Supporting Event: Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection Webinar (06 Mar 2019)

Supporting Event: Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection Webinar (06 Mar 2019)

Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection Webinar Date:...

Supporting Event: Asia Pacific CACS Conference 2019 (1-3 Apr 2019)

Supporting Event: Asia Pacific CACS Conference 2019 (1-3 Apr 2019)

Asia Pacific CACS Conference 2019 Date: 1 Apr (Conference) / 2-3 Apr (Workshops)Time: 8:30am -...

Supporting Event: Certified Cloud Security Professional (CCSP) certification (4 Mar 2019)

Supporting Event: Certified Cloud Security Professional (CCSP) certification (4 Mar 2019)

Certified Cloud Security Professional (CCSP) certification Date: 4-8 March, 2019Time: 9:00am -...

  • Supporting Event: Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection Webinar (06 Mar 2019)

    Supporting Event: Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection...

  • Supporting Event: Asia Pacific CACS Conference 2019 (1-3 Apr 2019)

    Supporting Event: Asia Pacific CACS Conference 2019 (1-3 Apr 2019)

  • Supporting Event: Certified Cloud Security Professional (CCSP) certification (4 Mar 2019)

    Supporting Event: Certified Cloud Security Professional (CCSP) certification (4 Mar 2019)

The 17th Info-Security Conference 2016

Date: 28 Jun 2016 (Tue)
Time: 8:30am - 5:30pm
Venue: Room N201 (New Wing), Hong Kong Convention and Exhibition Centre
Language: Sessions to be conducted in English/Cantonese
Registration: http://www.infosecurityproject.com/2016/registration.html

Highlights:

"Securing A Connected World"

The topic of “securing” and protection have been overdone. For over 20 years and most organisations have focused on building the “castle wall” by investing in firewalls, next generation firewalls, malware protection and etc. The reality is that regardless of how much we secure our connected world cyber criminals and attackers will succeed in their attempts to breach our walls. The impact of a cyber attack has far reaching consequences including legal, regulatory and operational and the planning required to deal with such complex and dynamic attacks requires a different and efficient mind set. Furthermore, most companies are unable to discover cyber criminals for an average of 200 days!  Confidential data is long gone by the time businesses even know they have been compromised.

So, the question is, can organisations and businesses respond to cyber attacks. More importantly can organisations respond swiftly and resume business operations?

This year, the 17th Conference 2016, entitled Securing A Connected World aims to unearth the answers and key concepts by being a regional forum on IT security.

For more information: http://www.infosecurityproject.com/2016/the17th_conference_highlights.html