CITIC Telecom CPC’s CyberSecurity ReDEFINED conference is a profile for security professionals who want to gain an edge against tomorrow’s threats and strengthen their defenses through practical strategies tailored to modern challenges. It works.
In today’s increasingly digital world, cyberattacks pose a serious threat to businesses across all industries. As new risks emerge, such as deepfakes and attacks powered by artificial intelligence (AI), the need for a robust cybersecurity strategy has never been greater.
CITIC Telecom CPC’s CyberSecurity ReDEFINED conference will feature numerous keynotes and panel discussions, aimed at providing attendees with the knowledge and skills needed to protect their organizations in the face of evolving cyber threats. That’s what I mean. At this major security event, technology leaders and industry experts will provide insights on best practices in compliance, risk management, data protection, incident response, and digital innovation security.
Maximize your AI opportunities
In his keynote, “Why AI Matters: Opportunities, Risks and Regulation,” Edward Chui, director of the Economist Intelligence Corporate Network (Hong Kong), will discuss the proliferation of AI startups, which received more than $67 billion last year. “New technologies like AI can improve communication, efficiency and sustainability, but businesses need to understand why they want to use AI,” he advises Chui.
“Customizing AI for your company and understanding your unique business needs will be key to success,” Chui emphasized, urging attendees to “ensure the responsible development and implementation of technology. “Identify AI concerns and risks.”
As organizations increase their reliance on new technologies such as AI, it is paramount that they acquire the skills to navigate the maze of both opportunities and risks posed by digital transformation. The “Cyber Security ReDEFINED” keynote will feature CITIC Telecom CPC’s Chief Strategy Officer Taylor Lam, who will share the latest in his TrustCSI™ 3.0 managed security solution and how it can help enterprises achieve this balance. I emphasized.
“TrustCSI™ 3.0 is a comprehensive cybersecurity framework comprised of four key service pillars that provides comprehensive protection to help enterprises protect themselves from today’s complex threat landscapes such as phishing attacks and denial of service (DoS). “It enables us to identify, predict, protect, detect, respond, and recover from attacks (),” he explains.
Mr. Lam will outline CITIC Telecom CPC’s innovative “Al-Red/Blue Cybersecurity Practices” approach. This includes red team penetration testing, which uses AI capabilities to probe systems and find vulnerabilities, and blue team, which provides training and deployment to help remediate issues quickly.
“By combining the power of offensive and defensive tactics, we are revolutionizing cybersecurity and transforming it from passive defense to active protection. Our approach allows our clients to keep pace with evolving threats. “We can proactively and continuously strengthen our security posture against them,” he said.
Level up security
Kicking off the fireside chat, “AI Matters: Red/Blue CyberSecurity Practices ReDEFINED,” KORNERSTONE Institute Master Trainer Steven Kwok directs participants to fill out a live survey. The poll asks how often companies conduct red team penetration testing or breach and attack simulations.
“The results are impressive,” Kwok says. “Many organizations report that they have never performed these critical security assessment methods. Experts know that they can help identify vulnerabilities early and protect against advanced cyber threats. Regular testing is essential to stay ahead of the curve.”
“According to our data, there are 240 techniques used by hackers,” said Daniel Kwon, Fortinet’s field chief information security officer (Southeast Asia and Hong Kong). “While phishing used to be the most common, more than half of initial breaches now involve removable media, especially prevalent in today’s IoT and remote work deployments,” Kwon noted. He emphasizes that the key to mitigating attacks is detection, protection, and automated response.
Brenda Lin, assistant director of IT services, information technology services and data science at CITIC Telecom CPC, says effective security “involves every staff member, and humans are the biggest loophole with social engineering threats. “Because it’s possible,” he emphasizes. To address this issue, Lin advises businesses to conduct regular penetration tests to comprehensively understand their security levels and improve the defensive capabilities of their employees.
Meanwhile, KT Thomas Wong, director of security service delivery and operations at CITIC Telecom CPC, points out the importance of business continuity planning. “Security is a form of risk management, and no risk-free environment exists. Customers should tailor their security controls to their needs, similar to purchasing insurance. Downtime and Data Recovery It is essential to determine the business continuity plan and develop a comprehensive business continuity plan. Given the diverse needs of businesses, backup technology also plays an important role,” he says.
Lin and Wong agree that AI shows the potential to improve protection. Wong said AI “uses logical analysis trained on large datasets to identify anomalous IP addresses and apply that information to firewalls to help organizations stay abreast of evolving threats.” “You can,” he emphasizes. Lin emphasizes the importance of regular reviews as the digital realm continues to change rapidly.
In response to this need, CITIC Telecom CPC leveraged its AI capabilities to develop an innovative solution called AI-enabled penetration testing. This advanced self-testing solution with in-house developed AI modeling is lightweight and routine, simplifying the assessment of a company’s security posture and enabling regular penetration testing. This solution allows organizations to incorporate regular testing into their cybersecurity practices, strengthening overall information security and enabling rapid enterprise-wide response to cyber threats.
Evolving security environment
The second fireside chat, “Knowing the Unknown: Reducing Risk with Intelligence,” begins with Sheila Lamb, Editorial Consultant at Ignite Content Marketing, posing questions to the panelists. And will you have an advantage? ”
Case in point: Hong Kong Express has undergone rapid digital acceleration over the past 30 months to meet changing travel demands, explains Dr. Andy Luk, Head of Digital Transformation. However, Luk points out that speeding up systems also comes with risks.
The vulnerabilities have emerged as the airline embraces new technologies such as workplace automation and generative chatbots, and as customers return following pandemic restrictions. To address these challenges, HK Express has developed a unique machine learning model that effectively thwarts threats in real-time.
Nic Ng, head of systems engineering at Fortinet, agreed that the digital shift brings increased risk. “As companies adapt their technology, hackers discover new avenues to penetrate systems. Experienced security partners and intelligence can help us navigate this difficult situation.”
Dave Cheng, vice president of the Hong Kong Computer Association, said that during the digital shift, IT leaders can sometimes overlook the need to modernize architecture, infrastructure and security in tandem. “Vulnerabilities can emerge if defenses cannot keep up with new systems and connections,” he warns. “Companies need to take a holistic approach to transformation.”
Ng says new analytical techniques will improve protection. “Machine learning leverages vast datasets to quickly identify anomalies in a system,” he says. “By monitoring traffic patterns, machine learning flags potential intrusions. It works with generative AI to personalize security insights and help companies efficiently tailor them to their unique operations and needs. It allows us to avoid risks.”
With years of expertise, technology, and world-class infrastructure, CITIC Telecom CPC serves as a trusted TechOps Security Enabler, enabling businesses to navigate the digital landscape with confidence.
CITIC Telecom CPC’s CyberSecurity ReDEFINED conference helps organizations across industries improve their organization’s It provides a useful platform that allows you to continually level up your security and combat ever-evolving threats. digital age.