Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

Information Security Management - Guidelines for Cyber Insurance Date: 16-Apr (Tue)Time: 7:00pm...

"Phishing scams? No more!" Seminar (03 May 2019)

Build a Secure Cyberspace 2019"Phishing scams? No more!" Seminar Date: 2019-05-03Time: 14:30 –...

DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

DevSecOps - Web Application Firewall in a CI/CD Workflow Date: 10 April 2019 (Wed)Time:...

  • Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

    Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

  • "Phishing scams? No more!" Seminar (03 May 2019)

  • DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

    DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

The 17th Info-Security Conference 2016

Date: 28 Jun 2016 (Tue)
Time: 8:30am - 5:30pm
Venue: Room N201 (New Wing), Hong Kong Convention and Exhibition Centre
Language: Sessions to be conducted in English/Cantonese
Registration: http://www.infosecurityproject.com/2016/registration.html

Highlights:

"Securing A Connected World"

The topic of “securing” and protection have been overdone. For over 20 years and most organisations have focused on building the “castle wall” by investing in firewalls, next generation firewalls, malware protection and etc. The reality is that regardless of how much we secure our connected world cyber criminals and attackers will succeed in their attempts to breach our walls. The impact of a cyber attack has far reaching consequences including legal, regulatory and operational and the planning required to deal with such complex and dynamic attacks requires a different and efficient mind set. Furthermore, most companies are unable to discover cyber criminals for an average of 200 days!  Confidential data is long gone by the time businesses even know they have been compromised.

So, the question is, can organisations and businesses respond to cyber attacks. More importantly can organisations respond swiftly and resume business operations?

This year, the 17th Conference 2016, entitled Securing A Connected World aims to unearth the answers and key concepts by being a regional forum on IT security.

For more information: http://www.infosecurityproject.com/2016/the17th_conference_highlights.html