Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

Information Security Management - Guidelines for Cyber Insurance Date: 16-Apr (Tue)Time: 7:00pm...

"Phishing scams? No more!" Seminar (03 May 2019)

Build a Secure Cyberspace 2019"Phishing scams? No more!" Seminar Date: 2019-05-03Time: 14:30 –...

DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

DevSecOps - Web Application Firewall in a CI/CD Workflow Date: 10 April 2019 (Wed)Time:...

  • Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

    Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

  • "Phishing scams? No more!" Seminar (03 May 2019)

  • DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

    DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

Build a Secure Cyberspace 2017 – "Smart Home, Safe Living" Seminar

Date: 20-Sep-2017 (Wed)
Time: 9:00am - 5:30pm
Venue: Conference Hall, 4/F, HKPC Building, 78 Tat Chee Avenue, Kowloon Tong, Kowloon
Language: Cantonese
Charge: Free (Registration is required)
Registration: https://www.hkcert.org/my_url/event/17092001

Highlight

With the rapid development of the Internet technology, the variety and popularity of digital devices with internet connectivity such as wearable devices, IP camera, home appliances, etc. have grown considerably in recent years. They improve the operational efficiency of businesses and change the ways people live. However, they also present unprecedented challenges to cyber security and privacy. Both organisations and individuals must understand the risks associated with internet-connected devices, stay vigilant against vulnerabilities and take appropriate security measures to safeguard and protect the devices and data. In this seminar, information security experts will introduce security best practices and share their experience on how to protect information systems and assets, so that everyone can continue to enjoy the convenience and fun brought about by technology.