Registration, Breakfast & Showcase Discovery
Welcome Address by Jack Loo, Editor, Computerworld Singapore

The 2011 Global Information Security Survey – “Into the Cloud and Out of the Fog”
The last year has seen a shift in the way we deal with information security. In the borderless world that we now operate in, information is no longer confined within the corporate boundaries. Increasingly, such information is shared with business partners, and employees are demanding access to information anytime, anywhere, often using their own devices. Compounding the challenge is the irreversible wave of opportunities (and risks) brought on by social media.
In this presentation, Ernst & Young will share the results from the Global Information Security Survey on the challenges above, and highlight the changes that organizations need to make to adapt to the changing security landscape in 2012 and beyond.

~ Gerry Chng, Partner, Ernst & Young Advisory
Is Art of War Still Relevant to IT Security in the Age of Mobility and Cloud?
IT Security has always modeled itself after the tactics and strategies distilled from thousands of warfare, but in this age of ubiquitous computing, dispersed data, and blurred boundary between well-meaning users and malicious attacks, is the Art of War still relevant? Do the forts and walls still protect you when there is no longer an identifiable attacker? Come learn how you can build a data centric security framework that will help protect the crown jewels despite the inevitable technology changes.

~ Alex Lei, Director, Strategic Sales Group, Asia South, Symantec
Implementing Effective Multi-layered Enterprise Security with Check Point 3-D Security
The old world security threats are long in the dust and old world defenses are at best, long in the tooth. Today, the threats are multi-vectored and outpace almost every security countermeasure. Recent threats such as the ominous and persistent Advanced Persistent Threats (APT) and botnets, result in stealth attacks that are resilient and hard to defend against - short of completely shutting down network connectivity. Further, connectivity in the enterprise goes beyond desktops and laptops but now infinitely extends to the Cloud and mobile devices. Therefore, there is a critical need for a well-rounded, well thought out, security defense system that goes beyond passive and reactive methods - Check Point 3D Security. Our expert explains just how the Check Point 3D Security framework is used in the real world to deliver effective enterprise security defense.

~ Andrew Namboka, Enterprise Security Technologist, Check Point Software Technologies Ltd
Coffee/Tea Break
Unified Security and the Next Big Thing in IT
In a world that is constantly changing and evolving at an unprecedented rate, it’s difficult to keep pace, especially when it comes to selecting technologies that can help your enterprise move forward. Technologies like cloud computing and mobility have been around for some time now, but the real challenge is in knowing how to secure these channels of information flow. Today, more CIOs are concerned with trying to implement the right technologies while making sure there is no loss of data or exercising control over their employees’ devices. In light of these important challenges Blue Coat brings you “Unified Security: The Next Big Thing in IT”, where we discuss how you can secure your environment in the cloud, and how you can exercise greater control over your data flowing over mobile devices and roaming users.

~ Jonathan Andresen, Director of Product Marketing, Asia Pacific, Blue Coat Systems
Enabling an Agile Response to Security Breaches
The whole game plan has changed and moved towards a new paradigm to attain secure and agile architecture to add, remove, grow, and shrink application and data/storage services on-demand. There is also the need for the ability to understand the context of the user, location, situation, device, & application & dynamically adjust intelligently to changing conditions promptly. How well placed is your organization to handle emergency security incidents such as the compromise of information assets or the loss of service through a denial of service attack? Would you rather be pre-empted of possible attacks of the anomalies, alleviating the possibility of a disastrous incident.  F5 will also explore use cases demonstrating how such risk exposure can be significantly reduced with the adoption of a dynamic application delivery framework.

~ Lim Chin Keng, Director of Field System Engineering and Partner Enablement, ASEAN and Korea, F5 Networks
Building a global trusted cloud eco-system
Cloud Security Alliance (CSA) quickly captured industry thought leadership by being the first mover in several areas due to our philosophy of agility, community and meritocracy. Cloud’s dynamism and the critical decisions being made by the public and private sector today with a long tail of impact have created a growing sense of urgency within CSA to continue our aggressive production of critical research, education and tools into the area of cloud security with the ultimate aim of creating a trusted cloud eco-system.

The Asia Pacific region represents an important part of the future of cloud computing. APAC as a region is making several long term investments into cloud computing. As such, we believe that it is about time that CSA has an APAC strategy, where APAC may play an important role in shaping our global strategy. Thus this presentation will introduce key CSA best practices and touch on CSA’s APAC strategy.

~ Aloysius Cheang, Asia Pacific Strategy Advisor, Cloud Security Alliance
Lunch & Showcase Discovery


This track looks how your organisation builds and gets its security 'heartbeat' right on an assumption of 'zero tolerance' toward all breaches. It is about having an efficient information security framework in place that is best to protect your information assets and the infrastructures that house them.

What critical questions must be answered by your CIO or security that ensures the right strategy, operations, architecture and testing procedures are in place to manage emergency security breaches? This track looks at the response measures and tools available that allows a business to get back on track quickly after a breach.
Building Trust in a high-performance Cloud

The presentation will cover high-level outline of the adoption rate and also the trend of the Cloud Computing. It will elaborate on the areas that organisations should consider prior to the adoption of Cloud Computing. The speaker will also discuss major security issues in Cloud Computing to help organisations examine security and confidentiality issues for their business critical and sensitive data. Finally, the speaker will share examples of security measures to be deployed in a trusted Cloud infrastructure.

~ Freddie Chin, Senior Manager, Security Services, CITIC Telecom International CPC
Update from the Front Lines of the Cyber War

We’ve been discussing cyber war for years, but the discussion is inaccurate. Several issues (cyber crime, cyber espionage, cyber terror) are grouped under the rubric of cyber war, but have different and conflicting agendas. This session will arm you with perspective on the term cyber war and its use in the security industry. Is there real danger? Is it just hype? This discussion will arm you with a rational basis for questioning the assumptions of cyber war. You will get a snapshot of the future of the cyber war and gain a clear understanding of the cost/benefit justification for investment in offense versus defense.

~ Chris Camejo, Director, Global Security Consulting, Integralis
Information Security Management in Kraft Foods

Overview of Kraft's IS security governance strategy. How challenges are addressed, and how has the initiative brought business value to the organisation. Kraft's take on the BYOD trend. How is the organisation dealing with security challenges, and what are the lessons learned.

~ Raymond Lay, Asia Pacific Information Security
& Compliance Manager, Kraft Foods
When your systems go down

Explore the legal ramifications and recourse in the event of breaches/system failures
- What can you do as a CIO or security professional?
- What are the processes to be set in place when breaches/failures occur?
- What can you do to prepare for necessary legal action.

~ Rajesh Sreenivasan, Partner, Head of Technology Media and Telecoms Practice, Rajah & Tann LLP
Mitigating security risks whilst enabling business in an ever changing security threat landscape

Alex will provide an interesting insight as to what the key modern security issues are facing organisations, taking into account disruptive market trends and the ongoing evolution of the threat environment. He will also highlight the Security predictions for 2012 and importantly what fundamental changes organisations need to make to their security strategies to address the ever changing threat landscape.

~ Alex Lim, Regional Director - South East Asia, Websense
Many moving parts – a quickly evolving set of risks

The year 2011 was characterised by major data breaches and targeted attacks on high-profile companies and agencies. Cybercriminals diversified their targets to include new platforms, as business use of mobile devices accelerated. And we saw a number of politically motivated “hacktivist” groups take the media spotlight, even as the more common threats to our cyber security grew. In 2012 we’ll need to be ready for attacks on new platforms and devices—all the places we use data for work and our personal lives.

~ Rob Forsyth, Managing Director, Asia Pacific, Sophos
The Power of Control. Wired and Wireless Security Consolidation

More and more enterprises now want to have better security control over their IT infrastructure. This control is necessary because there are multiple media, data locations, devices and productivity tools. Looking ahead, the 2012 global economic outlook remains clouded with high uncertainty under the shadow of the debt crisis. Security consolidation will remain an important trend as enterprises will be under the pressures to do more with less.

~ Eric Chan, Pre-Sales Consulting Director, SEA & HK, Fortinet

Next Generation Security - protection for the future

In 2012, it has been forecasted that 45% more businesses across Asia Pacific will implement or currently in the process of architecting solutions to embrace Virtualization technology but at what cost? The technology is not new but in its current form offers IT managers powerful tools to consolidate infrastructure, reduce rackspace, save on real estate, power and management while at the same time enabling IT departments the flexibility to rapidly test and deploy new services, but are we rushing in without proper planning to consider the risks? Join Scott Robertson from WatchGuard Technologies Inc., who will address these questions and more.

~ Scott Robertson, Vice President Asia Pacific, WatchGuard Technologies Inc.

Lucky Draw
Lucky Draw
End of Programme
Back to Computerworld Singapore | Hosted by Fairfax Business Media