本網站使用Cookies 以優化閣下的用戶體驗。繼續瀏覽網頁,以示閣下同意本站使用Cookies。詳情請參閱Cookie政策私隱政策

確定

返回

搶佔先機應對不斷演進的網絡安全威脅 (English Only)

媒體報導 @ 英文虎報

2023-12-11 下載 PDF

搶佔先機應對不斷演進的網絡安全威脅

搶佔先機應對不斷演進的網絡安全威脅 (English Only)An opening ceremony kicked off CITIC Telecom CPC’s CyberSecurity ReDEFINED conference.

CITIC Telecom CPC’s CyberSecurity ReDEFINED conference serves as a who’s who for security professionals looking to gain an edge over tomorrow’s threats and fortify their defenses through practical strategies tailored to the latest challenges.

In today's increasingly digital world, cyberattacks pose a serious threat to businesses across every industry. As new risks like deepfakes and artificial intelligence (AI)-enabled attacks emerge, the need for robust cybersecurity strategies has never been greater.

Featuring a host of keynote addresses and panel discussions, CITIC Telecom CPC’s CyberSecurity ReDEFINED conference aims to equip attendees with the knowledge and skills needed to defend their organizations in the face of evolving cyber threats. At this premier security event, technology leaders and industry experts provide insights into best practices for compliance, risk management, data protection, incident response and digital innovation security.

Maximizing AI opportunity

In his keynote ‘Why AI Matters: Opportunities, Risks and Regulation’, Edward Chui, Director (Hong Kong) of Economist Intelligence Corporate Network, discusses the surge in AI startups receiving over $67 billion last year. “New technologies like AI can improve communication, efficiency, and sustainability but companies must understand why they want to use AI,” Chui advises.

Chui stresses that “customizing AI for the company and understanding its unique business needs is key to achieving success”, while urging attendees to “identify AI concerns and risks to ensure technology’s responsible development and implementation.”

As organizations increasingly rely on new technologies like AI, mastering the skills to navigate the maze of both opportunities and risks presented by digital transformation is paramount. At the ‘CyberSecurity ReDEFINED’ keynote address, CITIC Telecom CPC’s Chief Strategy Officer Taylor Lam takes the stage to highlight how their latest TrustCSI™ 3.0 managed security solutions help enterprises achieve this balance.

“TrustCSI™ 3.0 is a comprehensive cybersecurity framework comprising four pivotal service pillars and delivering holistic protection, enabling enterprises to identify & predict, protect, detect, respond & recover from today’s complex threat landscape, including phishing attempts and denial-of-service (DoS) attacks,” he explains.

Lam outlines CITIC Telecom CPC’s innovative ‘Al-Red/Blue Cybersecurity Practices’ approach involving the Red Team’s penetration testing that utilizes AI capabilities to probe systems and find vulnerabilities, while the Blue Team provides training and deployments and helps remediate issues swiftly.

“By combining the power of offensive and defensive tactics, we revolutionize cybersecurity, transforming it from passive defense to proactive guardianship. Our approach enables clients to proactively and continually strengthen their security posture against evolving threats,” he notes.

Leveling up security

Kicking off the fireside chat, ‘AI Matters: Red/Blue CyberSecurity Practices ReDEFINED’, Master Trainer of KORNERSTONE Institute Steven Kwok has attendees fill out a live survey. The poll asks how often the companies conduct red team penetration tests or breach and attack simulations.

“The results are eye-opening,” says Kwok. “Many organizations report having never carried out either of these crucial security evaluation methods before. As experts know, regular testing is vital for identifying vulnerabilities early and pre-empting sophisticated cyber threats.”

“There are 240 techniques hackers use according to our data,” says Daniel Kwong, Field Chief Information Security Officer (South East Asia and Hong Kong) at Fortinet. “Phishing was most common, but now over half of the initial breaches involve removable media, especially prevalent in today’s environment of IoT and remote work adoption,” notes Kwong, who underscores detection, protection and automatic response as key to mitigating cyberattacks.

Brenda Lin, Assistant Director, IT Services, Information Technology Services & Data Science, of CITIC Telecom CPC, emphasizes that effective security “involves every staff member, as human beings can be the biggest loophole due to social engineering threats.” To tackle this issue, Lin advises companies to conduct regular penetration tests, enabling them to obtain a comprehensive understanding of their security levels and elevate enterprise employee defense capabilities.

Meanwhile, KT Thomas Wong, Director of Security Services Delivery & Operation at CITIC Telecom CPC, points to the importance of business continuity planning.  “Security is a form of risk management, and a risk-free environment doesn’t exist. Customers must tailor security controls to their needs, similar to subscribing to insurance. It is essential to determine downtime and data recovery, and develop a comprehensive business continuity plan. Backup technology also plays a critical role, considering the diverse needs of businesses,” he says.

Both Lin and Wong agree AI shows promise for bolstering protections. Wong highlights AI can use “logical analysis trained on large datasets to identify abnormal IP addresses, and then apply the information to firewalls, helping organizations stay abreast of evolving threats.” Lin emphasizes the importance of regular review as the digital realm continues to change rapidly.

In response to this need, CITIC Telecom CPC has utilized AI capabilities to develop an innovative solution called Penetration Test with AI. This advanced self-testing solution with self-developed AI modelling is lightweight and routine, simplifying the assessment of enterprises’ security posture and enabling them to conduct penetration tests on a regular basis. With this solution, organizations can incorporate regular testing into their cybersecurity practices, enhancing their overall information security and enabling swift enterprise-wide responses to cyber threats.

An evolving security landscape

For the second fireside chat, ‘Knowing the Unknowns: Mitigate Risk through Intelligence’, Sheila Lam, Editorial Consultant of Ignite Content Marketing, begins by posing a question to panelists: “When hackers breach defenses, how can intelligence help companies stay one step ahead and gain the upper hand?”

A case in point: HK Express has undergone rapid digital acceleration over the past 30 months to keep up with changing travel demands, explains Dr. Andy Luk, Head of Digital Transformation. However, Luk notes that speeding up systems also brings risks.
As the airline embraces new technologies like workplace automation and generative chatbots, and sees customers return following pandemic restrictions, vulnerabilities emerge. To address these challenges, HK Express has developed its own machine learning models that effectively intercept threats in real time.

Nick Ng, Systems Engineering Head at Fortinet, concurs that digital shifts bring forth rising risks, “As corporations adapt technologies, hackers discover new avenues to infiltrate systems. Experienced security partners and intelligence can help navigate this challenging landscape.”

Dave Chen, Vice President of Hong Kong Computer Society, notes that during digital shifts, IT leaders sometimes overlook the need to modernize architectures, infrastructure, and security in lockstep. “If defenses do not keep pace with new systems and connectivity, vulnerabilities can emerge,” he warns. “Businesses must take a holistic approach to transformation.”

Ng says emerging analytics bolster protections. “Machine learning harnesses vast datasets to rapidly identify system anomalies,” he says. “By monitoring traffic patterns, machine learning flags potential intrusions. It works alongside generative AI to personalize security insights to help businesses efficiently navigate risk in line with their unique operations and needs.”

CITIC Telecom CPC, with its years of expertise, technology and world-class infrastructure, serves as a trusted TechOps Security Enabler, empowering enterprises to navigate the digital landscape confidently.

By equipping IT and technology professionals with the practical know-how, tools and partnerships required to implement proactive defenses, CITIC Telecom CPC’s CyberSecurity ReDEFINED conference provides a useful platform for empowering organizations across industries to continuously leveling up organizational security to combat ever-evolving threats in the digital age.


產品與服務
網絡連接 信息安全管理 雲端運算方案 雲數據中心 互聯網服務 管理服務 歐洲解決方案
解決方案
建築、工程及建造 汽車 銀行、金融服務及保險業 物流及運輸 製造 法律和會計服務 零售 醫療保健
技術與服務
咨詢服務 客戶服務
資源中心
產品單頁 最新優惠 視頻 白皮書 成功案例 網誌
關於我們
我們公司 全球生態圈夥伴 新聞中心 認証及獎項 職位招聘
聯絡我們

一般查詢 / 銷售熱線 +852 2170 7401

客戶服務熱線 +852 2331 8930

聯絡我們

關注我們

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

需要幫忙?聯絡CPC聊天機械人
瀏覽器支援:IE11、Firefox、Chrome及Safari 的最新版本
條款及細則
歡迎來到中信國際電訊(信息技術)有限公司。閣下與CPC聊天機器人的對話内容可能會被記錄,以作培訓、質量監控和糾紛處理之用。如閣下點擊「繼續」並使用CPC聊天機器人,即表示閣下接受並同意受本公司之私隱政策約束,並同意本站使用Cookies。詳情請參閱Cookie政策私隱政策
繼續