Highlight: This is the largest EA forum in Hong Kong organised by Hong Kong Computer Society Enterprise Architecture Specialist Group (HKCS EASG). Having come to the 8th year, we are going to deliver it as a virtual live event with the theme “Architecture Evolution in the Digital Age”. Experience sharing and case studies on the IT architecture evolution, due to the digital transformation with emerging technologies (such as Micro-services, DevOps, Containers, Data Analytics, IoT, 5G and AI etc), would be our major focuses. As such, several seasoned IT leaders from various large enterprises will discuss their viewpoints and share real-life scenarios of adopting these emerging technologies in the digital era with us. We will also cover the best practices, the challenges and lessons learnt they encountered in their experiences. Simply put, it will definitely be a valuable opportunity for us to network with these speakers and other IT architects as to exchange knowledge and share our experiences.
Notice: PISAM electronic mailing list service update
Dear PISA members,
PISA uses Yahoo! Groups as our discussion board and electronic mailing service. [PISAM] is the common group for us to distribute our messages to PISA members. Sadly, Yahoo! Groups has announced its End of Service. The Yahoo Groups website is going to shut down on December 15, 2020 and members will no longer be able to send or receive emails from Yahoo Groups. (Thanks Yahoo! Groups for providing the service in the past.)
The PISA Executive Committee has decided to change our mailing list service to Groups.io. Our valid members will receive our invitation from "firstname.lastname@example.org Moderators" in the coming few days. The last batch of invitations will NOT be later than 15-NOV. Please accept the invitation and join our new PISAM group.
The invitation email maybe drops into your JUNK/ SPAM folder. Please take a look, release it and try to whitelist [pisam] emails in the future.
If you still cannot receive any invitation email, please feel free to contact us by email to email@example.com after 15-NOV for checking your email alias forwarding.
Highlight: Even as companies grapple with the implications of the COVID-19 pandemic, it is already clear that CIOs are playing a central role in navigating the crisis. The COVID-19 pandemic is first and foremost a human tragedy, and technology is on the front lines of this crisis. Many of the changes reshaping how we work and live – from employees working remotely to consumers shifting their shopping online – rely on technology. And because technology ties so much of every company together, CIOs have a unique view into what’s really going on and how to manage it. The most successful organizations take risks in “the turns”, those places in the enterprise journey where others slow down.
Carrying the theme of “Preparing To Win In The Turns’’, this premier annual CIO event targeting 200+ CIOs, CDOs, CISOs, C-level delegates and IT decision makers dedicates in optimizing delegates’ digital and business information technology management with a new strategic outlook and equips CIOs and CXOs with insight into how they should prepare and lead in the turns, building agility into systems, processes, and decision-making, both within their teams and among their peers.
Highlight: 2020 has caught many businesses off guard. Users, data, devices, critical business applications and networks have left the office and become more distributed.
This shift in the way we work & do business has resulted in companies losing visibility into what was happening in their corporate and their employees’ personal networks, devices, and applications. This shift has also seen several cybercriminals and sophisticated hacking groups rapidly adjusting their techniques and tactics to take advantage of the situation.
Whether you are a Fortune 500 company or a small/medium enterprise, there are fundamentally three things you need to protect: data, devices, applications, and the network itself. Register for this session to: See how Hong Kong ranks in DDOS attacks distribution globally
See how Hong Kong ranks in DDOS attacks distribution globally
Stay ahead of the cyberattack vectors & see how Cloudflare helps in combating these attacks
Find out what is the hype on Zero- Trust Security & how Cloudflare One can future- proof your cybersecurity capability regardless of the shift in workforce situation
Stay on for a supercharged Q&A session and test your cybersecurity readiness!
Highlight: How do you shoot down a missile before it hits its target? That’s the problem facing today’s incident response teams. As cyberattacks increase in volume and velocity, the security operations center (SOC) handling incident response is the nexus for this challenge.
A well-honed incident response operation, that combined EPP+EDR, can deliver an impressive return on investment. In many data breach incidents, the cost is more than financial, and it is well known that the time cyber security teams take from the breach to containment is critical.
With the stakes so high, how can your cyber security team shrink the time between detecting and handling cyber threats?
In this special webinar, Kelvin Wee, Director of Security Engineering at SentinelOne – APJ, will cover these key questions and more:
Why traditional protective approaches are no longer enough
The importance of automation in the response process
How to identify and establish key metrics in incident response
Technical live demonstration of SentinelOne’s single agent, static AI platform that helps cyber security teams to prevent, detect, respond and hunt threats in real time
Join us to learn how to supercharge your SOC with a new approach to incident response.
Presenter: Kelvin Wee
Director of Security Engineering – Asia Pacific and Japan, SentinelOne
Highlight: By definition, a Zero Trust security model advocates the creation of zones and segmentation to control sensitive IT resources. This also entails the deployment of technology to monitor and manage data between zones, and more importantly, user interactions within a zone(s). A Zero Trust security model redefines the architecture of a trusted network inside a defined corporate perimeter. This is relevant today since technologies and processes like the cloud, DevOps, and IoT have either blurred, or dissolved altogether, the idea of a traditional perimeter.
While the Zero Trust model has become a trendy catchword in IT, it is complex and difficult to implement for many organizations in Asia Pacific, because it requires the establishment of a model of trust, verification, and continuous evaluation of trust for further access and lateral movement.
Join BeyondTrust and (ISC)² on Jan 20, 2021 (Wed) at 11am (GMT +8), Ajay Kumar, Director for Security Engineering at BeyondTrust, review the practical shortcomings and limitations of a Zero Trust model, and explain how to achieve Zero Trust using the Privileged Remote Access model.
Presenter: Ajay Kumar, Director for Security Engineering – APJ, BeyondTrust Moderator: Hoo Chuan-Wei, CISSP, Technical Advisor – Asia-Pacific, (ISC)²
Highlight: Prove you have what it takes to protect your organisation from malicious hackers and threats with the Certified Information Systems Security Professional (CISSP®) certification. Demonstrate your knowledge, advance your career and become a member of a 130,000-strong community of cybersecurity leaders setting the bar for professionals across the information security workforce.
Highlight: Today’s applications have become the focal point for cybercriminals, on which financial fraud and abuse are constantly happening. A misunderstanding of what does and does not protect your digital footprint can lead to devastating breaches, while some companies are still believe in and even base real business decisions and security outcomes on misconceptions. It’s critical to bust the myths and get back to better protection.
Join F5 and (ISC)² on Dec 16, 2020 (Wed) at 11am (Hong Kong Time) as Ryan Lo, Manager of Solutions Engineering from Shape Security (part of F5), separates fact from fiction when it comes to defending your apps from sophisticated attacks, including:
• Understanding how MFA just adds more information to the dossier of a targeted account. • CAPTCHA is a fabled response to a sophisticated problem, like bots. • Password schemes won’t protect user accounts from being taken over.
Presenter: Ryan Lo, Manager of Solutions Engineering, Shape Security (Part of F5) Moderator: Otto Lee, CISSP, CCSP, CSSLP, Membership Chair, (ISC)² Hong Kong Chapter
*This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)