Cyber-Dependent Crimes and Jurisdictional Issues (HKLRC Consultation Paper) Follow-up Discussion

The consultation paper on Cyber-Dependent Crimes and Jurisdictional Issues was published by the Cybercrime Sub-committee of the Law Reform Commission on July 20, 2022.  

https://www.hkreform.gov.hk/en/publications/cybercrime.htm

We have a fruitful discussion at our forum on September 14, 2022 when we touched on the terms “to acquire certification” and “accrediting cybersecurity practitioners” in the consultation paper. As the paper referred to Cyber Security Agency (CSA) of Singapore, we believe it would be better for us to understand what is CSA of Singapore’s objectives and how they define the program before we define how our future direction to be.

Cloud Security Alliance Hong Kong & Macau Chapter has invited our CSA APAC ex-colleague Anthony Lim to share his view and provide highlights to us on the Cyber Security Agency (CSA) of Singapore accreditation program.

Participants will claim 1 CPE.

DATE: September 27, 2022 (Tuesday)
TIME: 12:30 – 01:30 pm
FORMAT: Webinar
TOPIC: Learn our way to accreditation and qualification of CyberSecurity Professions from Singapore CSA
SPEAKER: Anthony Lim, Fellow, Cybersecurity, Governance & FinTech, School of Business, Singapore University of Social Sciences 

AGENDA:

  • Objectives behind accreditation and qualification of CyberSecurity Professions in Singapore
  • What is the roles and authority of CSA?
  • What is the qualification and accreditation process and requirement?
  • What is the advantages and disadvantages of the qualification scheme?
  • How to align with existing international qualifications?
  • How to align with university CyberSecurity training program?
  • What is the current status of the accreditation program?
  • How to shape similar program in Hong Kong?

THE SPEAKER: 

Anthony is a pioneer and veteran in cybersecurity and governance in Singapore and the Asia Pacific region, with over 25 years’ professional experience, as consultant, advocate, instructor, auditor and business leader.  His current interests include application security, cloud security, GRC (governance, risk management & compliance), policy & audit, smart cities and operational technology (OT).

He has held key inaugural Asia Pacific cybersecurity business leadership roles, IBM, CA and Check Point, was regional principal consultant at Fortinet and project CISO at NCS.

Anthony is a long-time well-known speaker and content provider for many business, industry, government and academic conferences, workshops, committees, executive roundtables and media (print, broadcast, internet), and has been interviewed often on national news.  He has also been a judge at national and regional industry awards, and himself has won some industry awards, and also is charter member of a government cybersecurity committee.

He was a co-developer of an acclaimed international cloud security professional certification, and was a pioneer and advocate of application security certification in the region.  He has presented on matters of cyber-security and governance at seminars at Washington DC, NATO, Stanford University, Tsinghua University and RSA Asia Pacific.He is a guest and adjunct module developer and instructor at some universities (Master’s and adult-executive programs), professional training institutes and certification programs in the region, an ISO-27001 lead auditor, and life alumni member of the University of Illinois, Urbana-Champaign.    

REGISTRATION: https://CSAHKM-220927.eventbrite.hk

CSA HKM Supports the 7th Cloud Forum

Cloud Security Alliance Hong Kong & Macau Chapter is pleased to support the the 7th Cloud Forum, which will be held on October 25, 2022.

With a theme of “Cloudnovating the future!”, the event will highlights:

  • Cloud Strategic Positioning and Adaptation for FSI in the Next 5 Years
  • Expedite Business Innovation by Using AI, Blockchain and Cloud
  • Digital Transformation: Efficient and Effective Cross-border Cloud Integration
  • AWS Machine Learning and Serverless Solutions
  • Azure Arc – Innovation Across Multi-cloud

Details of the event:

Date: October 25, 2022 (Tuesday)
Time: 09:00-12:30 – Executive Conference
14:30-17:30 – Cloud Tech Workshop
Venue: Hong Kong Convention & Exhibition Center
Details: https://www.cloudforum.hk/

Cyber-Dependent Crimes and Jurisdictional Issues (HKLRC Consultation Paper) Discussion Forum

The consultation paper on Cyber-Dependent Crimes and Jurisdictional Issues was published by the Cybercrime Sub-committee of the Law Reform Commission on July 20, 2022.  

https://www.hkreform.gov.hk/en/publications/cybercrime.htm

The purpose of the consultation paper is to make preliminary proposals for law reform on addressing the issues of the protection of individuals’ rights as well as the criminal activities carried out by the rapid developments of information technology, the computer and the internet.

This consultation is affecting our future view in CyberSecurity area. The proposed five cyber-dependent crimes mentioned in the paper will definitely impacts all of us including CyberSecurity practitioners and even IT practitioners.

Thus, Cloud Security Alliance Hong Kong & Macau Chapter is working with HKU Computer Science Department, as well as Information Security and Forensics Society (https://www.isfs.org.hk), Hong Kong Computer Society (https://www.hkcs.org.hk) and other IT organisations to jointly organise a Tech Forum to discuss on the topic.

Online Discussion will be held on September 14, 2022:

DATE: September 14, 2022 (Wednesday)
TIME: 18:30 – 20:30 (HK Time)
FORMAT: Online Zoom
TOPIC: HKU-CS Online Tech Forum and Discussion:  the Consultation Paper on Cyber-Dependent Crimes and Jurisdictional Issues

Agenda

  • Opening Remarks
  • Brief Introduction – The Purpose Of This Forum
  • Brief Introduction – The Consultation Paper
  • Q&A Session
  • Closing Remarks

Free registration at https://forms.gle/eJtEsxGZkrMPFQ5HA

CSA HKM Supports Information Security Summit 2022

Cloud Security Alliance Hong Kong & Macau Chapter is a proud supporter of the Information Security Summit 2022.

Jointly organised by the Hong Kong Productivity Council and leading information security organisations in Hong Kong, the Summit is the flagship cyber security summit in Hong Kong, with the aim to provide participants with the latest information security trends and developments.

This year, themed “Security Transformation for the Next Normal – Evolution of Risk Management and Data Protection in a Post Pandemic World”, the 2-day Summit will focus on how the enterprises can transform their security successfully under the cyber security challenges and the escalating cyber threats for the next normal. The topic will cover emerging cyber attacks and technologies, new security defence framework and risk management methodologies.

Details:

Date:6-7 September 2022
Time:09:00 – 18:00
Venue:4th Floor, Hong Kong Convention and Exhibition Centre
Fee:Free (Registration is required)
Registration:https://www.issummit.org/registration/index.html
Details:https://www.issummit.org/

CSA HKM Knowledge Sharing Event – August 2022

With an exploding set of cloud infrastructure services and an increasing number of stakeholders involved in infrastructure and security decisions, the cloud has formed the perfect storm for security. In the ever-evolving threat landscape, organisations need capabilities in place to help detect and respond rapidly to threats that may breach defenses. Today, many organizations use multiple, separate security layers to detect threats across their email, endpoints, servers, cloud infrastructure, and networks, leading to siloed threat information and an overload of uncorrelated alerts.

In the Knowledge Sharing Event organised by Cloud Security Alliance Hong Kong & Macau Chapter on August 11, our guest speaker, Alan Leung from Trend Micro will introduce ways to broaden an organisation’s scope of detection and response across endpoint, email, networks, servers, and cloud workloads; as well as collecting and analyzing diverse data quickly empowers teams to understand, mitigate, and respond to risk.

Please do not miss this opportunity to learn from the expert and get connected with your peers.

Participants will claim 1 CPE.

DATE: August 11, 2022 (Thursday)
TIME: 12:30 – 01:30 pm
FORMAT: Webinar (in Cantonese)
TOPIC: Enhanced Visibility to Mitigate Risks on Cloud Workload
SPEAKER: Alan Leung, Consultant, Trend Micro

CONTENT:

As more organizations are moving their server workloads to the cloud to enjoy the many advantages of hybrid cloud computing, they also face more risks and threats. Organizations must ensure compliance requirements are met, and that they have unified security and visibility across all workloads such as physical servers, virtual, cloud, or containers. Join this session to understand the crucial elements of a comprehensive detection and protection and how to leverage enhanced visibility to complement the protection.

THE SPEAKER:
Alan is a Consultant at Trend Micro – a Global leader in Cyber Security solutions. He provides Security advise and Technical consultation to Enterprise Customers.

Prior to joining Trend Micro, Alan was a Technology Consultant with more than 10 years of IT experience. He has strong technical background in datacenter, cloud and network security.

He also obtained the CCIE and a number of certificates in cyber security from a number of vendors.

View the Presentation: https://youtu.be/AT9Q2MLxbhs

CSA HKM Knowledge Sharing Event – June 2022

Securing cloud computing environment is more than just protecting data and workloads in the cloud and cloud management platform. When more and more cloud-based applications were developed in shared model, vulnerabilities in shared environment could fall between the cracks. Thus, supply chain risk already become a serious issue to many companies.

In the Knowledge Sharing Event organised by Cloud Security Alliance Hong Kong & Macau Chapter on June 9, we will look into how to detect and mitigate supply chain risks.

Checkmarx Engineer, Richard Lee, will bring us to the practice world of security review through demonstration. He will cover:

  • The types of risks associated with open source libraries  
  • How to test the libraries you’re using for safety 
  • Tools you can use to protect your business
  • New reputational and behavioral analysis techniques to overcome obfuscation attempts

Please do not miss this opportunity to learn from the expert and get connected with your peers.

Participants will claim 1 CPE.

DATE: June 9, 2022 (Thursday)
TIME: 12:30 – 01:30 pm
FORMAT: Webinar
TOPIC: Open Source Software Supply Chain: Risks and Mitigation
SPEAKER: Richard Lee, APAC Channel Sales Engineer, Checkmarx

CONTENT:

Open source libraries have become an essential part of almost all modern applications.  Without open source, software development would be stuck in the slow lane. Not “reinventing the wheel” each time you need a certain functionality in an app saves time and effort, and as a result, open source isn’t going away anytime soon. If anything, it’s becoming more and more widespread.     

But there’s a certain amount of risk that comes with using open source components, modules, and libraries. Today, it’s increasingly important to protect yourself from these risks.

In this session, we discussed the importance and prevalence of open source software as well as the ways you can protect yourself from its attendant risks and licensing issues. The goal is to catch issues early, before they can become a problem or a liability. We’ll cover best practices to secure the software supply chain against errors and bad actors, along with what steps to avoid.

THE SPEAKER:
Richard Lee is currently the Checkmarx Channel Sales Engineer for the Asia Pacific Region with over 10 years’ experience in the IT, IT security and Application Security industry. He has held various positions in manufacturing, software companies and information security companies.

Richard is currently responsible for AST Platform, SAST (Static Application Security Testing), IAST (Interactive Application Security Testing), SCA (Software Composition Analysis) and CodeBashing technologies. Prior to joining Checkmarx he held various positions at Intel, Microsoft, HP and SafeNet.

Richard holds a bachelor’s degree in Computer Science from the University of Kansas, USA.

View the presentation: https://youtu.be/LY8Tkisq2Zs

CSA HKM Supports Digital Practice Summit Asia

Cloud Security Alliance Hong Kong & Macau Chapter is elated to be an Association Partner of Digital Practice Summit Asia, part of AF Show Asia series taking place LIVE on June 15!

Digital Practice Summit Asia is the online technology event of the year for accountants in practice. With 20+ LIVE sessions across 2 Channels, it’ll offer the audience the greatest insights to help growing the accounting practice post pandemic in 2022 and beyond.

DATE: June 15, 2022, Wednesday

TIME: From 9:00 am

FORMAT: Online

Get your FREE virtual pass now: https://bit.ly/3MWr9Qf

CSA HKM Knowledge Sharing Event – May 2022

Covid-19 situation is less severe these days. Work from home is not strictly required now. Life is now back to normal. Under the new normal situation, Cloud Computing become a critical component in our daily work. One of the main concern in using Cloud Computing environment is the security.

How can we store secret across multiple cloud environment for secure cloud workflow? In this knowledge sharing session, we invited HashiCorp Cloud Platform to provide us with some insights.

Shohei Maeda, Developer Advocate for HashiCorp APJ will share with us how secret could be and should be stored in cloud and container environment. He will also bring us to the Zero Trust Security model to secure our workflow environment.

Please do not miss this opportunity to learn from the expert and get connected with your peers.

Participants will claim 1 CPE.

DATE: May 19, 2022 (Thursday)
TIME: 12:30 – 01:30 pm
FORMAT: Webinar
TOPIC: Managing Secrets at scale for a Secure Cloud workflow
SPEAKER: Shohei Maeda, Developer Advocate for HashiCorp APJ

CONTENT:
Traditionally, people, applications, and services with access to resources are given their own set of long-lived, scoped credentials.  As your organization, teams, and systems scale, the number of these credentials and the access to them will only increase over time, and are used everywhere which causes what is called “Secret Sprawl”.  Static credentials that exist in your workflows are always at risk of leakage and introduce a large attack surface.

This session will show you how you can apply a Zero Trust Security model that secures your workflows by leveraging dynamic and short-lived credentials.
With this, you are able to avoid managing static, long-lived secrets across systems, and giving direct access to these secrets is no longer required.

THE SPEAKER:
Shohei is a developer advocate at HashiCorp who loves learning new technologies. He lives in Tokyo, Japan.

With his broad experience in Infrastructure, security, and web engineering, he focuses on building new tools and tackling complex problems that developer communities run into to make their life easy and happy.

View the Presentation: https://www.youtube.com/watch?v=RZ3-rKiAEvY

CSA HKM Supports Hong Kong ICT Award 2022

The Hong Kong ICT Awards aims at recognising and promoting outstanding information and communications technology inventions and applications, thereby encouraging innovation and excellence among Hong Kong’s ICT talent and enterprises in their constant pursuit of creative and better solutions to meet business and social needs.

The Award was established in 2006 with the collaborative efforts of the industry, academia and the Government. Steered by the Office of the Government Chief Information Officer, and organised by Hong Kong ICT industry associations and professional bodies. The Cloud Security Alliance Hong Kong & Macau Chapter is a supporting organisation this year.

There are eight categories under the Hong Kong ICT Awards 2022. There will be one Grand Award in each category, and an “Award of the Year” will be selected from the eight Grand Awards by the Grand Judging Panel. HKCS is officially appointed by OGCIO to be the Leading Organiser of the Hong Kong ICT Awards 2022 – Smart Business Award category. The Smart Business Award covers 3 streams, including Solution for Business and Public Sector Enterprise, Solution for SME as well as Emerging Technologies.

For details please visit: https://hkcs.org.hk/ictawards/

CSA HKM Knowledge Sharing Event – April 2022

Covid-19 brings us a lot of challenges but at the same time with Work / Study at Home opportunity. We have secure a number of new study opportunities and learning opportunities to our members.

Firstly, as a CSA HKM Chapter member, you can enjoy our knowledge sharing session and claim CPE. Besides, if you are our member and have attended 3 of our knowledge sharing event sessions, you can then entitle to register for our CCSK course and CCAK course with special member discount (Membership – Associate Member).

In April we invited Mr Ken Zhang, Head of Security Hong Kong, Google Cloud, to join us again to share the new topic on Security Framework SLSA for CI/CD pipeline. Ken has delivered a talk for us on Cloud Infrastructure Continuous Compliance in November last year.

Please do not miss this opportunity to learn from the expert and get connected with your peers.

Participants will claim 1 CPE.

DATE: April 21, 2022 (Thursday)

TIME: 12:30 – 01:30 pm

VENUE: Webinar

SPEAKER: Ken Zhang, Head of Security Hong Kong, Google Cloud

TOPIC: Supply chain Levels for Software Artifacts (SLSA) – Open-source Security framework for Serverless and CI/CD Pipeline.

CONTENT:

SLSA is a security framework, a check-list of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure in your projects, businesses or enterprises. The solution takes the conceptual framework and turns it into a reference architecture and actual implementation on GCP using native, serverless GCP CI/CD toolchain and Binary Authorisation.

You can directly borrow the solution demo setup & code to start their GCP based CI/CD pipeline design and build. You can also leverage the reference architecture to build out their own pipeline leveraging GCP Binary Authorisation and GKE, or your own pipeline on-premises or on other cloud.

THE SPEAKER:

Ken led multi-cloud security and transformation projects in Australia and the Greater China Region. He has experience helping organisations with their security and transformation journeys in banking, insurance, retail, health service and manufacturing industries

View the Presentation: https://youtu.be/C8h6mfM_VhY