GOVWARE 2008 PROGRAMME



Similar documents
Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Singapore s Top Youths in Skills Areas Crowned Top Medal Winners to Represent Singapore at WorldSkills London 2011

APPOINTMENTS TO THE SINGAPORE ACCOUNTANCY COMMISSION (SAC)

FIRST FACILITIES MANAGEMENT COHORT FROM BCA AND UNIVERSITY COLLEGE LONDON POSTGRADUATE MASTER S PROGRAMME GRADUATES

Part 1 : Energy and environmental management systems

NMRC Awards Ceremony and Research Symposium 2014 Grand Copthorne Waterfront Hotel, Singapore February 2014

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security

E-Newsletter. June Contents. President s Message. Lucky Draw Winner For AISP Membership Renewal. AISP 2 nd Annual General Meeting 11 March 2010

IBF CELEBRATES PROFESSIONAL EXCELLENCE, CONFERS AWARDS ON 27 VETERANS

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call

40 Years of NZ-China Relations

INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE

Programme. 8.30am am

2012 RECIPIENT SINGAPORE AUSTRALIA EMINENT ALUMNI AWARD. Dr TAN Chin Nam

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

SINGAPORE HOSTS CIVIL AVIATION CYBER SECURITY CONFERENCE

Seminar on Green Environment & Energy Saving Green Professional Certification Program (Seminar Series 2)

Infocomm Security Masterplan 2

Defending the Internet of Things

Program The 18th Session of the Asia-Pacific Regional Space Agency Forum (APRSAF-18) ~A regional collaboration for tomorrow s environment ~

NEW CHAIRMAN/BOARD AND CEO FOR SINGAPORE LNG CORPORATION MOVING TOWARDS A FULL-FLEDGED LNG BUSINESS ENTERPRISE

Hong Kong Computer Society Cloud Computing Special Interest Group Executive Cloud Forum 2015

Start up licenses high performance traffic analysis engine from Exploit Technologies

Seminar on Green Environment& Energy Saving Green Professional Certification Program (Seminar Series 2)

Keynote 1. Scale and Programmability in Google s Software Defined Data Center WAN. Amin M. Vahdat University of California San Diego

CHEN Renbao updated 7/ Pasir Panjang Road, Department of Finance, #7-5 #05-01 NUS Business School National University of Singapore (NUS)

Cyber Security in the Financial Industry

Telecommunications Standards Advisory Committee (TSAC) Technical Specification

SYMPOSIUM PROGRAM DAY ONE

future data and infrastructure

A FORUM FOR DEBATE, A CATALYST FOR CHANGE

How To Protect Your It Infrastructure

NUS Institute of Systems Science and School of Computing jointly launch a new Master s programme for next generation IT leaders

Information Security and Cryptography

The 2 nd Hong Kong Public Relations Awards 2014 Now Calling For Entry

Reaping the Full Benefits of a Hybrid Network

ASIA AND THE PACIFIC POLICY SOCIETY CONFERENCE 2014: G20 S POLICY CHALLENGES FOR ASIA AND THE PACIFIC MARCH 2014

CNQC INTERNATIONAL HOLDINGS LIMITED 青 建 國 際 控 股 有 限 公 司

Board of Directors. 12 DBS Annual Report 2013 Board of Directors

INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION)

Cyber crime risk management protecting your business 4 November 2015

Greater China Forum AGENDA. 09:00-09:10 Welcome speech by Alexander Justham, CEO of London Stock Exchange plc

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE

Project Management Association of Japan (PMAJ) Hosting International Project & Program Management Symposium Tokyo 2008 in March 2008

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

What is the Right Security Solution for Mobile Computing? #RSAC

List of Communication School in Singapore

Bachelor of Science (Hons) in Accounting and Finance Awarded by University of Bradford No. Module Lecturer Highest

2nd 2015 Quarterly e-newsletter

To learn more, visit us here:

He graduated from the former University of Singapore with a degree in Accountancy.

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

PROTECTING YOUR BUSINESS FRIDAY, 28 NOVEMBER Topic Synopsis & Speakers Profiles

Securing Project Financing For The Global Markets

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Advisory Committees THE EXCHANGE FUND ADVISORY COMMITTEE. Chairman 29 February Members. 16 AnnuAl RepoRt 2015 Hong Kong MonetARy AutHoRity

The 4 th China Smart Metering, Billing, AMR & Data Management, CRM/CIS Conference

Forensics Europe Expo 2015 Conference Programme

Predictive Cyber Defense A Strategic Thought Paper

The Value of E-Resources in the Cloud Era

As a global centre of excellence in hospitality and tourism education

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

BT Assure Rethink the Risk

How To Use Usher For Business

Workshop on Big Data for International Scientific Programmes: Challenges and Opportunities

Reaching Customers Across Multiple Channels

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

How To Prepare For The Cii Cfo Summit

Duration: 30 hours in total. Who should attend: For aspiring and early stage entrepreneurs

INTERNATIONAL CONFERENCE ON ELECTRONIC LITIGATION 11 August Welcome Address of the Honourable Justice Lee Seiu Kin

Practising Management Consultant (PMC) Certification Scheme. A Quality Trust Mark for Management Consultancy

Enabling the SmartGrid through Cloud Computing

Welcome to Services Discovery Channel. Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China

THE PRESIDENCY LAPSSET CORRIDOR DEVELOPMENT AUTHORITY DIRECTOR GENERAL / CHIEF EXECUTIVE OFFICER S OFFICE

A Big Data Workshop introducing a smarter decision methodology for your organisation through advanced analytics and career opportunity

SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC)

Asia Pacific the Future of Cloud Computing

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

THOUGHT LEADERSHIP & INNOVATIVE SOLUTIONS FOR B2B MARKETERS

Human Factors in Information Security

Transcription:

GOVWARE 2008 PROGRAMME 7 Oct 2008 (Tuesday) 0800 hrs Registration 0900 hrs Guests and Delegates to be seated 0910 hrs Arrival of Guest-of-Honor, Associate Professor Ho Peng Kee Conference Opening 0915 0930 hrs Opening Speech Associate Professor Ho Peng Kee Senior Minister of State (Law & Home Affairs) 0930 1010 hrs Keynote Speech Securing the Cloud with Demos 1010 1045 hrs Morning Tea 1045 1100 hrs Global State of Information Security Jimmy Sng 1100 1120 hrs Positive Security via End-to-End Encryption 1120 1140 hrs Secure Remote Access with Data Leakage Protection 1140 1200 hrs NIST Cyber and Network Security Initiatives 1200 1400 hrs Networking Lunch Yu Chien Siang Ministry of Home Affairs, Senior Manager, PWC Dr Ngair Teow Hin Founder & CEO, SecureAge Technology Tan Teik Guan CEO/CTO, Data Security Systems Solutions Pte Ltd Tim Grance National Institute of Standards and Technology (NIST), USA Breakout Session 1: Closed Door Government Briefing (Day 1) 1400 1430 hrs Security No Enough 1430 1500 hrs Taking on the Scavengers 1500 1530 hrs Trends in Database Attacks 1600 1630 hrs Laptop Security Circular Briefing 1630 1700 hrs Security Evaluation of Cryptographic Devices: How We Can Do This Faster? 1700 1730 hrs Collaboration as We Secure the Cloud 1

Breakout Session 2: Enterprise Security (Day 1) 1400 1430 hrs Database Abuse Prevention Techniques Rohit Gupta Vice President of Business Development, Imperva 1430 1500 hrs Enabling User Access to Web 2.0 Applications: Web Gateway Security 1500 1530 hrs Enterprise Security - Information Leakage Protection 1600 1630 hrs How to Enable Organisations to Rapidly Find the Critical Evidence They Need for ediscovery Requirements, Compliance Request and Corporate Investigation? 1630 1700 hrs Leveraging on GPU in Computer Vision Applications 1700 1730 hrs Authentication and Security in the Mobile World 1730 1800 hrs Broadcast Communication: Challenges and Protocols for Secure Authentication Grant Murphy Director of Web Gateway Security Products, Secure Computing Donald Wee Operations Director, Data Terminator Eddie Sheehy CEO, Nuix Karianto Leman Research Manager, Computer Vision and Image Understanding Department, I 2 R Greg Wade, Regional Vice President (APAC), Rim Blackberry Christophe Tartary School of Physical and Mathematical Sciences, Nanyang Technological University 2

8 Oct 2008 (Wednesday) Breakout Session 1: Infrastructure Protection (Day 2) 0900 0945 hrs NIST Efforts in Security Metrics Tim Grance National Institute of Standards and Technology (NIST), USA 0945 1015 hrs Encrypted Databases and High End Security Capabilities 1045 1115 hrs The European Approach of eid: Move to Elliptic Curve Cryptography 1115 1145 hrs A Enterprise Output Management Strategy to Deliver Measurable Improvements in Productivity, Cost Control and Data Protection 1145 1215 hrs Essential Document Security - Are You Neglecting Paper Document Security? 1215 1230 hrs Data Leak Protection is not Confined to Digital but also Physical Form 1230 1400 hrs Networking Lunch Chris Pickett Principal Solutions Architect, Global Technology Business Unit, Oracle Xavier Fricout Deputy General Manager, Oberthur Technologies Ricky Thong Manager, Solutions and Services, North East Asia and South Asia, Lexmark Willie Lim Poh Heng Technology and Solutions Manager, Fuji Xerox Tang Weng Sing General Manager, RadianTrust Pte Ltd Breakout Session 1: Mobile Security (Day 2) 1400 1445 hrs Practical Dangers in Using Public Mobility Solutions Benjamin Tan Managing Director, SuperInternet Pte Ltd 1445 1530 hrs Enabling Information at Your Fingertips Anywhere, Anytime Tan Teik Guan CEO/CTO, Data Security Systems Solutions Pte Ltd 1600 1630 hrs Windows Mobile Security Architecture Ken Hendrie Common Criteria Evaluator, Stratsec, Australia 1630 1700 hrs An Alternative 2FA Authentication is Just a Snap 1700 1730 hrs Wireless Security: It s Harder Than It Looks Tang Weng Sing General Manager, RadianTrust Pte Ltd 3

Breakout Session 2: Enterprise Security (Day 2) 0900 0945 hrs Adaptive Security Joel Weise Principal Engineer and Chief Technologist for the Sun Client Services Security Program Office, Sun 0945 1015 hrs Latest Developments in Internet Security Threats 1045 1115 hrs Korea Information Security Trends and Policy Directions 1115 1145 hrs Web Application Security Your Last Line of Defence? Yeong Chee Wai Regional Director of Product Marketing, Asia Pacific, Symantec Ph.D. No, Byung-Gyu Vice President, Korea Information Security Agency (KISA) Anthony Lim Director, Asia Pacific, Security, Rational Software, IBM 1145 1215 hrs Life Made Easy for the ecitizen Watch Presented by Gemalto This Stand-Up Comedy by Irene Ang 1400 1445 hrs Securing and Protecting the Enterprise, Is That Enough? 1445 1530 hrs The Challenge of Securing and Consolidating Data Across in the Public Sector Joseph R. Riggins Senior Solutions Specialist/Information Assurance, Guidance Software Brian Raymond Director, Government Affairs, NetApp 1600 1630 hrs Establishing a Continuous Security Process in Development Adam Kolawa Chairman and CEO, Parasoft Corporation 1630 1700 hrs Temperature Attacks David Naccache Professor, Université Paris II Panthéon- Assas 1700 1730 hrs Workforce Initiatives: Redefine the Government Information Security Workforce Freddy Tan Member of Asian Advisory Board, (ISC) 2 4

Breakout Session 3: Biometrics Technology Track (Day 2) 0900 0915 hrs Conference Starts and Opening Address 0915 0945 hrs Continuous Authentication Using Multimodal Dr Terence Sim Assistant Professor, School of Computing, National University of 0945 1015 hrs Human Identification with Gait Professor Xu Dong Associate Professor, School of Computer Engineering, Nanyang Technological University 1045 1115 hrs Outdoor Face Recognition Dr Roberto Mariani Chief Technology Officer and Founder, XID Technologies Pte Ltd 1115 1145 hrs Recent Development(s) in Fake Finger Detection 1145 1215 hrs How to Incorporate Biometrics into a "Positive Security Model? Dr Yau Wei Yun Senior Scientist, Institute for Infocomm Research and Chairman of the Biometrics Technical Committee, IT Standards Committee Harry JC Chang Chief Technology Officer, ibase Pte Ltd Breakout Session 3: Biometrics Applications and Interoperability Track (Day 2) 1400 1430 hrs Deployment of Biometric Recognition Systems Prof Lam Kwok Yan Founder & Chairman, PrivyLink 1430 1500 hrs Standards, Privacy and Facial Recognition Systems Going Beyond The Norm 1500 1530 hrs Biometric Sample Quality and Authentication Accuracy International Limited David Chadwick Technical Committee Member, Biometrics Institute & Senior Solutions Advisor, Identity & Biometrics, Enterprise Security Initiatives, Unisys Eyung Lim Lecturer, Temasek Polytechnic & Secretariat of the Biometrics Technical Committee 1600 1615 hrs Biometrics, Exciting Trends and Where It is Heading 1600 1630 hrs Combining Biometrics and Cryptography 1630 1700 hrs Voice Biometrics Technology and Standards 1700 1730 hrs Panel Discussion Chaired by Prof Terence Sim with invited speakers Saurav Bhattacharyya, Member of Biometrics Technical Committee & Director, Viometrix Pte Ltd Panel Discussion 5

9 Oct 2008 (Thursday) Breakout Session 1: Infrastructure Protection (Day 3) 0900 0945 hrs Network Security Lessons We Can Learn from History Mike Ding Regional Director, Asia Pacific, Enterasys 0945 1015 hrs Is Critical Information Infrastructure Protection Really Necessary? 1045 1115 hrs ANIS Network Infrastructure Security The Architecture of a Self-Defending Security System Rolf Schulz CEO, Global Network Security Gmbh Mr Georg Krause Founder & MD, CE Infosys 1115 1145 hrs End-to-End Security in the Enterprise Vladimir Yordanov Director of Technology Asia Pacific F5 Networks 1145 1215 hrs Data Management Automation for the Virtual Infrastructure Jenson Chong Technical Consultant, NetApp 1400 1430 hrs SAN with iscis: Improvements to Security Goh Poh Nguan Enterprise Technologist, Dell 1430 1500 hrs Designing a High Assurance Cryptographic Product Lee Ser Yen Assistant GM/CTO of ST Electronics (Info-Security) 1500 1530 hrs Secure Government Data and Applications by Trusted Encryption Mark Yakabuski Product Manager, SafeNet Inc 1600 1630 hrs Multi-Clock Control Shift Register Sequences for Stream Data Protection Xiao Guozhen PCS Security Pte Ltd 1630 1700 hrs Unified Communications Security: Threats, Mitigation and Cryptography 1700 1730 hrs IT Infrastructure: Growing Threats, Better Answers! Chua Kay Lee Senior Network Consultant, Public Sector Team, CISCO Systems Avinash Pandey Security and Privacy Services Team, ASEAN, IBM 6

Breakout Session 2: Enterprise Security (Day 3) 0900 0925 hrs Best Practices for Securing Document and Content Management Systems 0925 0945 hrs New E-Learning Possibilities Securing Online Test 0945 1015 hrs IT Search - A New Approach to Enterprise Security Michael Baum CEO & Co-Founder Splunk Inc. 1045 1115 hrs Staying Ahead of Your Adversary Through Visual Analytics 1115 1145 hrs Managing Technological Risk in Information Security 1145 1215 hrs Enterprise Architecture for Security Blue Printing Stann Majawit Strategic Alliances Manager, TIBCO Spotfire Benjamin Mah General Manager, e-cop(s) Pte Ltd Jonathan Koh Director, Solutions & Consulting, Crimson Logic 1400 1430 hrs Data Loss and Leakage Prevention Jeffrey Kok Corporate Sales Consultant, RSA, The Security Division of EMC 1430 1500 hrs Protecting Information That Matters Information Leakage Detection and Prevention (ILDP) 1500 1530 hrs Strategies for Effective Data Loss Prevention 1600 1630 hrs How Unmanned Robotic Systems Can Complement Other Security Systems to Provide for the Defence of Sensitive and Essential Infrastructure 1630 1700 hrs Autonomous Robotics: From Research to TechX Challenge Wong Onn Chee CTO, Resolvo Systems Pte Ltd William Tam Technical Manager, Asia Pacific, Websense Lau Wai Shing Michael Associate Professor, School of Mechanical and Aerospace Engineering, Nanyang Technological University Wang Danwei Head, Division of Control and Instrumentation, School of Electrical and Electronic Engineering, Nanyang Technological University 7

Breakout Session 3: Electronic Identities & Personal Security (Day 3) 0900 0940 hrs Two Factor Authentication Effectiveness in Tony Chew Director, Technology Risk Supervision, Monetary Authority of 0940 1015 hrs Making Online Security Easy for the Customer Adrian Burholt CEO, The Key Revolution Ltd 1045 1115 hrs CSSI A Standard Middleware for the ID Card Sven Gossel Founder & CEO, Charismathics Gmbh 1115 1145 hrs Identity and Access Management The Right Permissions for the Right Resources for the Right Users at the Right Time Ralf Knoeringer Vice President, Business Development in Identity Management & Biometrics Solutions, Siemens IT Solutions and 1115 1215 hrs Beyond Identity and Access Management: Governance and Compliance Services (Germany) Pf Vilquin Director Security Channel Sales, CA 1400 1445 hrs What's Beyond Identity Management? Clarence Cheah Senior Manager, Oracle Security and Identity Management, Oracle Corporation 1445 1530 hrs DIVA 2008, New Demos and Capabilities 1600 1630 hrs Data Protection from Unauthorized External Storage Devices 1630 1700 hrs Enterprise Identity and Access Management Journey Kuan Mun Kwang Director, Business Development, Mobile Media Solutions Division, Trek 2000 International Ltd Loh Kar Whee Project Manager, InfoComm Infra InfoAssurance, Defence Science and Technology Agency (DSTA) 8