Efficient Cyber Threat Investigation and Response with CyberSecurity Platform Survey

Most organization has deployed multiple security products against sophisticated cyber threats such as ransomware attacks. They need to spend more than 45 mins to collect and analyzing the information from multiple security products when a cyber threat happens in their environment. The entire project idea is captured as below research question.

One of previous guest speaker – Ricky Mok, who is also a MSc research student in University of Portsmouth would like conduct a survey research in the CyberThreat Investigation and Response with CyberSecurity Platform in both on premises and Cloud Computing environment.

The research study involves completing a questionnaire that will cover a range of topics related to efficient cyber threat investigation and response with a cybersecurity platform. The questionnaire is designed to be user-friendly and should take approximately 15 mins to complete. Your responses will be treated with the utmost confidentiality, and any identifiable information will be anonymized and kept strictly confidential in accordance with applicable data protection laws.

Your participation in this study is completely voluntary. There are no anticipated risks associated with participating in this research study, and your participation will not have any impact on your current position or affiliation.

To participate, please follow the instructions below:

Subject: Invitation to Participate in a Research Study Questionnaire

I hope this letter finds you well. I am writing to invite you to participate in an important research study that aims to determine the efficient cyber threat investigation and response with a cybersecurity platform

As an esteemed member of the Cloud Security Alliance HK Chapter, your valuable insights and expertise would greatly contribute to the success of this study. Your participation will help us gather comprehensive data and insights that will advance knowledge and contribute to the development of cyber threat detection and response.

The research study involves completing a questionnaire that will cover a range of topics related to efficient cyber threat investigation and response with a cybersecurity platform. The questionnaire is designed to be user-friendly and should take approximately 15 mins to complete. Your responses will be treated with the utmost confidentiality, and any identifiable information will be anonymized and kept strictly confidential in accordance with applicable data protection laws.

Your participation in this study is completely voluntary, and you have the right to withdraw at any time without penalty. There are no anticipated risks associated with participating in this research study, and your participation will not have any impact on your current position or affiliation.

To participate, please follow the instructions below:

  1. Access the online questionnaire using the following link: https://docs.google.com/forms/d/1AXmlvmoGk0inSjNRIcVo8xuOmucBlhMJV8fi2EinIjM/edit
  2. Answer each question to the best of your knowledge and provide any additional information as requested.
  3. Should you have any questions or concerns about the research study or questionnaire, please do not hesitate to contact Ricky Mok at up2086702@myport.ac.uk. Your feedback and input are highly valued, and we are available to address any queries you may have.

CSA HKM Knowledge Sharing Event – June 2023

In the past “Knowledge Sharing Session“, our focus has been on examining cloud computing and cybersecurity in the context of solution providers, cloud service providers, and vendors. However, we have not yet explored the usage of cloud computing by enterprises as cloud users.

Cloud service providers often try to persuade users to transition to a cloud environment, but is it truly convincing to adopt a cloud-first or cloud-native strategy?

In this knowledge sharing session, we are excited to welcome our new council member, Dicky Wong from New World Corporate Services Limited (New World Group Member), to guide us through his company’s cloud journey. He will discuss the nature of cloud environments, use cases for cloud computing, and best practices for security. Additionally, he will highlight the benefits and efficiency gains that can be achieved through the use of cloud technology.

Mr. Wong will also address security concerns when transitioning to a serverless PaaS cloud environment and discuss the appropriate security posture for cloud computing.

Participants will claim 1 CPE

DATE: June 29, 2023 (Thursday)
TIME: 12:30 – 01:30 pm
FORMAT: Webinar (in Cantonese)
TOPIC: How can the efficiency of an organization’s operations be optimized while also enhancing cybersecurity through the use of cloud technology?
LANGUAGE: Cantonese
SPEAKER: Dicky WONG, Head of Technology Risk, New World Corporate Services Limited and Director of Cloud Security Alliance (HK & Macau) Chapter

AGENDA:

  • What is the efficiency that will create to a corporate?
  • Nature of cloud environment, use case, security setting?
  • Why we need to concern about security going serverless?
  • What security should you be concern on?
  • How to set up a suitable security posture?

THE SPEAKER:

Mr. Wong is currently the Head of Technology Risk for New World Corporate Services, a New World Group Member. He is responsible for oversight and governance for all technology and cyber related compliance, risk management, and security within the group. One of the major tasks of Mr. Wong is to define, design and implement a comprehensive and robust risk framework & protection for the group that applies to all Business Units.


Prior to that, Mr. Wong was with the Hong Kong Police Force for over 10 years and he has held several cyber crime related management positions including being in charge of the Technology Crime investigation team, took up the role of Head of the Cyber Security Centre and the lead of the Collaboration team of the Cyber Security and Technology Crime Bureau (CSTCB), Mr. WONG has gained tremendous amount of experience in technology crime investigation, setting up cyber security framework and handling cyber attacks including the large scaled cyber attacks occurred in Hong Kong.


Mr. Wong is currently volunteering as the Director of Government Relationship Development for Cloud Security Alliance (CSA HK & Macau Chapter) and also a Member of the HKSTP Data Governance Think Tank Group.


Mr. Wong is an INTERPOL accredited trainer in Computer Forensics, Certified Ethical Hacker, Certified Penetration Tester and obtained a Bachelor’s Degree in Management Economics from University of Essex, United Kingdom

VIEW THE PRESENTATION: https://youtu.be/RBGL5wnXrXo