Our security strategy is focused on delivering an effective cybersecurity architecture combining network, cloud, and endpoint solutions. Through our industry-leading Cisco Talos offering, we intend to protect against and provide security across the entire attack continuum - before, during, and after a cyberattack - and to help customers shorten the time between threat detection and response.Register now
|1.00PM - 1.50PMTime||Security and Visibility for Modern Networks||Mr. Ross Traynor,
|Download PDF||Networks are ever more complex. As more users and devices are added to the network, it is harder to see what’s on the network, and it’s even harder to spot a threat.
This session shows you how you can get real-time situational awareness of all users, devices, and traffic on the network so you can effectively respond to threats.
|1.50PM - 2.40PMTime||Empowering Defenders with Cisco Threat Response||Mr. Hrvoje (Harry) Dogan,
Systems Engineering Manager,
Advanced Threat Solutions, APJC
|Download PDF||Security defenders are struggling with the orchestration of a mix of security products and that, by itself, may obfuscate rather than clarify the security landscape. Cisco Threat Response is the key pillar of our integrated security architecture, built to rapidly detect, investigate and remediate threats, thus empowering security analysts with effective weapons to defend their organizations.
In this demo, we will utilize an environment that models after many enterprise networks to show you how your own environments get compromised, how security breaches get detected, and how to respond with maximum effectiveness.
|2.40PM - 3.00PMTime||Tea-break and World of Solutions|
|3.10PM - 3.40PMTime||Cyber Threat Intelligence Sharing and Blocking||Mr Tony Teo,
SE Director of Asia Pacific,
|Download PDF||Looking back at 2018, the ceaseless global information leaking incidents had happened to large internet service providers, international financial institutions, big airlines and government institutions, etc. These companies have one thing in common: the scale of their investment in information protection is larger than regular corporates and institutions and they are mostly already equipped with layered infosec devices such as next-generation firewall (NGFW), intrusion prevention system (IPS), web application firewall, antivirus wall, and Anti-APT. Yet unfortunately, tragedies of personal information leakage still happened.
It is as if no matter how you strengthen your defense with high-end infosec devices, hackers are still able to intrude your place.
Passive surveillance mechanism, which serves like front ramparts, is not sufficient to ward off intrusions from hackers. So experts have proposed a new idea: to block threats before they’re still in development. And the key for this lies in “Threat Intelligence Blocking”, which utilizes accurate information of global threats. It’s like being protected by many satellites and ground radars. Through building a densely woven information reporting network, when a missile (infosec threat) is present, it will be detected and terminated way before it reaches your domain. This not only lessens the burden of domestic inspection, but also greatly improves protection.
In this presentation, the NETSCOUT Arbor security expert will give you a detail analysis about the underlying security problems you are now facing introduce the best solution which can block both inbound and outbound malicious traffic show you how the unique intelligence can help to detect advanced threats/td>
|3.40PM - 4.30PM Time||From Chasing Alerts to Hunting Threats: What Makes an Effective SOC is Evolving||Mr. Marc Low,
|Whether you call it a SOC, a CSOC, a SIRC, a Cyber Defense Center, or something else, security operation centers have the same fundamental mission – to help organizations detect, analyze, respond to, report on, and prevent cyber security incidents. But what it takes to do that effectively has changed in this ever-evolving threat landscape and has put an even greater burden on analysts.
Most SOCs take a reactive approach - when an alert is triggered, they investigate. But today, SOCs must also take a automated and proactive approach, automating SOC tasks and engaging in investigation and threat-hunting, with the aim of breaking the cyber kill chain. Advances in technology, intelligence, and analytics used in concert are making this shift in approach possible, helping to focus limited available analyst effort to provide greater value.
|4.40PM - 5.00PM Time||Closing and Lucky Draw|
Sorry, no results matched your search criteria(s). Please try again.