Time
|
Topics
|
---|---|
09:50 - 10:15
|
Demo By Tenable
|
10:20 - 10:45
|
Ensuring Business Continuity with Veeam Data Resilience
This session delves into the critical role of Veeam Data Resilience in safeguarding business operations against disruptions. Discover how Veeam’s cutting-edge solutions provide robust data protection, rapid recovery, and seamless backup strategies to ensure business continuity. We’ll explore key features like ransomware protection, automated disaster recovery, and cloud integration, showcasing real-world examples of how organizations maintain operational integrity under pressure. Attendees will gain practical insights into implementing Veeam’s tools to enhance data security, minimize downtime, and meet compliance requirements. Join us to learn how Veeam empowers businesses to stay resilient in an increasingly unpredictable digital landscape. Speaker : - Mr. Johnny Lee, Senior Systems Engineer, Veeam Software |
10:50 - 11:15
|
Becoming Supply Chain Resilient
Step 1 of Mastering your attack surface – is recognizing that it’s no longer just your attack surface. It’s your attack surface, PLUS the attack surface of your suppliers. Most organizations have zero visibility into how they operate and protect their vendor ecosystem. Supply chain resilience in cybersecurity means having the ability to anticipate, withstand, and recover from cyber incidents that impact not just your organization, but your entire network of suppliers and partners
- Fio Lee, Senior Solutions Architects, SecurityScorecard |
11:20 - 11:45
|
AI-Powered Security: Transforming Cyber Defense Strategies
In today's cybersecurity landscape, GenAI has empowered cybercriminals to rapidly execute zero-day exploits, posing a significant challenge for cybersecurity experts already strained by a shortage of skilled professionals. In this session, we will address these critical issues and highlight the importance of implementing artificial intelligence (AI) to enhance threat detection and response. By adopting proactive AI defenses, organizations can achieve faster mitigation, reduced Mean Time to Resolution (MTTR), and enhanced incident management. Join us to learn how Radware helps businesses navigate modern cyber threats with intelligent, adaptive security measures for resilience against evolving challenges. Speaker : - Mr. Ben Lam, Sales Engineer, Radware |
11:50 - 12:15
|
Revolutionizing Cybersecurity: The First Embedded Cyber Insurance in Firewall
In this speech, Francis will introduce the groundbreaking innovation of SonicWall's embedded cyber insurance, the first of its kind in the market. This revolutionary warranty is designed to provide unparalleled protection and peace of mind for businesses. He will explain how this embedded insurance seamlessly integrates with SonicWall's firewall solutions, including the latest Gen7 models, offering a comprehensive cybersecurity strategy. While traditional XDR/MDR solutions often fall short without a strong commitment to cybersecurity, SonicWall stands out with its robust cyber insurance. SonicWall's Extended Detection and Response (XDR) and Managed Detection and Response (MDR) services enhance the firewall's capabilities, ensuring rapid threat detection, effective response, and financial protection against cyber incidents. Attendees will learn about the benefits of this integrated approach, including enhanced threat detection, rapid response capabilities, and financial protection against cyber incidents. Join Francis to explore how SonicWall is setting new standards in cybersecurity and helping businesses stay resilient in the face of evolving threats. Speaker : - Mr. Francis Wong, Senior Manager, Sales Engineering, SonicWall |
14:00 - 14:25
|
CNAPP Unleashed: Securing Clouds Without Compromise
Cloud security is broken — fragmented tools, blind spots, and agent fatigue make it harder than ever to keep up. In this session we will dives into how Orca Security is redefining cloud protection with its agentless-first Cloud Native Application Protection Platform (CNAPP). You’ll learn how Orca delivers complete visibility across workloads, containers, serverless, and APIs — with zero impact on performance. Discover how SideScanning™ and deep contextual risk prioritization help you cut through alert noise, eliminate blind spots, and secure your entire cloud lifecycle from code to runtime. Speaker: - Mr. Sunny Au, Senior Sales Engineer, Orca |
14:30 - 14:55
|
AI Driven DSPM: Proactive Data Protection - Securing Your M365 and Cloud Data
In an era where data breaches and cyber threats are rampant, protecting sensitive information is more critical than ever. Join us for an insightful session led by Forcepoint, where we will explore the transformative power of AI-driven Data Security Posture Management (DSPM). Discover how advanced AI technologies can enhance your organization’s ability to proactively secure Microsoft 365 and cloud environments. We will discuss:
Speaker: - Mr. Thomas Chuang, Manager of Engineering, North Asia, Forcepoint |
15:00 - 15:25
|
Evolving Regulatory Landscape & The Role of BAS
As regulatory requirements in Hong Kong become increasingly complex, organizations must adopt proactive strategies to manage risks and maintain compliance. This session will explore key regulatory trends, the importance of continuous security validation, and how Breach Attack Simulation (BAS) empowers businesses to meet compliance mandates while strengthening their overall security posture. Speaker : Timture Choi, Security Service Lead, LPS Product Manager from Picus |
15:30 - 15:55
|
From DLP to DDR: A Superior Way to Stop Data Breaches
Traditional DLP struggles with today’s complex data threats. Learn how upgrading to DDR offers smarter, cross-platform protection—giving enterprises the visibility and control they need to truly stop data from leaking. Speaker: - Mr. Enlighten Wu, Director of Product, Cyberserval 藪貓科技 |
16:00 - 16:25
|
Cato SASE in Action: Instant IT, IoT, and OT Visibility
Cato IoT/OT Security extends protection to IoT and OT environments, providing real-time device discovery and classification, granular policy enforcement, and comprehensive threat prevention. Also the Cato DEM empowers IT teams to support strategic digital transformation projects with minimal risk to end user experience. By proactively identifying and resolving performance issues, Cato DEM ensures optimal user experience, reduces disruptions, and streamlines IT operation Speaker: - Mr. Patrick Sung, Sales Engineer, Cato Networks |