Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Day 3

13 October 2016, Thursday


Time

Programme

Speaker/Moderator

0900 - 1000

Keynote 3: Enhance Security and Privacy in the Internet


of Things (IoT)

David Caissy

Nowadays, there are numerous arising threats on the


issues of security and privacy in IoT. Through this
presentation, David Caissy will be share about the
threats and concern of security and privacy faced in IoT,
which has plays an fundamental role in protecting
personal data and monitor their flow from things to the
cloud for the industry.
1000 - 1030

Plenary 4: How Does IT Security Affects Everybody

Chris Babel

Tzachi Levy will be giving a presentation on how does IT


security will affects every business and organization.
Company need to have a security plain to ensure the
safety of information assets.
1100 - 1200

Breakout 2A: Computer and Network Security

Kevin Beaver

Kevin Beaver will be discussing what is network security,


how does it protect you your organisation and what
organization will be benefits of network security.
1100 - 1200

Breakout 2B: Malware Attack

Costin Raiu

With the rise of widespread internet access, malware


attack are commonly used to steal sensitive information
and gain access to private computer systems. Through
this session, Costin Raiu will be sharing what are the
dangers that the businesses faced and how to protect
your businesses from such activities and recover from
the attacks.
1100 - 1200

Breakout 2C: Cyber Response Strategies


Cyber Response Strategies are mostly used by IT
security company. Through this session, Andrew Borene
will share about how IT security company works in
helping to develop response strategies to defend and
protect your businesses from being attack.

Andrew Borene

1100 - 1200

Breakout 2D: Security Challenges and Content Authoring

Christopher G. Cwalina

There are list of security challenges that identified in this


industry. Christopher G. Cwalina will be discussing on
how to reduce risks and protect the information that
manages our business as well as content authoring
techniques.
1400 - 1500

Panel Discussion 3: Takeaways from 2015's Data


Breaches

Information security is no longer a mysterious function


and many companies suffered huge loss due the leak of

customers information. Why data breaches keep


occurring? How can your company guard against data
breaches? During the discussion, the speakers will
explore on why were experiencing these roadblocks and
discuss on how to to minimize this impact on your
security program.

David Caissy
(Moderator)
Kevin Beaver
Chris Babel
Christopher G.
Cwalina

You might also like