Understanding What is New in China Cybersecurity Law and What We Cannot Do (26 Apr 2018)

Understanding What is New in China Cybersecurity Law and What We Cannot Do (26 Apr 2018)

Understanding What is New in China Cybersecurity Law and What We Cannot Do Date: 26-April 2018...

Supporting Event: "Stay Smart, Keep Cyber Scam Away" Seminar (25 May 2018)

"Stay Smart, Keep Cyber Scam Away" SeminarBuild a Secure Cyberspace 2018 Date: 2018-05-25Time:...

(ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management (9 May 2018)

(ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management (9 May 2018)

(ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API...

  • Understanding What is New in China Cybersecurity Law and What We Cannot Do (26 Apr 2018)

    Understanding What is New in China Cybersecurity Law and What We Cannot Do (26 Apr 2018)

  • Supporting Event: "Stay Smart, Keep Cyber Scam Away" Seminar (25 May 2018)

  • (ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management (9 May 2018)

    (ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management (9...

Build a Secure Cyberspace 2017 – "Smart Home, Safe Living" Seminar

Date: 20-Sep-2017 (Wed)
Time: 9:00am - 5:30pm
Venue: Conference Hall, 4/F, HKPC Building, 78 Tat Chee Avenue, Kowloon Tong, Kowloon
Language: Cantonese
Charge: Free (Registration is required)
Registration: https://www.hkcert.org/my_url/event/17092001

Highlight

With the rapid development of the Internet technology, the variety and popularity of digital devices with internet connectivity such as wearable devices, IP camera, home appliances, etc. have grown considerably in recent years. They improve the operational efficiency of businesses and change the ways people live. However, they also present unprecedented challenges to cyber security and privacy. Both organisations and individuals must understand the risks associated with internet-connected devices, stay vigilant against vulnerabilities and take appropriate security measures to safeguard and protect the devices and data. In this seminar, information security experts will introduce security best practices and share their experience on how to protect information systems and assets, so that everyone can continue to enjoy the convenience and fun brought about by technology.