CLOUDSEC Congress 2013 - Asia Pacific, Singapore
Date: Aug 21, 2013 - Aug 22, 2013
Time: 08:00 AM to 06:00 PM
Venue: Raffles City Convention Centre, Singapore
Address: 252 North Bridge Road, Singapore

21 August 2013: Main Event - Opening Address and Keynotes

Time Agenda Side Activities
8:00 Registrations Reception
Helpdesk
Announcements
Exhibition
Demo stations
Media room
VIP/ Speakers room
Bookstore
Food & beverages
Special events
9:00 Opening Act
9:05
Bill McGee, SVP & General Manager, Cloud and Data Centre Security, TREND MICRO
9:15
Keynote 1: The Cyber Security Advantage - How Superior Cyber Security Can Make Your Company and Your Country Better Able to Compete in the Global EconomyKeynote 1: The Cyber Security Advantage - How Superior Cyber Security Can Make Your Company and Your Country Better Able to Compete in the Global Economy

Cyber security has long had a considerable impact on businesses' ability to compete in a global economy, but this impact is now growing greater. The reason is the new generation of attack tools and the ways they are being used. The new tools include customized spear phishing e-mails, trojanized smart phone apps, and migrating, mutating, self-concealing malware. These tools are being used, not just to collect relatively direct payoffs, but to drive customers to rival suppliers, to steal competitively important business information, to interfere with corporate efforts to move into new markets, and to anticipate and manipulate financial markets. The effect of these developments is to increase the difference between companies and countries with better cyber security and those that are more vulnerable. This makes the comparative benefits to those with better cyber security greater than ever. Companies with better cyber security will gain market share when industries are attacked. They will be able to implement new, profit-generating technologies sooner. Perhaps most important, they will be able to maintain a learning-curve advantage that gives them lower production costs. Countries with better cyber security will draw business away from countries perceived to be more vulnerable and will benefit more from the innovations they create. To secure these benefits, companies and countries will need to take account of the new opportunities presented by cloud computing and to utilize economic concepts to set priorities.
Scott Borg, Director and Chief Economist, U.S. CYBER CONSEQUENCES UNIT
9.45
Keynote 2: Combating Targeted Attacks in CyberspaceKeynote 2: Combating Targeted Attacks in Cyberspace

Cyberspace is not a pacific environment; there is a fight for power in a modern-day colonial movement. As staged attacks and subsequent cyber campaigns have evolved so to must our defenses. The digital insider threat aka the APT (advanced persistent threat) will metastasize in the cloud computing environment of 2013. The use of mobile devices and cloud computing creates a perfect storm for the exfiltration of sensitive data. To tap into the power of Web-based, wireless, and other emerg­ing technologies, and thus building true “defense in depth” we must appreciate the evolution of blended threats from the simple virus of yesteryear to the virulent targeted attacks of 2013. Systemic risk in IT is growing due to the “island hopping” and “watering hole” attacks of 2013. Mitigating the use of one’s networks to traverse into her constituency is paramount. Rather than endorsing security models that drive us to construct additional defenses and filters that have an in­creasingly slim chance of stopping advanced threats, the focus within IT development and security must shift to emphasize more aggres­sive, proactive self-assessment through which “offense can in­form defense.” To achieve an advanced persistent response (APR) on our networks we must blend our cyber defenses so as to realize continuous monitoring. This presentation will focus on the evolution of the staged and blended attacks and share expertise on organizational strategies and tactics to mitigate risks in the short term and over time. The presentation will highlight the gaps in security in both the telecommunications and financial sectors and profess a modern risk management matrix which allows an organization to achieve greater cyber situational awareness and manage the actions of cyber intruders in real-time.
Tom Kellermann, Global VP of Cybersecurity, TREND MICRO
10:15
Noboru Nakatani, Executive Director, IGCI, INTERPOL
10:45 Break
11:00
Jim Reavis, Co-founder & Executive Director, CLOUD SECURITY ALLIANCE
11:30
Brian Higgins, Senior Director, Partners & Alliances ,
South East Asia, VMWARE
12:00
Keynote Panel Discussion: Global Cyber Attacks & Espionage - Strategic Perspectives & Implications For Government And BusinessKeynote Panel Discussion: Global Cyber Attacks & Espionage - Strategic Perspectives & Implications For Government And Business

Cyber security has dominated the news headlines in 2013 so far. The year started with a Java ze-ro-day attack that affected thousands of computers at tech giants such as Apple, Facebook and Twitter in January. In Asia Pacific, the computer networks of major banks and broadcasters in South Korea were disrupted by a major cyber-attack in April and massive Distributed-Denial-of-Service (DDoS) cyber attacks on government websites that coincided with the 63rd anniversary of the start of the Korean War in June. Most recently, the super-secretive National Security Agency (NSA) found its spying methods on display as Edward Snowden, the former Booz Allen Hamilton contractor who worked at the NSA for three months, blabbed about its surveillance methods to the media.
Is this a sign of more destructive and targeted cyber attacks and espionage to come? How should governments and businesses respond to this changing threat landscape?
Meet the panel of global security experts as they address these strategic issues:
• Implications for data privacy from the ongoing Snowden cyber espionage crisis
• The rise of state-sponsored cyber attacks and its impact on critical infrastructures and mission-critical IT systems
• What should organisations do when organised cyber crime and cyber extortion occurs?
• Are organisations ready for targeted attacks that could cause catastrophic damage to their operations, finances and reputation?
• Security strategies and recommendations to secure corporate data and networks in this new threat landscape
Moderator: Ken Low, Program Director, CLOUDSEC Summits
Panelists: Scott Borg (USCCU), Tom Kellermann (Trend Micro), Noboru Nakatani (INTERPOL), Jim Reavis (CSA) and Brian Higgins (VMWARE)
12:30 Lunch

 

21 August 2013: Main Event – Breakout Tracks & Sessions

Time Agenda
  Track 1 Track 2 Track 3
13:30
Edwin Seo, Solution
Architect, F5
NETWORKS
Yoshitaka Nagano,
Senior IT Consultant,
FUJITSU LIMITED
Welcome Address
14:00
Kyle Wilhoit , Forward Threat, Researcher, TREND MICRO
Wong Jeat Shyan,
Chief Executive Officer,
TALARIAX
Aloysius Cheang, APAC Managing Director, CLOUD SECURITY ALLIANCE
14:30
Jeff Tiung, Senior Sales Engineer, THALES E-SECURITY
Lim Wei Chiang, Senior
System Engineer,
South East Asia, VMWARE

David Ng, APAC Product
Manager, TREND MICRO
Ian Koay,
APAC Product
Marketing Manager,
TREND MICRO
15:00
Richard Sheng, Senior Director of Enterprise Security, TREND MICRO
Phoram Mehta, Senior
Manager for Information
Security and Risk
Management, PAYPAL
15:30 Break
15:45
Kelvin Mun, Principal
Cloud Consultant, NEC
STEE CLOUD SERVICES
Kyle Wilhoit ,
Forward Threat Researcher,
TREND MICRO

Leonard Ong,
President,
Singapore Chapter,
ISACA

Fredric Tai,
APAC Senior
Manager, Corporate
Security Division,
TREND MICRO
16:15
David Ng, APAC Product Manager,TREND MICRO
Oyvind Roti ,Principal Solutions Architect,
AMAZON WEB SERVICES
16:45
Alex Chan Wai Mun,
Manager, Data Centre
and Operations,
NATIONAL INSTITUTE
OF EDUCATION,
SINGAPORE
Ian Koay, APAC Product Marketing Manager, Trend Micro
17:15 Break
17:30 Lucky Draw
18:00 Close

 

Phoram Mehta Phoram Mehta Senior Manager for Information Security and Risk Management Paypal arrow
Leonard Ong Leonard Ong President, Singapore Chapter ISACA  arrow
David Ng David Ng APAC Product Marketing Manager Trend Micro arrow
Brian Higgins Brian Higgins Senior Director, Partners & Alliances , South East Asia VMware arrow
Jeff Tiung Jeff Tiung Senior Sales Engineer Thales e-Security  arrow
Wei Chiang Lim Wei Chiang Lim Senior System Engineer, South East Asia VMware arrow
Kyle Wilhoit Kyle Wilhoit Forward Threat Researcher Trend Micro arrow
Scott Borg Scott Borg Director and Chief Economist U.S. Cyber Consequences Unit arrow
Ian Koay Ian Koay APAC Product Marketing Manager Trend Micro arrow
Richard Sheng Richard Sheng Senior Director of Enterprise Security Trend Micro arrow
Oyvind Roti Oyvind Roti Principal Ecosystem Solution Architect Amazon Web Services arrow
Yoshitaka Nagano Yoshitaka Nagano Senior IT Consultant Fujitsu Limited arrow
Aloysius Cheang Aloysius Cheang Managing Director, APAC Cloud Security Alliance (CSA) arrow
Jeat Shyan Wong Jeat Shyan Wong Chief Executive Officer TalariaX Pte Ltd arrow
Kelvin Mun Kelvin Mun Principal Cloud Consultant NEC Stee Cloud Services arrow
Fredric Tai Fredric Tai APAC Senior Manager, Corporate Security Division Trend Micro arrow
Alex Wai Mun Chan Alex Wai Mun Chan Manager, Data Centre and Operations, Computer Services Centre National Institute of Education, Singapore arrow
Jim Reavis Jim Reavis Co-Founder & Executive Director Cloud Security Alliance (CSA) arrow
Ken Low Ken Low General Manager CLOUDSEC Summits arrow
Noboru Nakatani Noboru Nakatani Executive Director, IGCI INTERPOL arrow
Bill McGee Bill McGee SVP & General Manager, Cloud and Data Centre Security Trend Micro  arrow
Tom Kellermann Tom Kellermann Vice President of Cybersecurity Trend Micro arrow
Hosted By Diamond Sponsor   
Trend Micro Incorporated VMware  

Platinum Sponsor

Gold Sponsor

Silver Sponsor

Regional Supporters

Supporters

PresentationsPresenterTypeDate
Advanced Targeted Attacks: In the Age of Inevitable Breach  Richard Sheng TrackAugust 2013
Architecting An Application-Centric Security Posture For Today's Cloud  Edwin Seo TrackAugust 2013
Building And Maintaining A Private Cloud Securely  Phoram Mehta TrackAugust 2013
Combating Targeted Attacks In Cyberspace  Tom Kellermann KeynotesAugust 2013
Connecting And Securing Your Cloud With vCloud Networking And Security  Wei Chiang Lim TrackAugust 2013
Designning A Self-Defending Data Centre  David Ng TrackAugust 2013
Don’t Go Naked: Dress Up For Your Journey To The Cloud  David Ng TrackAugust 2013
How Incident Response Shape The Management Of Security In The Cloud  Jeat Shyan Wong TrackAugust 2013
IT as a Service: A New Era in IT  Brian Higgins KeynotesAugust 2013
IT Transformation: Evolving Security Towards Mobile Era And Cloud Data  Ian Koay TrackAugust 2013
Managing Comprehensive and Sustainable Cloud Security  Yoshitaka Nagano TrackAugust 2013
MAS TRM Guidelines & Security Requirements  Fredric Tai TrackAugust 2013
Protecting Your Precious Data  Ian Koay TrackAugust 2013
Providing Global Support To Build Regional Digital Security Capacity  Noboru Nakatani KeynotesAugust 2013
Responding To Targeted Cyber Attacks  Leonard Ong TrackAugust 2013
Security Strategy for Virtualization and Cloud Computing  Alex Wai Mun Chan TrackAugust 2013
The Cyber Security Advantage - How Superior Cyber Security Can Make Your Company and Your Country Better Able to Compete in the Global Economy  Scott Borg KeynotesAugust 2013
The Global Mandate to Secure Cloud Computing  Jim Reavis KeynotesAugust 2013
The SCADA That Cried Wolf: Who's Really Attacking Your ICS Devises?  Kyle Wilhoit TrackAugust 2013
Using Threat Intelligence and Incident Response in Modern Malware Warfare  Kyle Wilhoit TrackAugust 2013
Addressing Cloud Security Stigma  Kelvin Mun TrackAugust 2013
CSA Global Update  Jim Reavis TrackAugust 2013
Data Protection Strategy: Today's Challenge In The Cloud  Jeff Tiung TrackAugust 2013
Updates From APAC - The Road Goes Ever On And On  Aloysius Cheang TrackAugust 2013
Welcome Address  Ken Low TrackAugust 2013
Welcome Address: Global IT Security Forecast: Cloudy Conditions Ahead  Bill McGee KeynotesAugust 2013

Photos

Images with fixed dimensions
images/35x35/1.jpg
  1. 1 of 186

  2. 2 of 186

  3. 3 of 186

  4. 4 of 186

  5. 5 of 186

  6. 6 of 186

  7. 7 of 186

  8. 8 of 186

  9. 9 of 186

  10. 10 of 186

  11. 11 of 186

  12. 12 of 186

  13. 13 of 186

  14. 14 of 186

  15. 15 of 186

  16. 16 of 186

  17. 17 of 186

  18. 18 of 186

  19. 19 of 186

  20. 20 of 186

  21. 21 of 186

  22. 22 of 186

  23. 23 of 186

  24. 24 of 186

  25. 25 of 186

  26. 26 of 186

  27. 27 of 186

  28. 28 of 186

  29. 29 of 186

  30. 30 of 186

  31. 31 of 186

  32. 32 of 186

  33. 33 of 186

  34. 34 of 186

  35. 35 of 186

  36. 36 of 186

  37. 37 of 186

  38. 38 of 186

  39. 39 of 186

  40. 40 of 186

  41. 41 of 186

  42. 42 of 186

  43. 43 of 186

  44. 44 of 186

  45. 45 of 186

  46. 46 of 186

  47. 47 of 186

  48. 48 of 186

  49. 49 of 186

  50. 50 of 186

  51. 51 of 186

  52. 52 of 186

  53. 53 of 186

  54. 54 of 186

  55. 55 of 186

  56. 56 of 186

  57. 57 of 186

  58. 58 of 186

  59. 59 of 186

  60. 60 of 186

  61. 61 of 186

  62. 62 of 186

  63. 63 of 186

  64. 64 of 186

  65. 65 of 186

  66. 66 of 186

  67. 67 of 186

  68. 68 of 186

  69. 69 of 186

  70. 70 of 186

  71. 71 of 186

  72. 72 of 186

  73. 73 of 186

  74. 74 of 186

  75. 75 of 186

  76. 76 of 186

  77. 77 of 186

  78. 78 of 186

  79. 79 of 186

  80. 80 of 186

  81. 81 of 186

  82. 82 of 186

  83. 83 of 186

  84. 84 of 186

  85. 85 of 186

  86. 86 of 186

  87. 87 of 186

  88. 88 of 186

  89. 89 of 186

  90. 90 of 186

  91. 91 of 186

  92. 92 of 186

  93. 93 of 186

  94. 94 of 186

  95. 95 of 186

  96. 96 of 186

  97. 97 of 186

  98. 98 of 186

  99. 99 of 186

  100. 100 of 186

  101. 101 of 186

  102. 102 of 186

  103. 103 of 186

  104. 104 of 186

  105. 105 of 186

  106. 106 of 186

  107. 107 of 186

  108. 108 of 186

  109. 109 of 186

  110. 110 of 186

  111. 111 of 186

  112. 112 of 186

  113. 113 of 186

  114. 114 of 186

  115. 115 of 186

  116. 116 of 186

  117. 117 of 186

  118. 118 of 186

  119. 119 of 186

  120. 120 of 186

  121. 121 of 186

  122. 122 of 186

  123. 123 of 186

  124. 124 of 186

  125. 125 of 186

  126. 126 of 186

  127. 127 of 186

  128. 128 of 186

  129. 129 of 186

  130. 130 of 186

  131. 131 of 186

  132. 132 of 186

  133. 133 of 186

  134. 134 of 186

  135. 135 of 186

  136. 136 of 186

  137. 137 of 186

  138. 138 of 186

  139. 139 of 186

  140. 140 of 186

  141. 141 of 186

  142. 142 of 186

  143. 143 of 186

  144. 144 of 186

  145. 145 of 186

  146. 146 of 186

  147. 147 of 186

  148. 148 of 186

  149. 149 of 186

  150. 150 of 186

  151. 151 of 186

  152. 152 of 186

  153. 153 of 186

  154. 154 of 186

  155. 155 of 186

  156. 156 of 186

  157. 157 of 186

  158. 158 of 186

  159. 159 of 186

  160. 160 of 186

  161. 161 of 186

  162. 162 of 186

  163. 163 of 186

  164. 164 of 186

  165. 165 of 186

  166. 166 of 186

  167. 167 of 186

  168. 168 of 186

  169. 169 of 186

  170. 170 of 186

  171. 171 of 186

  172. 172 of 186

  173. 173 of 186

  174. 174 of 186

  175. 175 of 186

  176. 176 of 186

  177. 177 of 186

  178. 178 of 186

  179. 179 of 186

  180. 180 of 186

  181. 181 of 186

  182. 182 of 186

  183. 183 of 186

  184. 184 of 186

  185. 185 of 186

  186. 186 of 186


Video



Refer A Friend

Send an event invite to your friends and you will stand a chance to win a mini ipad!