GTI - Learn from Security Expert Workshop Series (1st Workshop)

Learn from Security Expert Workshop Series (1st Workshop)

Not all IT professionals are security experts but yet they are held responsible for protecting the company against the ever-mutating cyber threats. Before investing in your next piece of advanced security software or equipment, you need to make sure your IT staffs are equipped with domain knowledge of latest IT security landscape, the processes of threat management life cycle as well as your risk posture so as to implement an effective security framework to confidently protect your company against cyber-attacks and malicious activities and to meet the compliance requirements of your specific industry. 

The “GTI - Learn from Security Expert Workshop Series” conducted by our certified security consultants and auditors are designed to equip your team with essential knowledge of the latest cyber threat landscape, effective threat management processes, practices, tools, expert consultancy and services so that you can prioritize your investments and resources in IT security to safeguard your computing environment and company data assets. 

Each workshop will address different important topics of the threat protection life cycle and discuss the pitfalls, potential threats, malicious activities, potential vulnerabilities and damages as well as effective means to identify those vulnerabilities and mitigate risks and immediately respond to and resolve security incidents.

Event Details
Date: 27th October, 2015 (Tuesday)
Time: 9:15am - 2:00pm
Venue: L'hotel élan, élan 120, 3/F, Chong Yip Street, Kwun Tong, Kowloon

February 9th, 2017 (Thursday)

9:15 – 9:30
9:30 – 10:30 Understanding the Threat Management Life Cycle and what consists of an effective Security Management Framework
Understanding Hacker and Insider Threat Behaviours – from security expert’s perspective
10:30 – 10:45
10:45 – 12:00
Importance of Risk Posture assessments of computing infrastructure and client facing web services

Effective means to safeguard against cyber threats with best ROI 
– typical vulnerabilities and selection of solutions
Insider threat management – understand the risk profile of business users, privileged users and contracted suppliers 
12:00 – 13:45
Networking Lunch



2:00pm - 5:30pm