APAC Agenda
APAC Welcome Address & Data Provenance and Cloud Security: Challenges & Opportunities
At the heart of all cyber and cloud security attribution challenges is the problem of data provenance tracking and its reconstruction. In this& talk, I will cover past, present and developing provenance research in computer science, and cover its relation and usefulness to accountability, traceability, trust, forensics and proactive cloud and cyber…
The Power of AND
Accelerating cloud adoption for Enterprise and achieving security compliance, cloud assets protection, automation and continuous operations. We live in a connected world with an increasing pace and frequency of disruption. COVID 19 pandemic was a compelling event that forced many organizations to turn to digital technologies to maintain certain levels of business…
Towards a Better Level of Protection of Personal Data
Against the backdrop of the growing importance of Data Protection and Cybersecurity in the New Normal, many countries in Asia have existing laws for personal data protection, but is enough being done? Harmonisation of laws could pave the way for better cooperation between countries. To be more effective, it should be important…
Future Standards will be Functional
Standards today are published in document formats do not lend well to machine readability or automated compliance. In this session, we present a revolution of the understanding of standards – process and data requirements in standards can actually be expressed in a multi-modal model for machine execution.
Risks and Opportunities in Data Governance and Data Management
As countries and organisations grow in cloud technology maturity, there is an increasing need to understand and map out the nuances of data governance and data management, such as the need for data classification mechanisms, and the requirement to update technology and management policies to suit a cloud computing environment. Systems are…
Understanding Cloud Computing Standards
Many cloud service users are aware of some of the international Cloud Computing standards, such as: ISO/IEC 17788:2014 Information technology — Cloud computing — Overview and vocabulary, which is referenced in the CSA’s own Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 and the companion ISO/IEC 17789:2014 Information technology…
Secure Connection Requirements of Hybrid Cloud
With the accelerated digital transformation of businesses and public services in the midst of the covid-19 pandemic, it comes by no surprise that hackers have also turned their attention to vulnerable, misconfigured cloud deployments. In this talk, the speaker will cover the considerations and recommendations for executing a cybersecurity-informed cloud strategy to…
Panel Discussion: Perspectives on Cloud Usage as a CII
When you think of national critical infrastructure, electricity distribution grids, transportation networks, banking systems, bridges, power plants, water filtration plants, airports, etc. come to mind. What about the clouds? With billions of people confined to their homes during the COVID-19 pandemic, the concept of “critical infrastructure” needs to be extended. To the…