Previous Years
 
...........................................................................................................................................................................................
 
Securing A Connected World
The topic of “securing” and protection have been overdone. For over 20 years and most organisations have focused on building the “castle wall” by investing in firewalls, next generation firewalls, malware protection and etc. The reality is that regardless of how much we secure our connected world cyber criminals and attackers will succeed in their attempts to breach our walls. The impact of a cyber attack has far reaching consequences including legal, regulatory and operational and the planning required to deal with such complex and dynamic attacks requires a different and efficient mind set. Furthermore, most companies are unable to discover cyber criminals for an average of 200 days!  Confidential data is long gone by the time businesses even know they have been compromised.
 
So, the question is, can organisations and businesses respond to cyber attacks. More importantly can organisations respond swiftly and resume business operations?
 
...........................................................................................................................................................................................
 
Trusted Computing: A Security Oxymoron Or The Future?
A lot of security is about trust, especially in today’s networked era. This conference will look at how the concept of trusted security is being built, who are the players, and the arguments for and against it. It will also look at key events and concerns that will undermine the concept of trusted security.
 
What Trusted Computing Really Means
The Prosecution: The Trusted Computing is an oxymoron
The Defense: Trusted Computing is the future of security
The Debate: Is trusted computing to be trusted?
Interdependency: Are we ready to share risks?
Cybercrimes: Why are we on the defensive?
 
...........................................................................................................................................................................................
 
Art and Science of Tackling Cyber Fear
Entitled “Art and Science of Tackling Cyber Fear”, the conference included a panel of presenters highlighting the security impact of new trends such as Clouds, mobility and IT consumerization. Held at the Hong Kong Convention and Exhibition Centre, the conference focused on the topmost security concerns for CIOs and how they can meet business expectations, while bolstering their own defenses against increasingly sophisticated attacks.
 
...........................................................................................................................................................................................
 
Securing Business in an Unsecured World
A former FBI special agent Mr. Edward Gibson and Interpol computer forensics expert Mr. Zoran Iliev sparkled at the 14th Info-Security Conference to lead a cast of heavy-hitting security experts. The conference this year focused on the shift in security strategies as business face up to an inherently insecure landscape with wider and growing threats and risks.
 
...........................................................................................................................................................................................
 
Secure Thinking for a Resilient Business
IT consumerization, the Internet, mobility, and sophisticated security threats--these are some of the trends that are shaping the IT security market. The 13th Conference 2012, which became a two-day event for the first time, aimed to unearth the answers and key concepts and looked at security from two different points of view: Infrastructure and Mobility.
 
...........................................................................................................................................................................................
 
Managing a World of the Unexpected and Uncontrolled
In view of the fact that over 80 million online gamer accounts have been hacked with their personal information stolen, as reported by Reuters in 2011, the 12th Info-Security Conference 2011 has underscored the the ever - changing information security threat landscape. Featuring Mr. Egidio Zarrella, Senior Partner, Advisory Services, KPMG, as the opening keynote speaker, the conference has brought over 700 participants together.
 
...............................................................................................................................................................
 
Preparing for a New Era of Business Insecurity
Exploring the emerging security threats from social networks and new media, the 11th Info-Security Conference 2010 has invited a heavyweight cast of industry experts all over the world. In the conference opening keynote, Mr. David Lacey, a leading expert in information security management and a member of the Infosecurity Europe International Hall of Fame, spoke about "A New Era of Risk, Uncertainty and Complexity".
 
...........................................................................................................................................................................................
 
Converging Risk and Security to Better Manage Uncertainty
Making the highest attendance record in our history, 10th Info-Security Conference 2009 has attracted over 1,200 delegates.During the conference, Dr. Herbert "Hugh" Thompson, the Chief Strategist of People Security of the United States, made his first presence in Hong Kong by giving an impressive keynote speech "Recession Hackernomics" that offers a new perspective for understanding the hacking threats.
 
...........................................................................................................................................................................................
 
Succeeding in a World of Shifting Risk and Threat
In the midst of a spate of data leakage incidents in both public and private sector, effective strategies should be deployed to prevent catastrophic financial or data loss.
This year, the opening keynote was officiated by Mr. Bruce Schneier, the Founder and Chief Technical Officer of BT Counterpane who was described as a "Security Guru" by The Economist, with an inspirational topic- "Reconceptualizing Security"
 
...........................................................................................................................................................................................
 
Managing People and Policy the Weak Link in Security
Local and international IT professionals were congregated in the 8th Info-Security Conference 2007 to discuss the latest security technologies. Making her first appearance in Hong Kong, Ms. Joanna Rutkowska, the Founder and CEO of Invisible Things Lab in Poland, discussed "Human Factor vs. Technology" in her opening keynote that focuses on meeting the challenges posed by both sides of the security coin.
 
...........................................................................................................................................................................................
 
Seamless Security Management for Today's Banking and Financial Services
While fast-evolving security breaches drive enterprises to robust security solutions and seamless security management, an Executive Panel Discussion was firstly introduced at the 7th  Info-Security Conference 2006 to address the latest cyber-security metrics. During this session, prominent experts, scholars and government officials from information technology, banking and finance sectors were encouraged to share their valuable insights through presentations and enterprise case studies.
 
...........................................................................................................................................................................................
 
The Latest Security Definition Application and Technical Know-How
Underscoring the hottest and latest information security related issues ranging from Outsourcing and RFID to Wireless and Mobility, the 6th Info-Security Conference 2005 ended with immense success on 28 July 2005. The first discussion session of the conference, namely the executive round-table panel session, has successfully drawn overwhelming responses in addressing the focus topic of Enterprise Risk Management and Challenges in Information Security in the Banking and Finance industry.
 
...........................................................................................................................................................................................
 
The Best Practices for Security Governance
Since the turn of the 21st century, Information and communications technology has penetrated into every facet of our daily lives and changed the way we do business.
Held on 7 July 2004, the Info-Security Conference has assembled a group of professional security experts, sponsors, analysts and industry players to interact and share knowledge on the best practices in security governance.
 
...........................................................................................................................................................................................
 
A Smart and Secure Metropolitan - How it Inspires Business Continuity
Starting from 2003, the e-Security Conference was renamed as the Info-Security Conference for a more comprehensive overview of the IT landscape. Covering the year's hottest topics such as wireless security, VPN and system security, the conference offered an invaluable insight into the existing information security management employed by the HKSAR Government, and forecasted the change in future business environment.
 
...........................................................................................................................................................................................
 
A Showcase of Professional Practices, Technological Advancements and Insightful Solutions
In response to the market concerns over the rapid growth of wireless technology, e-commerce and web-enabled processes, the 3rd e-Security Conference presented the most advanced approach to cybercrime prevention and wireless/ network/ mobile commerce security. Keynote speakers of this year included Mr. David Leung, Senior Government Counsel of Department of Justice, HKSAR and Mr. David Sykes, Director-North Asia of Symantec Hong Kong Ltd.
 
...........................................................................................................................................................................................
 
From Information Security to e-Commerce Success
Building on the success of the first e-Security Conference, the second conference took place on 19th April 2002. Featuring three dedicated seminar tracks covering application, infrastructure and technology, the conference has invited over 10 industry's leading authorities including government officials, representatives of renowned research institutes and computer security experts. In this year, a demonstration gallery was created to showcase the latest security solutions.
 
...........................................................................................................................................................................................
 
The Ways to Manage Security Crisis
The idea of Info-Security Conference (previously known as e-Security Conference) was born in 2001 as a component of a groundbreaking project established by e21 MagicMedia. First held on 12 December 2001, the conference has achieved  remarkable success by attracting over 700 attendees and a stellar cast of keynote speakers including Prof. Dennis Longley, Visiting Professor of City University of Hong Kong.