud best, the summit will:
​
  • Provide a knowledge pool of technology updates.
  • Engage users in the most relevant vertical sectors to share successes and lessons learnt.
  • Explore the opportunities and challenges of Cloud usage in the diverse markets of the vibrant APAC region.
  • Gather the brightest minds in Cloud.
  • Hotwire your cloud implementation by showcasing the best of breed experiences in case studies.
  • Driving business innovation through new windows of possibilities offered by Cloud adoption.

Conference Organizer

Picture

Supporting Organisations

Picture
Time
Topic
0900 - 0930
Registration
0930 - 0940
Welcome Address
Aloysius Cheang, Executive Vice President, Asia Pacific of Cloud Security Alliance
0940 - 1000
Opening Keynote
Khoong Hock Yun, Assistant Chief Executive Officer (Development) and Chief Data Officer of Infocomm Development Authority of Singapore (IDA)
1000 - 1030
Opening Keynote
Jim Reavis, Co-founder and CEO of Cloud Security Alliance
1030 - 1100
Cybersecurity Threat and Operating in a Trusted Cloud Environment
Wally Lee, Cybersecurity Architect, Cybersecurity Global Practice of Microsoft

The world has gotten more complex. Cybersecurity threats make security harder now for everyone, but public cloud makes it easier as it shifts security load to provider instead of the user. However, moving workloads to cloud requires an organization to learning to trust (establish, validate, maintain) the cloud and shift their security focus to data, identity, and application.  During this session we will discuss how organizations can introduce simple security best practices in their cloud journey to make it smoother and secure.
1100 - 1115
Morning Tea
1115 - 1145
Business Beyond Boundaries, Information In Motion
Todd Partridge, Director of Product Marketing of Intralinks Holdings, Inc.

Across all industries exists the challenge of efficiently managing company data in accordance with defined controls. While there are many tried and true strategies and technologies focused on managing information at rest, today’s enterprise is also tasked with protecting information in motion. As technology becomes more accessible to business users, the enterprise needs to ensure that information security and compliance standards are met. Faced with information leaving the enterprise through a variety of tools outside their control, companies quickly need to address the causes of uncontrolled data leakage and identify solutions for protecting their content.

1145 - 1215
Why You Must Encrypt – And Why The Government Doesn’t Want You To
Daniel Lee, 
APAC Security Solution Evangelist of F5 Networks, Inc.

​Data-security regimes are being challenged by greater movement of often sensitive corporate data to and from mobile devices and cloud services. The industry's answer has been to progressively mandate the use of encryption everywhere – but with governments pursuing investigatory decryption powers, is encryption really all the protection it's cracked up to be? This session will explore available encryption techniques; strategies for deciding what to encrypt and how; encryption's role in good data governance; and the potential implications of government decryption powers.
1215 - 1245
Panel Discussion: “Overcoming the Top Threats to Cloud Computing”
Moderator: 
  • Luciano “J.R.” Santos, Executive Vice President of Research of Cloud Security Alliance
Panelists:
  • Benildus Nadar, Head of Security & Global Delivery of Deep Identity Pte. Ltd
  • Eric T. Ashdown, Cyber Security Managing Partner of Ridge Partners LLC  
  • Kawin Boonyapredee, Managing Director, Asia Pacific of Qualys, Inc.
  • Mandar Bale, Strategic Business Manager, Asia, Pacific & Japan of FireEye

Cloud computing represents the next generation of IT, and can be the more secure option, if understood and managed properly. In this panel, leading industry experts discuss the top security threats to cloud computing usage as defined by Cloud Security Alliance. This panel will review the threat vectors that are unique to or magnified by cloud computing, and discuss proactive security measures that can be deployed to mitigate security risks.  From data protection to policy compliance to attack detection and remediation, the panel will provide state of the art advice that attendees can use today to protect their cloud investments.

1245 - 1400
Lunch
1400 - 1430
Application Security Fast Screening and Classification
Keng Lee, COO of Gapertise Inc.
​

Mobile applications have not only become indispensable to modern life, but have also become part of all organizations. With the emergence of cloud computing technology, organizational reinforcement is needed to adapt to this fundamental change. Cloud computing enables real-time use of applications, offering the enterprise enormous flexibility. Accompanied by the convenience; with the inclusion of applications, security problems resulting from the lack of transparency present challenges to risk management. Cloud Security Alliance Mobile Application Security Testing Initiative strives to create a more secured cloud ecosystem to protect mobile applications. Engineering methods are established by system protection and applied to structure, design testing, and review of applications. The working group co-chair Keng Lee from Gapertise will be sharing our recently released Mobile Application Security Testing whitepaper in this session.
1430 - 1500
The Future of Cloud & IoT Security
Evan Dumas, Head, Emerging Technologies APAC, Middle East, & Africa of Check Point
​

Data center virtualization has come a long way transforming from a hardware focused approach to application focused approach. This has created unique challenges. To complicate matters, cloud environments are becoming more complex with organisations buying from multiple cloud vendors. The Internet of Things (IOT) trend has also further new challenges. In this session, we will share our security strategy in the face of this vulnerability.
1500 - 1530
Enabling Cloud Adoptions with Security & Trust
Dr. Meng-Chow Kang, CISO, APJC Region of Cisco Systems, Inc. 
​

Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, and businesses are increasing using cloud. Despite this, many IT executives remain hesitant to endorse a “cloud-first” approach. While there may be security and privacy challenges, reluctance to migrate to the cloud can potentially increase an organization’s risk rather than mitigating it. This session discusses Cisco's approach towards designing security and trust, addressing the underlying challenges, and enabling rapid cloud adoptions in its enterprise.
1530 - 1600
Afternoon Tea
1600 - 1630
Managing Cloud Computing Paradoxes
David Shearer, CEO of (ISC)2
​

As pressure mounts to leverage the operational expense (OpEx) verse capital expense (CapEx) model that cloud solutions and services provide, many organizations are caught up in a series of perceived and real paradoxes. For example, some organizations feel it’s more difficult to secure information in the cloud, while others believe moving your data to the cloud can actually improve an organization’s information security posture.  Some organizations are drawn to the price point of cloud-based solutions verses on-premises solutions based on price-point, speed of deployment, implementation, adaptability, and elasticity of the cloud. Conversely, other organizations are seeing rapid sprawl of cloud solutions across their enterprise with often sobering security consequences.  This session will provide some suggestions for dealing with paradoxes like these and embracing cloud solutions and services in a more predictable way.
1630 - 1700
Panel Discussion: "Cloud and the Enterprise 2016"
Moderator:
  • Jimmy Sng, Partner, Technology Consulting, Singapore of PricewaterhouseCoopers Consulting
Panelists:
  • Hoo Chuan-Wei, Technical Advisor of Asia Pacific of (ISC)2
  • Richard Keirstead, Audit Director for Technology of Australia and New Zealand Banking Group
  • Sai Honig, Information Security Manager of Waikato District Health Board
  • Simranjit Aujla, Head of Mobile, IoT, Digital; Asia Pacific & Japan of Hewlett Packard Enterprise

Large enterprises accelerated their cloud adoption in 2015, and many are reporting to be "all in". Our panelists have been at the forefront in addressing enterprise security and compliance needs in cloud and will be providing their insights on security innovations in the cloud. Attendees will learn about the key security lessons learned from the perspective of cloud providers. Which best practices are well suited for cloud and which are becoming obsolete? What trends to providers expect to see in 2016 to improve cloud security? Hear from the best and the brightest among cloud providers to learn from their experiences partnering with customers to deliver secure enterprise cloud computing. Understand where Cloud is gaining traction by hearing our findings on Cloud Adoption in APAC!
1700 - 1730
Closing Keynote
Martin Leo, Executive Director of Morgan Stanley Investment Management
1800 - 2100
Cocktail Reception

Silver Sponsor

Picture
Qualys
Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions with over 7,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, Infosys, NTT, Optiv, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). For more information, please visit www.qualys.com.

Venue

Suntec Singapore International Convention 
​& Exhibition Centre
s


1 Raffles Boulevard
Suntec City, 039593 Singapore
+65 63372888
Picture
Picture

Contact Us

For more information, please contact: 
[email protected]
© COPYRIGHT 2022. Cloud Security Alliance. All Right Reserved