Deprecated: Function jetpack_form_register_pattern is deprecated since version jetpack-13.4! Use Automattic\Jetpack\Forms\ContactForm\Util::register_pattern instead. in /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/functions.php on line 6078

Warning: Cannot modify header information - headers already sent by (output started at /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/functions.php:6078) in /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/functions.php:6078) in /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/functions.php:6078) in /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/functions.php:6078) in /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/functions.php:6078) in /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/functions.php:6078) in /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/functions.php:6078) in /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/functions.php:6078) in /home/xesb586/public_html/foongchengleong.com/wp/wp-includes/rest-api/class-wp-rest-server.php on line 1831
{"id":1301,"date":"2016-07-12T02:38:52","date_gmt":"2016-07-12T02:38:52","guid":{"rendered":"http:\/\/foongchengleong.com\/?p=1301"},"modified":"2016-07-12T02:38:52","modified_gmt":"2016-07-12T02:38:52","slug":"event-asean-it-security-conference-2016","status":"publish","type":"post","link":"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/","title":{"rendered":"Event: ASEAN IT Security Conference 2016"},"content":{"rendered":"

I will be speaking at at ASEAN IT Security Conference 2016 on the topic “Dealing with Computer Crimes Within the Organisation: A Case Study on Computer Crimes Act 1997<\/strong>“.<\/p>\n


<\/p>\n

Details about the event<\/strong><\/p>\n

Cyber security is headline news almost constantly because hacks, data theft and high profile breaches are now a part of daily life and almost impossible to avoid. In 2016, a number of new laws will be enacted in the US, Europe and Asia that all have important, and potentially financially punitive, ramifications for Asian-based organizations.<\/p>\n

However the C-Suite are not fully conversant with correct strategy by which cyber security investments should be made. This is not a business ROI that can be expected. Cyber-warfare and cyber security investments are akin to military spending. We have to do in the hope that we never use the tools.<\/p>\n

This is anathema to many business investments, however the consequences of not taking this approach could lead to legal disputes, customer dissatisfaction, and even loss of jobs and careers at all levels in the organization.<\/p>\n

At this conference series, IDC and its partners will share some of the new people, process and technology strategies that the C-Suite should consider to be better prepared for future incidents, and whilst absolute security cannot be guaranteed, making your organization a hard target to breach may well be the solution for the future.<\/p>\n

Based on the IDC IT Security MaturityScape, IDC will share how some of the best-in-class organizations globally think about managing their IT Security teams, from board-level reporting to IT operational management.<\/p>\n

This holistic view will help the C-Suite, and those that report in to the C-Suite to more eloquently articulate the issues, challenges and requirements that will be critical to ensure that future attack surface is minimized, and suitable crisis management plans and responses are in place.<\/p>\n

Attend this event to learn more about how to deflect the latest attacks and what more you can do to deliver a more secure environment to your business.<\/p>\n

Speakers<\/strong><\/p>\n

David Rajoo
\nDirector, Systems Engineering, Symantec Malaysia<\/p>\n

Foong Cheng Leong
\nAdvocate and Solicitor, Foong Cheng Leong & Co<\/p>\n

Javenn Ng
\nDPtech Lead & Business Development Director, DPtech<\/p>\n

Jayan Arunasalam
\nHead of Technology & Innovation, Tune Protect Group Berhad<\/p>\n

Marcus Lai
\nVice President, International Business, DPtech<\/p>\n

Peter Leong
\nHead, Regional IT \u2013 Asia, PETRONAS Lubricants International Sdn. Bhd.<\/p>\n

Simon Piff
\nAssociate Vice President, Enterprise Infrastructure & Head of IT Security Research, IDC Asia\/Pacific<\/p>\n

Thillai Raj T. Ramanathan
\nChief Technology Officer, MIMOS Berhad<\/p>\n

For more information, please visit here<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"

I will be speaking at at ASEAN IT Security Conference 2016 on the topic “Dealing with Computer Crimes Within the Organisation: A Case Study on Computer Crimes Act 1997“. Details about the event Cyber security is headline news almost constantly because hacks, data theft and high profile breaches are now a part of daily life […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[199],"tags":[12,858,866,869,859,860,861,870,862,868,863,865,864,867],"yoast_head":"\nEvent: ASEAN IT Security Conference 2016 - Foong Cheng Leong<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Event: ASEAN IT Security Conference 2016 - Foong Cheng Leong\" \/>\n<meta property=\"og:description\" content=\"I will be speaking at at ASEAN IT Security Conference 2016 on the topic “Dealing with Computer Crimes Within the Organisation: A Case Study on Computer Crimes Act 1997“. Details about the event Cyber security is headline news almost constantly because hacks, data theft and high profile breaches are now a part of daily life […]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/\" \/>\n<meta property=\"og:site_name\" content=\"Foong Cheng Leong\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FCLCo\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-12T02:38:52+00:00\" \/>\n<meta name=\"author\" content=\"FCL\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"FCL\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/\",\"url\":\"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/\",\"name\":\"Event: ASEAN IT Security Conference 2016 - Foong Cheng Leong\",\"isPartOf\":{\"@id\":\"https:\/\/foongchengleong.com\/wp\/#website\"},\"datePublished\":\"2016-07-12T02:38:52+00:00\",\"dateModified\":\"2016-07-12T02:38:52+00:00\",\"author\":{\"@id\":\"https:\/\/foongchengleong.com\/wp\/#\/schema\/person\/c3c6afdacad8d7eb10ab36074bb52c70\"},\"breadcrumb\":{\"@id\":\"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/foongchengleong.com\/wp\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Event: ASEAN IT Security Conference 2016\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/foongchengleong.com\/wp\/#website\",\"url\":\"https:\/\/foongchengleong.com\/wp\/\",\"name\":\"Foong Cheng Leong\",\"description\":\"Intellectual Property, Information Technology, Privacy and Data Protection and Franchise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/foongchengleong.com\/wp\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/foongchengleong.com\/wp\/#\/schema\/person\/c3c6afdacad8d7eb10ab36074bb52c70\",\"name\":\"FCL\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/foongchengleong.com\/wp\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/364f4bd48ac1a25bb81ad7fe2324993b?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/364f4bd48ac1a25bb81ad7fe2324993b?s=96&d=mm&r=g\",\"caption\":\"FCL\"},\"sameAs\":[\"https:\/\/foongchengleong.com\/wp\"],\"url\":\"http:\/\/foongchengleong.com\/wp\/author\/xes\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Event: ASEAN IT Security Conference 2016 - Foong Cheng Leong","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/","og_locale":"en_US","og_type":"article","og_title":"Event: ASEAN IT Security Conference 2016 - Foong Cheng Leong","og_description":"I will be speaking at at ASEAN IT Security Conference 2016 on the topic “Dealing with Computer Crimes Within the Organisation: A Case Study on Computer Crimes Act 1997“. Details about the event Cyber security is headline news almost constantly because hacks, data theft and high profile breaches are now a part of daily life […]","og_url":"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/","og_site_name":"Foong Cheng Leong","article_publisher":"https:\/\/www.facebook.com\/FCLCo","article_published_time":"2016-07-12T02:38:52+00:00","author":"FCL","twitter_card":"summary_large_image","twitter_misc":{"Written by":"FCL","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/","url":"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/","name":"Event: ASEAN IT Security Conference 2016 - Foong Cheng Leong","isPartOf":{"@id":"https:\/\/foongchengleong.com\/wp\/#website"},"datePublished":"2016-07-12T02:38:52+00:00","dateModified":"2016-07-12T02:38:52+00:00","author":{"@id":"https:\/\/foongchengleong.com\/wp\/#\/schema\/person\/c3c6afdacad8d7eb10ab36074bb52c70"},"breadcrumb":{"@id":"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/foongchengleong.com\/wp\/event-asean-it-security-conference-2016\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/foongchengleong.com\/wp\/"},{"@type":"ListItem","position":2,"name":"Event: ASEAN IT Security Conference 2016"}]},{"@type":"WebSite","@id":"https:\/\/foongchengleong.com\/wp\/#website","url":"https:\/\/foongchengleong.com\/wp\/","name":"Foong Cheng Leong","description":"Intellectual Property, Information Technology, Privacy and Data Protection and Franchise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/foongchengleong.com\/wp\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/foongchengleong.com\/wp\/#\/schema\/person\/c3c6afdacad8d7eb10ab36074bb52c70","name":"FCL","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/foongchengleong.com\/wp\/#\/schema\/person\/image\/","url":"http:\/\/0.gravatar.com\/avatar\/364f4bd48ac1a25bb81ad7fe2324993b?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/364f4bd48ac1a25bb81ad7fe2324993b?s=96&d=mm&r=g","caption":"FCL"},"sameAs":["https:\/\/foongchengleong.com\/wp"],"url":"http:\/\/foongchengleong.com\/wp\/author\/xes\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/posts\/1301"}],"collection":[{"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/comments?post=1301"}],"version-history":[{"count":1,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/posts\/1301\/revisions"}],"predecessor-version":[{"id":1302,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/posts\/1301\/revisions\/1302"}],"wp:attachment":[{"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/media?parent=1301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/categories?post=1301"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/tags?post=1301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}