Demo Theatre

22nd July 2014, Tuesday

 Time  Topic
10.40 - 11.00 hrs  Cyber Strategy In a Perimeterless Environment
Daniel Cohen, Business Development Manager and Head of Knowledge Delivery, RSA’s Fraud & Risk Intelligence Group
11.15 - 11.35 hrs   Security Intelligence in Action – LogRhythm Inc.
Mike Reagan, Chief Marketing Officer, LogRhythm Inc. 
11.50 - 12.10 hrs   Stopping Zero-day Attacks with Check Point Threat Emulation
Siow Keng Seng, Security Consultant, Check Point Software Technologies 
12.20 - 12.40 hrs  Securely Accelerate Your Mobile Enterprise With API Management And Security
Christopher Tillie, Solutions Sales Director, Asia Pacific and Japan, CA Technologies
B K Rhim, Sr. Principal Consultant, Presales, Asia North and Asian South, CA Technologies 
12.50- 13.10 hrs   Combining Firewalls And Tar Traps To Create A Hacker’s Worst Nightmare
Edward Roberts, Director of Marketing, Juniper 
13.25 - 13.45 hrs   CT Managed Security Service: Safeguarding Your IT Assets Around APEC
Roy Luo, Product Manager, China Telecom Global Ltd 
14.00 - 14.20 hrs   Automating Incident Detection and Response with AccessData’s ResolutionOne Platform
Lucas Zaichkowsky, Enterprise Defense Architect, AccessData 
14.50 - 15.10 hrs   Security Incident Patterns: Verizon 2014 Data Breach Investigations Report
Jay Jacobs, Data Scientist, RISK Intelligence, Verizon 
15.20 - 15.40 hrs   Latest Trends In Web Security And Web Vulnerability Scanning Using Acunetix
Nicholas Sciberras, Product Manager, Acunetix 
15.50 - 16.10 hrs  Mobilize Your Workforce – Effectively And Securely
Kieran O’Shaughnessy, Managing Director Asia Pacific, Accellion
16.20 - 16.40 hrs Vulnerability Scanning & Validation Made Easy With Nexpose & Metasploit
Jay Chow, Sales Engineer – South Asia, Rapid7

23rd July 2014, Wednesday

Time   Topic
10.30- 10.50 hrs  Splunk: Keeping Up With Constantly Changing Security Threats
Monzy Merza, Director of Security Markets, Splunk, Inc. 
11.05 - 11.25 hrs  Reducing the Impact of Data Breaches on Financial Institutions
Mark Lazar, Global Vice President, Identity and Fraud Solutions, Verint Systems 
 11.40 - 12.00 hrs Introducing New Capabilities to Protect Your Network from Targeted Attacks
Colin Lim, Regional Director - ASEAN, Arbor Networks 
12.15 - 12.35 hrs  Next-Generation Authentication, Crypto Management, And Encryption Solutions To Help Companies “Secure The Breach”
Tan Jenn Chye, Security Consultant, SafeNet Pte Ltd 
12.50 - 13.10 hrs  Using QualysGuard Continuous Monitoring to Prevent Breaches
Wolfgang Kandek, Chief Technical Officer, Qualys 
13.20 - 13.40hrs   Encryption In The Cloud Is Scarcer Than You Think
Jiro Shindo, Senior Product Manager, APAC, Thales e-Security 
13.50 - 14.10 hrs   Peeping Inside “Layer 7”
Kishore Kumar Ambekar, Technical Development Manager, Spirent Communications 
14.25 - 14.45 hrs  3 Steps To Mitigating Targeted Attacks Against Your Privileged Accounts
Tan Zhi Hao, Regional PS Manager – ASEAN, Professional Services ASIA, Cyber-Ark Software Ltd
15.00 - 15.20 hrs  Malware With Your Tea?
Brian Tan, Senior Security Engineer, Cisco Security Business Group

This document was retrieved from on Wed, 26 Jun 2019 10:45:20 -0400.