CSA Interaction provides an excellent opportunity for cybersecurity professionals to discuss the latest trends and developments in IT and in the process build a close-knitted cyber security community in this region.
1:30 PM - 2:10 PMInformation End-of-life, an enterprise challenge
Cyber-attacks happen every day. The quantity and sophistication of cyber-attacks are only increasing, but there is a more proactive option to minimizing the impact of the attacks. This session will guide you The importance of creating a holistic data eraser strategy through the entire data lifecycle and talk to industry experts about eraser best practices How to establish the right data retention and removal policies to continuously remove data from IT assets/environments and reduce the impact of cyber hacks Why data erasure can serve as an indispensable tool for your organization in fending off cyber attacks
Alan Puah
Chief Operating Office APAC at Blancco‚ a division of Blancco Technology Group
Cloud services innovation, deployment and consumption are proliferating at a runaway rate today, for all the good reasons of opex cost management model, backup and storage, business continuity, scalability, flexibility et al. Then there is FinTech, IOT, mobile apps, all going through the cloud too.
Nonetheless, there are security and governance concerns too, primarily regarding data and availability, given that cloud is an outsourced model and the user loses visibility and control.
Hence it is paramount to consider and comply with nationally and internationally established security and trust frameworks and certifications, such as from ISO, CSA and also some local ones from SGX-MAS-ABS and IMDA, as at least a next-best assurance and trust reference, that certain processes, policies and methodologies are in place to ensure the cyber security of the cloud services. We also look at a sampling of statements of assurance from some big cloud providers like Microsoft, Amazon and SingTel.
Anthony Lim
Market Strategy Director APAC of Cloud Security Alliance
2:30 PM - 2:50 PMTea/Coffee Break
2:50 PM - 3:30 PMLegal and regulatory compliance and the process to get there
Your cyber security and IT security policies needs constant attention and updating to ensure your business does not suffer from damaging data breaches. One vital part of your IT security is managing the data life cycle and how to ensure you are in control of Data End of Life. This session will guide you on best practices and technology available to help achieve this through certified data erasure and how you can meet regulatory and legal compliance. Processes and solutions to cover everything from device to data center will be introduced and the latest standards and recommendations for both Enterprise IT and Cloud Services will be covered.
3:30 PM - 4:00 PMVote of Thanks & Networking
Speakers
Fredrik Forslund
Director, Cloud & Data Center Erasure Solutions of Blancco‚ a division of Blancco Technology Group