+ All Categories
Home > Documents > FMM ICT Conference 2014 ICT Conferenc… · by Dr Amirudin Bin Abdul Wahab, Director / CEO,...

FMM ICT Conference 2014 ICT Conferenc… · by Dr Amirudin Bin Abdul Wahab, Director / CEO,...

Date post: 19-Sep-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
2
Learn from industry experts on: Cybercrime and Fraud at Your Work Place New insights to protect data in the Cloud / IT Infrastructure Understanding threat prevention technology Outsourcing your Enterprise Security Best practices in drafting IT policy for your company Mobile banking FREE for FMM Members April 15, 2014 /AL FMM ICT Conference 2014 April 23, 2014 CS / 19 / 2014
Transcript
Page 1: FMM ICT Conference 2014 ICT Conferenc… · by Dr Amirudin Bin Abdul Wahab, Director / CEO, CyberSecurity Malaysia 10.10 Securing the Next Generation Mobile Network by Maxis Business

Learn from industry experts on:

• Cybercrime and Fraud at Your Work Place

• New insights to protect data in the Cloud / IT Infrastructure

• Understanding threat prevention technology

• Outsourcing your Enterprise Security

• Best practices in drafting IT policy for your company

• Mobile banking

FREE for FMM

Members

April 15, 2014

/AL

FMM ICT Conference 2014

April 23, 2014

CS / 19 / 2014

Page 2: FMM ICT Conference 2014 ICT Conferenc… · by Dr Amirudin Bin Abdul Wahab, Director / CEO, CyberSecurity Malaysia 10.10 Securing the Next Generation Mobile Network by Maxis Business

To: Wisma FMM, No. 3 Persiaran Dagang, PJU 9, Bandar Sri Damansara, 52200 Kuala Lumpur

Attn: Ms Roslin ( email: [email protected] ) Fax: 03-62741266/7288

Admission is strictly by prior registration. Limited seats are available. A fee of RM200.00 will be imposed on confirmed

participants who fail to turn up. Cancellation is allowed and should be made in writing to FMM Secretariat.

WHO SHOULD ATTEND

• CEOs & CIOs

• Managers & Executives in IT

• Managers & Executives in Human Resources Development

• Managers & Executives in Corporate Policy and Planning

• Anyone who is interested in Cloud Computing

Please register the following participant(s):

(If space is insufficient, please attach a separate list)

1. Name:_____________________________________________

Designation: _______________________________________

Vegetarian**: Yes / No

Email: ______________________________________________

2. Name:_____________________________________________

Designation: _______________________________________

Vegetarian**: Yes / No

Email: ______________________________________________

Submitted by:

Name:_____________________________________________

Designation:_______________________________________

Company:_________________________________________

Address:___________________________________________

___________________________________________________

___________________________________________________

Tel No.:__________________ Fax No.:__________________

Email:_____________________________________________

** Kindly circle whichever is applicable.

Contact FMM Secretariat:

Roslin ([email protected])

Lily Hee ([email protected])

Tel: 03 6286 7200 | Fax: 03 6274 1266 / 7288

Web: www.fmm.org.my

REGISTRATION FORM

PROGRAMME

F M M I C T C O N F E R E N C E 2 0 1 4 : I T S E C U R I T Y 15 May 2014 (Thursday) | The Royale Chulan Damansara

08.30 Registration and Networking Coffee

09.30 Welcome Address by Dr Neoh Vee Heng, FMM Council Member, Chairman, FMM ICT & Multimedia Committee

09.40 Cybercrime and Fraud at Your Workplace by Dr Amirudin Bin Abdul Wahab, Director / CEO, CyberSecurity Malaysia

10.10 Securing the Next Generation Mobile Network by Maxis Business Services*

10.50 Question & Answer Session

11.10 Networking Coffee Break

11.30 Protect Your Business. Guard Your Data by Amir Hamzah, Country Sales Lead for IBM Security Systems, IBM Malaysia

12.10 Understanding Threat Prevention: What Does It Mean? by Andrew Chee, Security Consultant – Malaysia, Checkpoint

12.50 Question & Answer Session

13.00 Networking Lunch

14.00 Is Cloud Computing Secure? by Emerge Systems (M) Sdn. Bhd.

14:40 How to Outsource your Enterprise Security by MDeC

15:20 Gear Up for the Mobility and Automation Storm by Soo Bee Teong, Director of Transaction Banking, CIMB Bank Berhad

16.00 Intelligence Driven Security – A New Approach by SOPHOS*

16.40 Do’s and Don’ts in Drafting an IT Policy by Yap Yeong Hui, Senior Associate, SKRINE

17:10 Question & Answer Session

17.30 Networking Coffee Break and End of Programme

* Invited speakers and tentative presentation topics. The organiser reserves the right to alter the content and timing of the programme

in the best interests of the conference.


Recommended