CLOUDSEC Congress 2014 - Asia Pacific, Singapore
Date: Sep 03, 2014
Time: 08:30 AM to 05:30 PM
Venue: Suntec Convention & Exhibition Centre, Singapore, Singapore
Address: 1 Raffles Boulevard, Singapore 039593

Day 1 (Tuesday, 2 September 2014): CIO Forum 2014  (Private Event)
Day 2 (Wednesday, 3 September 2014):  Main Event
Day 3 (Thursday, 4 September 2014): CIO Forum 2014  (Private Event)

Time Agenda Venue
8:00am Arrival & Registration  
9:00am Raimund Genes, CTO, TREND MICRO  
9:30am Bob Flores, Former CTO, CENTRAL INTELLIGENCE AGENCY
10:00am Dr Madan Mohan Oberoi, Director, IGCI, INTERPOL
10:30am Break
11:00am JD Sherry, Vice President, Technology & Solutions, TREND MICRO
11:30am Dr Lee Hing Yan, Director, National Cloud Computing Office, IDA
Tao Yao Sing, Assistant Director, National Cloud Computing Office, IDA
12:00pm

Moderator: Ken Low, Executive Director, CLOUDSEC 2014
Panelists: Bob Flores, Former CTO, CENTRAL INTELLIGENCE AGENCY; Dr Madan Mohan Oberoi, Director, IGCI, INTERPOL ; JD Sherry, Vice President, Technology & Solutions, TREND MICRO; Dr Lee Hing Yan, Director, National Cloud Computing Office, IDA; Jim Reavis, CEO, CLOUD SECURITY ALLIANCE

12:30pm Lunch (Private Event, VIP Room)
Time Track 1 Track 2 Track 3 Workshops
1:30pm Omar Rafiq, Regional Sales Manager, ASEAN Networking & Security Business Unit, VMWARE Software Defined Perimeter: Building Secure Global Networks in the Age of Technology Consumerization
Freddy Tan, APAC Strategic Advisor, CLOUD SECURITY ALLIANCE

 

 

Session 1: 1.30pm – 2.15pm
Session 2: 2.15pm – 3.00pm

2:00pm Chris Taylor, Director of Product Marketing, TREND MICRO Erick Stephens, Chief Technology Officer, APAC, Public Sector, MICROSOFT Cloud Computing Security – The Soft Spot (Reprise)
Anthony Lim, Board Member, Singapore Chapter, CLOUD SECURITY ALLIANCE
2:30 pm Poh Wah Lee, Chief Partner Solutions Strategist, South East Asia, VMWARE David Ng, Business Manager, TREND MICRO Next Generation Cyber Defenders: Cyber Defence And The Human Element
Meny Har, CTO, DigiSAFE Cyber Security Centre, ST ELECTRONICS (INFO-SECURITY) PTE LTD
 
3:00pm
Break
3:30pm Richard Sheng, Senior Director, Enterprise Security, TREND MICRO

Architecting A Secure Financial Product In The Cloud

Paul Hidalgo
Platform Manager, Match Move Global


 

 

 


Session 3: 3.30pm – 4.15pm
Session 4: 4.15pm – 5.00pm

4:00pm Kenneth Yip, APJ TippingPoint Product Manager, Enterprise Security Products, HP Raju Chellam, Head, Big Data, Cloud, Healthcare, Governement, South Asia, DELL

SS 584: 2013 / Multi Tier Cloud Security Standard And ISO 27001:2013 - Benefits/ Features Of Cloud Security Certification That ‘Enable’ Business

Indranil Mukherjee, Managing Director, Singapore ISC Ltd

4:30pm Samir Roshan Strategic Architect, APJ, NUTANIX Junichiro Akanuma, Executive Director of Business Solutions Department, Business Division, NTT COMMUNICATIONS Mark AMES, Director, Program (Seminar), Singapore Chapter, ISACA
5:00pm Paul Henry, Senior Instructor, SANS
5:30pm
Lucky Draw
6:00pm
Close

Click here to download Program Guide

 

Raimund Genes Raimund Genes Chief Technology Officer Trend Micro arrow
Bob Flores Bob Flores Former CTO, CENTRAL INTELLIGENCE AGENCY Founder & Partner, COGNITO CORP arrow
Dr Madan Mohan Oberoi Dr Madan Mohan Oberoi Director of Cyber Innovation & Outreach IGCI INTERPOL arrow
JD Sherry JD Sherry Vice President of Technology & Solutions Trend Micro arrow
Dr. Lee Hing-Yan Dr. Lee Hing-Yan National Cloud Computing Office Infocomm Development Authority of Singapore arrow
Yao-Sing TAO Yao-Sing TAO Assistant Director at the National Cloud Computing Office Infocomm Development Authority of Singapore arrow
Jim Reavis Jim Reavis Co-Founder & Executive Director Cloud Security Alliance (CSA) arrow
Paul A. Henry Paul A. Henry Senior Instructor, SANS arrow
Anthony Lim Anthony Lim Board Member, Singapore Chapter CLOUD SECURITY ALLIANCE arrow
Chris Taylor Chris Taylor Director of Product Marketing TREND MICRO arrow
David Ng David Ng APAC Product Marketing Manager Trend Micro arrow
Erick Stephens Erick Stephens Chief Technology Officer, APAC, Public Sector MICROSOFT arrow
Freddy Tan Freddy Tan APAC Strategic Advisor CLOUD SECURITY ALLIANCE arrow
Indranil  Mukherjee Indranil Mukherjee Managing Director Asia Pacific Singapore ISC Ltd arrow
Junichiro Akanuma Junichiro Akanuma Executive Director of Business Solutions Department, Business Division, NTT Communications arrow
Ken Low Ken Low Executive Director CLOUDSEC 2014 arrow
Kenneth Yip Kenneth Yip APJ TippingPoint Product Manager, HP Enterprise Security Products arrow
Mark AMES Mark AMES Associate Director KPMG arrow
Meny Har Meny Har CTO, DigiSAFE Cyber Security Centre ST Electronics (Info-Security) arrow
Markku Lepisto Markku Lepisto Principal Technology Evangelist, APAC Amazon Web Services arrow
Omar Rafiq Omar Rafiq Regional Sales Manager, ASEAN Networking & Security Business Unit arrow
Poh Wah Lee Poh Wah Lee Chief Partner Solutions Strategist, South East Asia, VMware arrow
Raju Chellam Raju Chellam Cloud Practice Head, South Asia & Korea DELL arrow
Richard Sheng Richard Sheng Senior Director of Enterprise Security Trend Micro arrow
Samir Roshan Samir Roshan Strategic Architect, APJ Nutanix arrow
William Tay William Tay Principal Platform Strategist, Public Sector, MICROSOFT arrow
Hosted By    
Trend Micro Incorporated    

Platinum Sponsor

Gold Sponsor

Silver Sponsor

Supporters

Exhibitor

PresentationsPresenterTypeDate
Advance Targeted Attack: From Castles to Super Max Prison  Richard Sheng TrackSeptember 2014
Cloud Computing Security – The Soft Spot (Reprise)  Anthony Lim TrackSeptember 2014
Cloud Security: For the Users & By the Users  Yao-Sing TAO KeynotesSeptember 2014
Cyber Security in the Cloud  Mark AMES TrackSeptember 2014
Data Protection in Multi-Hypervisor Environments with Web-scale Hyper Converged Infrastructure  Samir Roshan TrackSeptember 2014
Extend the Benefits of Desktop and Application Virtualization with VMware Horizon 6  Poh Wah Lee TrackSeptember 2014
Incident Response & Forendsics In The Cloud  Paul A. Henry TrackSeptember 2014
Internet-Of-Your-Things: Rethinking the security paradigm  William Tay TrackSeptember 2014
INTERPOL’s Role and Effort in Combating Cybercrime  Dr Madan Mohan Oberoi KeynotesSeptember 2014
Is Your Toaster An Insider Threat?  Bob Flores KeynotesSeptember 2014
MatchMove Wallet  Paul Hidalgo TrackSeptember 2014
Network Virtualization and Security Platform for The Software-Defined Data Center  Omar Rafiq TrackSeptember 2014
Next Generation Cyber Defenders: Cyber Defence And The Human Element  Meny Har TrackSeptember 2014
Next Generation Threat Defence  JD Sherry KeynotesSeptember 2014
Secure Your Enterprise in ABC  Raju Chellam TrackSeptember 2014
Securing The Internet of Everything  Raimund Genes KeynotesSeptember 2014
Shifting to SaaS and Cloud Apps without Losing Security and Visibility  Chris Taylor TrackSeptember 2014
Software Defeined Perimeter Building Secure Global Networks in Age of Technology Consumerisation  Freddy Tan TrackSeptember 2014
SS 584: 2013 Multi-Tier Cloud Security Standard & ISO 27001: 2013 – Benefits/ Features Of Cloud Security Certification That ‘Enable’ Business  Indranil Mukherjee TrackSeptember 2014
The Surprising Future of “The Internet of Things”  Kenneth Yip TrackSeptember 2014
Trustworthy Cloud Initiative  Erick Stephens TrackSeptember 2014
What You Should Consider About Security  Junichiro Akanuma TrackSeptember 2014

Photos

Images with fixed dimensions
images/35x35/1.jpg
  1. 1 of 131

  2. 2 of 131

  3. 3 of 131

  4. 4 of 131

  5. 5 of 131

  6. 6 of 131

  7. 7 of 131

  8. 8 of 131

  9. 9 of 131

  10. 10 of 131

  11. 11 of 131

  12. 12 of 131

  13. 13 of 131

  14. 14 of 131

  15. 15 of 131

  16. 16 of 131

  17. 17 of 131

  18. 18 of 131

  19. 19 of 131

  20. 20 of 131

  21. 21 of 131

  22. 22 of 131

  23. 23 of 131

  24. 24 of 131

  25. 25 of 131

  26. 26 of 131

  27. 27 of 131

  28. 28 of 131

  29. 29 of 131

  30. 30 of 131

  31. 31 of 131

  32. 32 of 131

  33. 33 of 131

  34. 34 of 131

  35. 35 of 131

  36. 36 of 131

  37. 37 of 131

  38. 38 of 131

  39. 39 of 131

  40. 40 of 131

  41. 41 of 131

  42. 42 of 131

  43. 43 of 131

  44. 44 of 131

  45. 45 of 131

  46. 46 of 131

  47. 47 of 131

  48. 48 of 131

  49. 49 of 131

  50. 50 of 131

  51. 51 of 131

  52. 52 of 131

  53. 53 of 131

  54. 54 of 131

  55. 55 of 131

  56. 56 of 131

  57. 57 of 131

  58. 58 of 131

  59. 59 of 131

  60. 60 of 131

  61. 61 of 131

  62. 62 of 131

  63. 63 of 131

  64. 64 of 131

  65. 65 of 131

  66. 66 of 131

  67. 67 of 131

  68. 68 of 131

  69. 69 of 131

  70. 70 of 131

  71. 71 of 131

  72. 72 of 131

  73. 73 of 131

  74. 74 of 131

  75. 75 of 131

  76. 76 of 131

  77. 77 of 131

  78. 78 of 131

  79. 79 of 131

  80. 80 of 131

  81. 81 of 131

  82. 82 of 131

  83. 83 of 131

  84. 84 of 131

  85. 85 of 131

  86. 86 of 131

  87. 87 of 131

  88. 88 of 131

  89. 89 of 131

  90. 90 of 131

  91. 91 of 131

  92. 92 of 131

  93. 93 of 131

  94. 94 of 131

  95. 95 of 131

  96. 96 of 131

  97. 97 of 131

  98. 98 of 131

  99. 99 of 131

  100. 100 of 131

  101. 101 of 131

  102. 102 of 131

  103. 103 of 131

  104. 104 of 131

  105. 105 of 131

  106. 106 of 131

  107. 107 of 131

  108. 108 of 131

  109. 109 of 131

  110. 110 of 131

  111. 111 of 131

  112. 112 of 131

  113. 113 of 131

  114. 114 of 131

  115. 115 of 131

  116. 116 of 131

  117. 117 of 131

  118. 118 of 131

  119. 119 of 131

  120. 120 of 131

  121. 121 of 131

  122. 122 of 131

  123. 123 of 131

  124. 124 of 131

  125. 125 of 131

  126. 126 of 131

  127. 127 of 131

  128. 128 of 131

  129. 129 of 131

  130. 130 of 131

  131. 131 of 131


Video



Press Release

DateTitlePublication
Sep 14, 2014 Computerworld Singapore Online – Cyber defense is a combined effort of the organisation and government Computerworld Singapore Online
Sep 14, 2014 Convergence Asia - Standardisation and regulation important to IoT Convergence Asia
Sep 11, 2014 TechGoondu – Experts: regulation needed to secure Internet of Things Techgoondu
Sep 10, 2014 HardwareZone Singapore – Trend Micro enhances capabilities to protect cloud connected Microsoft Office 365 users HardwareZone Singapore
Sep 09, 2014 CIO Asia Online – Cyber defense is a combined effort of the organisation and government CIO-Asia Online
Sep 09, 2014 MIS Asia Online – Cyber defense is a combined effort of the organisation and government MIS-Asia Online
Sep 08, 2014 The Tech Revolutionist – CLOUDSEC 2014 Addresses The Internet of Everything and its Key Security Issues The Tech Revolutionist
Sep 05, 2014 CNBC Asia TV – Street Signs CNBC Asia TV
Sep 05, 2014 CNBC Asia Online – Street Signs CNBC Asia Online
Sep 04, 2014 Bloomberg TV Online – First Up Bloomberg TV Online
Sep 04, 2014 TODAY – Use multi-factor authentication urges CIA veteran TODAY
Sep 04, 2014 TODAY – Use multi-factor authentication urges CIA veteran TODAY Online
Sep 04, 2014 BBC Asia – Asia Business Report BBC Asia
Sep 03, 2014 Channel NewsAsia – News Now Channel NewsAsia
Sep 02, 2014 Bloomberg TV – First Up Bloomberg TV
Apr 09, 2014 Assessing Current and Emerging Cyber-Threats CIO INSIGHT
Apr 07, 2014 6 Ways the Internet of Things Will Transform Enterprise Security CIO
Mar 31, 2014 CIOs advance boldly into scary cloud territory FierceCIO
Workshops
Session 1:
1:30pm - 2:15pm
Hands-On Lab – Securing Virtualization

Trend Micro and VMware have partnered to revolutionize security & virtualization by delivering #1 agentless security for virtual server & desktop infrastructure. The result is an uncompromised performance & higher VM consolidation ratio to your maximize your return of investment. In this Hands-On Lab, you will experience the power of VMware Horizon Suite coupled with Trend Micro Deep Security true agentless security. The deep integration creates a cohesive environment to provide workforce mobility and security that won’t slow you down. The lab will take you through the process of discovering the technical insights of vShield Endpoint & VMsafe API integration with Deep Security to resolve security challenges created by conventional agent-based security. You will learn how to configure & provision agentless anti-malware & virtual patching through the dedicated security virtual appliance. You will walk away understanding how Trend Micro & VMware can accelerate your virtual desktop journey efficiently and safely. Duration: 45 minutes per session.

How to register: Visit the registration counter at Room 325 to reserve your seats in advance. 20 seats per session only!
Session 2:
2:15pm - 3:00pm
Session 3:
3:30pm - 4:15pm
Session 4:
4:15pm - 5:00pm

HANDS-ON LAB

TREND MICRO & VMWARE 

Gain hands-on experience with securing Horizon View VDI environment with Trend Micro Deep Security.
Get Labs Details


Refer A Friend

Send an event invite to your friends and you will stand an chance to win an iPad Mini!