This is a past event. Registration is closed. View other Cloud Security Alliance events.

When

Tuesday, July 21, 2015 (1:00 PM - 5:00 PM) (CST)

Add to Calendar

Where

Marina Bay Sands, Melati 4010, Level 4

10 Bayfront Avenue
Singapore

Show on map
Enterprise Cloud Adoption and Security Lessons Learned


Cloud computing is now a mission critical part of the enterprise. Join us for CSA APAC Summit 2015 to discover lessons learned from enterprise experts in securing their clouds and achieving compliance objectives. A global list of industry experts will share their experiences and discuss the key security challenges of tomorrow. Get the big picture view of the future of IT and our mandate to revolutionize security at the CSA APAC Summit


Date: 21st July
Time: 1 pm - 5 pm
Venue: Marina Bay Sands, Melati 4010, Level 4
Address: Marina Bay Sands, 10 Bayfront Avenue, Singapore 018956
​All CSA APAC Summit attendees must be badged attendees of RSA. If you are not able to register at the RSA website, please register here

1:00 PM

Registration

1:15 PM

Welcome and Introduction by CSA

1:25 PM

Keynote Address by Dr Lee Hing Yan, Director, National Cloud Computing Office, IDA

1:40 PM

5 Cloud Trends Changing Information Security
The rate of change in technology is moving ever upwards. Technology change within cloud computing is impacting the information security profession, learn about 5 key trends and how to prepare for them in your organization.

2:00 PM

Detect and Defend Your Network From Targeted Attacks
Security Professionals are constantly wondering if they’ve left any gaps open to cyber-attack. Even worse, it’s often easier for cyber criminals to penetrate the defenses than it is for them to discover the breach.
Join this session to get clear, in-depth information about the nature of today’s targeted attacks and the capabilities you need to address them.

2:30 PM

Identity: The Cornerstone of Access
Organizations today must evolve. Thirty-seven percent of workers worldwide will be mobile by the end of 2015. Organisations average 700+ cloud applications. The network perimeter has devolved. Delivering applications from wherever they reside to workers worldwide, with myriad devices, anytime, over any network, is now required. With many evolving and devolving variables, can organizations assure secure, differentiated application access? A constant remains, though: Identity. Understand why ident...
Organizations today must evolve. Thirty-seven percent of workers worldwide will be mobile by the end of 2015. Organisations average 700+ cloud applications. The network perimeter has devolved. Delivering applications from wherever they reside to workers worldwide, with myriad devices, anytime, over any network, is now required. With many evolving and devolving variables, can organizations assure secure, differentiated application access? A constant remains, though: Identity. Understand why identity is the access management cornerstone of today and the future
view more

3:00 PM

Coffee Break

3:15 PM

What data are you driving to the Cloud?
Cloud being another destructive technology, is here to stay. The question has always been when are organizations ready to move into Cloud. Security has always been one of the bigger concern when moving into Cloud, and those security concerns covers a wide spectrum. In this session we will look at security from a data perspective, and how ready are the organizations from a data security and compliance perspective before moving into Cloud. Questions we will be exploring in this session includes: •...
Cloud being another destructive technology, is here to stay. The question has always been when are
organizations ready to move into Cloud. Security has always been one of the bigger concern when moving into Cloud, and those security concerns covers a wide spectrum. In this session we will look at security from a data perspective, and how ready are the organizations from a data security and compliance perspective before moving into Cloud.
Questions we will be exploring in this session includes:

• Do you know where your sensitive data are?
• What is your security and data policy with regards to the sensitive data?
• Will these sensitive data be carried to the Cloud or will they stay on premise?
• Are there any sensitive documents created in Cloud?
• Do you have any visibilities to your data?
view more

3:45 PM

CSA STAR Certification: Optimising Cloud, Security, Trust and Transparency
The CSA STAR Certification is a rigorous third party independent assessment of the security of a cloud service provider. The technology-neutral certification leverages the requirements of the ISO/IEC 27001:2005 management system standard together with the CSA Cloud Controls Matrix.

4:15 PM

Hiring the Right Person for the Most Challenging Security Role of All
In light of the recent cyber-attacks, the role of the Chief Information and Security Officer (CISO) is becoming more crucial as security becomes mission critical for business continuity. However, given continued skills shortage in the industry, the bigger problem is finding the right person to fit the job. This talk outlines what are the crucial attributes to look out for when hiring a CISO.

4:45 PM

Closing Remarks by CSA APAC Managing Director

4:55 PM

4:55 PM

End
Menu