Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

Certified Information Systems Security Professional (CISSP®) certification Date: 25-29 June,...

Supporting Event: GDPR Hands-on workshop 2018 (26 Jun 2018)

GDPR Hands-on workshop 2018 Date: 26th June, 2018 (Tue)Time: 9:00am - 6:00PM (Whole day workshop...

Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

1. CISSP Online Instructor-Led Training30 Apr - 27 Jun 2018 (19:00-21:30 | GMT+8)Training Only:...

  • Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

    Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25...

  • Supporting Event: GDPR Hands-on workshop 2018 (26 Jun 2018)

  • Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

    Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

The 17th Info-Security Conference 2016

Date: 28 Jun 2016 (Tue)
Time: 8:30am - 5:30pm
Venue: Room N201 (New Wing), Hong Kong Convention and Exhibition Centre
Language: Sessions to be conducted in English/Cantonese
Registration: http://www.infosecurityproject.com/2016/registration.html

Highlights:

"Securing A Connected World"

The topic of “securing” and protection have been overdone. For over 20 years and most organisations have focused on building the “castle wall” by investing in firewalls, next generation firewalls, malware protection and etc. The reality is that regardless of how much we secure our connected world cyber criminals and attackers will succeed in their attempts to breach our walls. The impact of a cyber attack has far reaching consequences including legal, regulatory and operational and the planning required to deal with such complex and dynamic attacks requires a different and efficient mind set. Furthermore, most companies are unable to discover cyber criminals for an average of 200 days!  Confidential data is long gone by the time businesses even know they have been compromised.

So, the question is, can organisations and businesses respond to cyber attacks. More importantly can organisations respond swiftly and resume business operations?

This year, the 17th Conference 2016, entitled Securing A Connected World aims to unearth the answers and key concepts by being a regional forum on IT security.

For more information: http://www.infosecurityproject.com/2016/the17th_conference_highlights.html