ADVISORY SERVICES
advancing cybersecurity
contact us
Public Engagement
February 18, 2021
CONTRIBUTOR
Tatarklubben
Jack Domet On: How to Manage Your Company’s Cyber Risks
January 16, 2018
SPEECH
S4X18 Conference
Miami, USA
It Can Be Better - Effective Engagement With Boards of Directors
October 27, 2017
COURSE
Hong Kong Institute of Directors
Hong Kong, China
Fulfilling Board Cybersecurity Responsibilities
June 29, 2017
SPEECH
Practicing Governance
Hong Kong, China
Demystifying Cybersecurity for Corporate Leadership
September 23, 2016
SPEECH
Risk Management & Security Asia Pacific Summit
Shanghai, China
Cyber Risk Reporting to the Board
September 22, 2016
COURSE
Chatham House Cyber Security Seminar
Hong Kong, China
Cyber Security in Business
June 21, 2016
COURSE
International Security Management Association
Vancouver, Canada
Technology Trends and Cyber Issues that Affect Security Organizations: Critical Information for CSO
October 29, 2015
SPEECH
Bay Area Council & National Cyber Security Alliance Town Hall
San Francisco, USA
Cybersecurity and Critical Infrastructure
November 7, 2014
SPEECH
STEP Global Congress
Miami, USA
Cyber-security for you and your clients in the digital age
February 3, 2014
SPEECH
International Security Management Association (ISMA) Bi-Annual Meeting
San Diego, USA
Emerging Risks Posed by the Collision of the Digital and Physical Worlds
January 23, 2013
SPEECH
Berkeley Startup Cluster: INFUSION Lunch
Berkeley, USA
Martial Artist and Cybersecurity Expert Thomas Parenty on IP Protection
September 5, 2012
SPEECH
CIO Executive Summit 2012
Hong Kong, China
Proactive Risk Management Against Advanced Threats in the World of Cloud, Mobile Computing and Big Data
May 23, 2012
SPEECH
Pacific Basin Economic Council
Hong Kong, China
Managing and Mitigating Cyber Security and Data Breaches
April 24, 2012
SPEECH
InfoSecurity Summit
Hong Kong, China
C-Level Security Perspectives
January 1, 2012
CONTRIBUTOR
Hong Kong Computer Society
Hong Kong, China
A Practical Guide For IT Managers And Professionals On The Personal Data (Privacy) Ordinance
December 7, 2011
COURSE
5th Annual HTCIA Asia Pacific Training Conference
Hong Kong, China
Whodunnit? Anatomy of a Credit Card Fraud
November 30, 2011
SPEECH
Information Security Summit 2011
Hong Kong, China
Security Risks of Cloud, Mobile and Social Networking Environments
June 20, 2011
SPEECH
Information Security Summit
Kuala Lumpur, Malaysia
Global Security Risks and Trends 2011
June 16, 2011
SPEECH
InfoSec Macau
Macau, China
The Enemy Within; the Enemy Without: A Strategic Overview of Threats to Organizational Information Security
May 17, 2011
SPEECH
12th Info-Security Conference
Hong Kong, China
Security Conundrum: Balancing Control vs. Choice
January 25, 2011
SPEECH
2nd BankTech Executive Summit
Hong Kong, China
Information Security Concerns & Challenges in FSI
November 17, 2010
SPEECH
Information Security Summit
Hong Kong, China
Cloud and Mobile Security in a Blurred Perimeter Environment
June 3, 2010
SPEECH
Regional Internet Governance Forum Asia
Hong Kong, China
Security: Cyber-Security and Network Confidence
June 3, 2010
SPEECH
INSEC@Asian Securitex
Hong Kong, China
The Enemy Within, The Enemy Without: Protecting Companies in Asia
March 17, 2010
SPEECH
2nd Annual Hong Kong InfoSecurity Summit
Hong Kong, China
Information Security Concerns & Challenges 2010-2015
December 11, 2009
SPEECH
CSO Conference and Awards
Ho Chi Minh City, Vietnam
A Guide for the New CSO
December 2, 2009
SPEECH
HTCIA 3rd Annual Asia Pacific Regional Training Conference
Hong Kong, China
Digital Forensics – Specialists, eDiscoverers, Lawyers & Managers? How each role shapes the future of forensics.
November 18, 2009
SPEECH
Information Security Summit
Hong Kong, China
Security In The Age Of Cloud Computing, Virtualisation And Social Networking
October 28, 2009
SPEECH
International Industrial Security Conference
Seoul, Korea
Unified Approach to Protecting Enterprise Assets
May 6, 2009
SPEECH
InfoSecurity Summit
Hong Kong, China
Driving Business Value with Security Innovation
March 23, 2009
SPEECH
South China OSAC Conference
Hong Kong, China
Staying Connected Securely in China
March 11, 2009
SPEECH
Cyberport Speaker Series
Hong Kong, China
Creating Safe Collaborative Environments
February 26, 2009
SPEECH
BankTech Executive Summit
Hong Kong, China
Information Security Risk Management: Emerging Threats and Insights for Financial Institutions
November 19, 2008
SPEECH
Information Security Summit
Hong Kong, China
Security Challenges Facing Mobile Executives
November 19, 2008
SPEECH
Information Security Summit
Hong Kong, China
Enhancing Mobility Security In An Information Collaboration World
October 28, 2008
SPEECH
Hospital Facility Physical & Integrated Security Systems
Seoul, Korea
Digital Protections for Patient Data
September 3, 2008
SPEECH
CIO Executive Summit
Hong Kong, China
The Transformation of Enterprise Security
May 21, 2008
SPEECH
9th Info-Security Conference
Hong Kong, China
Effective Strategies to Safeguard Business from Critical Data Loss
March 19, 2008
SPEECH
Security World Conference and Showcase
Hanoi, Vietnam
Best Practice and Solutions for Business Information System Security
February 2, 2008
SPEECH
Chinese University of Hong Kong
Hong Kong, China
How Companies Do and Don’t Protect Themselves
December 12, 2007
SPEECH
HTCIA Asia Pacific Training Conference
Hong Kong, China
Picking up the Pieces: The Aftermath of Computer Crime
December 5, 2007
SPEECH
Information Security Summit
Hong Kong, China
Information Security Evolution – Convergence / Compliance / Certification
August 30, 2007
SPEECH
In-House Congress
Seoul, Korea
Beyond Fake Watches: Protecting Intellectual Property in Asia
July 2, 2007
SPEECH
Visa Asia Pacific Risk Conference
Singapore
Payment Data Security: Making Audits Effective
June 19, 2007
SPEECH
American Chamber of Commerce
Bangkok, Thailand
Digital Defense: What You Should Know About Protecting Your Company’s Assets
May 16, 2007
SPEECH
8th Info-Security Conference
Hong Kong, China
Sacrificing the Possible for the Perfect: Why ISO27001 Undermines Security
June 14, 2007
SPEECH
Hong Kong Business Excellence Forum
Hong Kong, China
Digital Defense: Key to Corporate Success
June 13, 2007
SPEECH
American Consulate General Network Security Executive Luncheon
Hong Kong, China
Collaborating Safely
June 1, 2007
SPEECH
Banking Vietnam
Hanoi, Vietnam
Security in Credit Card Transactions
May 22, 2007
SPEECH
The 2nd Info-Security and Storage Solution Forum Asia
Hong Kong, China
Digital Defense: What You Should Know About Protecting Your Company's Assets
March 21, 2007
SPEECH
Security World
Hanoi, Vietnam
Digital Defense: What You Should Know About Protecting Your Company's Assets
January 27, 2007
SPEECH
Chinese University of Hong Kong
Hong Kong, China
Managing Information-Based Risk
October 22, 2006
SPEECH
The China Economic Growth Forum
Suzhou, China
What Makes Companies Winning Innovators? New Approaches to Global Collaboration
July 13, 2006
SPEECH
Sixth Annual Value-added Internal Audit & Risk Control Conference
Shanghai, China
Building a Proactive Security Infrastructure Across the Enterprise
April 27, 2006
SPEECH
Internal Audit, Corporate Governance & Compliance World Summit
Shanghai, China
Proactive Protection of Financial / Corporate / Sensitive Information
March 31, 2006
SPEECH
HKCS – ISSG Special Forum
Hong Kong, China
Data Privacy & IT Security Governance – What has the IPCC incident taught us?
March 27, 2006
SPEECH
Telecom Infotech Forum: e-Security in the Broadband Age
Hong Kong, China
Enterprise E-Security
March 23, 2006
SPEECH
Fraud, Risk and Security World
Hong Kong, China
Proactive IP Protection: Managing the risk before it’s too late
February 17, 2006
COURSE
US Commercial Service: Security
Hong Kong, China
Email Security Threats
February 14, 2006
SPEECH
Visa International Merchant Forum
Milan, Italy
Securing Confidence
February 4, 2006
SPEECH
Chinese University of Hong Kong
Hong Kong, China
Digital Business: What’s The Right Protection?
November 30, 2005
SPEECH
Guangzhou’s German Chamber of Commerce
Shenzhen, China
IT Security with Special Guest Thomas Parenty
November 9, 2005
SPEECH
Information Security Summit
Hong Kong, China
Best Practices for Forensically Sound Information Security Management
November 8, 2005
SPEECH
Joint AmCham Information Technology & Telecom and Intellectual Property Committee
Hong Kong, China
Beyond Fake Watches: Protecting Intellectual Property in Asia
November 8, 2005
SPEECH
Information Security Summit
Hong Kong, China
Security Architectures for Lifecycle Intellectual Property Protection
September 6, 2005
SPEECH
CIO Forum Asia
Hong Kong, China
CIO’s Information Security Agenda
January 22, 2005
SPEECH
Chinese University of Hong Kong
Hong Kong, China
Digital Identities: Misplaced Trust
January 12, 2005
SPEECH
German Chamber of Commerce
Guangzhou, China
IT Strategies to Protect Intellectual Capital
November 11, 2004
SPEECH
Information Security Summit
Hong Kong, China
Developing Effective Encryption Systems
November 1, 2004
COURSE
Biometric Systems Industry
Providing Training in Biometric System Security
October 30, 2004
SPEECH
The Center for Secure Information Management
Worldwide Broadcast
Protect Your Business, Not Just Its Computers
August 5, 2004
SPEECH
Information Systems Audit and Control Association
Hong Kong, China
Digital Hacking: Cracking E-Commerce Transactions
July 27, 2004
SPEECH
Hong Kong Computer Society EBIZ SIG & Hong Kong Society of Accountants ITIG
Hong Kong, China
eBusiness Objectives Drive Security
June 2, 2004
SPEECH
Information Security Showcase
Hong Kong, China
How to Steal Identities for Fun and Profit
May 18, 2004
SPEECH
Hong Kong Knowledge Management Society
Hong Kong, China
Information Security & Knowledge Management
February 18, 2004
SPEECH
Integrated Security Conference & Expo
Hong Kong, China
A Comprehensive Approach to Business Protection, CIO Interview: Getting the Most out of Security Investment
January 15, 2004
SPEECH
The Young Entrepreneurs Development Council Roundtable Forum
Hong Kong, China
Common lessons in starting different companies
January 13, 2004
SPEECH
American Chamber of Commerce in Hong Kong, Information Technology Committee
Hong Kong, China
Digital Defense: What You Should Know About Protecting Your Company’s Assets
December 2, 2003
SPEECH
Harvard Business School Audio Conference
Worldwide Broadcast
Essential Information Security for Non-Technical Managers
December 1, 2003
SPEECH
CNN Global Office
Worldwide Broadcast
Cyber-security enters boardroom
November 26, 2003
SPEECH
Economist Conferences: Asia Pacific Chief Information Officers’ Roundtable
Hong Kong, China
Now a risk manager as well…
September 24, 2003
SPEECH
University Rotary Club
Palo Alto, USA
Executive Perspectives on Information Security
September 23, 2003
SPEECH
Executive Luncheon: Unlock The Secrets of Corporate Governance
Hong Kong, China
Digital Defense: What You Should Know About Protecting Your Company’s Assets
September 15, 2003
SPEECH
Hong Kong PKI Forum
Hong Kong, China
Truth in Advertising: What PKI Can Really Deliver to Business
July 18, 2003
SPEECH
Hong Kong General Chamber of Commerce Roundtable Luncheon
Hong Kong, China
Digital Defense: Who’s the Enemy?
July 14, 2003
SPEECH
Rotary Club of Wanchai
Hong Kong, China
Information Security: A Business Focus
June 26, 2003
SPEECH
Project Management Institute (PMI) Annual Business Meeting, Northern Utah Chapter
Salt Lake City, USA
Think Before You Spend: Making Your IT Security Dollars Count
February 5, 2002
SPEECH
Sun Microsystems Conference
Worldwide Broadcast
Secure Applications for the Web Services Environment
January 4, 2002
SPEECH
Sybase Web Conference
Worldwide Broadcast
Ensuring Secure, Personalized Information Access - Security’s Role in a Portal
December 13, 2001
SPEECH
Sybase Web Conference
Worldwide Broadcast
The Rules for Application Security are Changing from Product to Service
January 1, 2001
CONTRIBUTOR
National Research Council
An Assessment of the National Institute of Standards and Technology Measurement and Standards Laboratories: Fiscal Year 2001
January 1, 2000
CONTRIBUTOR
National Research Council
An Assessment of the National Institute of Standards and Technology Measurement and Standards Laboratories: Fiscal Year 2000
October 13, 1999
SPEECH
The MIS and IIA Annual Conference on Control, Audit & Security of Information Systems
Washington D.C., USA
Sybase: Security for Internet Computing
August 24, 1999
SPEECH
TechWave
Orlando, USA
Securing Your Multi Tier Environment with Enterprise Application Server
May 5, 1999
SPEECH
Eleventh Annual Software Technology Conference
Salt Lake City, USA
Security for Transaction Server-based Architectures
March 4, 1999
TESTIMONY
Courts and Intellectual Property Subcommittee of the Committee on the Judiciary
Washington D.C., USA
Immediate Need for Relaxation of Export Controls for Software and Hardware with Encryption Capabilities
February 23, 1999
SPEECH
Connect ’99
Sydney, Australia
Sybase Security for E-Commerce
January 1, 1999
CONTRIBUTOR
National Research Council
An Assessment of the National Institute of Standards and Technology Measurement and Standards Laboratories: Fiscal Year 1999
December 9, 1998
SPEECH
Java Business Expo
New York, USA
Security Requirements for Electronic Commerce
October 7, 1998
SPEECH
ISUG European Conference
Hamburg, Germany
Sybase Internet Security
September 7, 1998
SPEECH
Asia Pacific Economic Cooperation (APEC-TEL 18th Meeting)
Port Moresby, Papua New Guinea
Authentication of Electronic Commerce Transactions
May 4, 1998
SPEECH
International Sybase User Group North American Conference
Washington D.C., USA
Internet Security with Sybase
April 26, 1998
SPEECH
Internet Commerce Expo
Boston, USA
Understanding & Using Public Key Cryptography for Secure Internet Transactions
March 17, 1998
TESTIMONY
Constitution, Federalism and Property Rights Subcommittee of the Committee on the Judiciary
Washington D.C., USA
Why Encryption Protects Privacy, Prevents Crime, and Promotes National Security
November 5, 1997
SPEECH
VIENNA ’97: Harmonizing Technology & Business
Vienna, Austria
Internet Security
October 14, 1997
SPEECH
Haas School of Business University of California
Berkeley, USA
How can you trust E-commerce?
October 8, 1997
SPEECH
20th National Information Systems Security Conference
Baltimore, USA
Database Security: Browsers, Encryption, Certificates and More
October 1, 1997
CONTRIBUTOR
The President’s Commission on Critical Infrastructure Protection
Washington D.C., USA
Critical Foundations: Protecting America's Infrastructures
October 1, 1997
CONTRIBUTOR
The President’s Commission on Critical Infrastructure Protection
Washington D.C., USA
Commercial Perspectives on Information Assurance Research
September 11, 1997
SPEECH
Internet Commerce Expo
Los Angeles, USA
Understanding & Using Public Key Cryptography for Secure Internet Transactions
September 4, 1997
TESTIMONY
Commerce Committee
Washington D.C., USA
Immediate Need for Export Control Relief for Software with Encryption Capabilities
July 30, 1997
TESTIMONY
National Security Committee
Washington D.C., USA
Protecting Public and Private Networks Through US Software with Encryption Capabilities is Critical to America's National Security
May 8, 1997
TESTIMONY
International Economic Policy and Trade Subcommittee of the International Relations Committee
Washington D.C., USA
Immediate Need for Export Control Relief for Software with Encryption Capabilities
April 11, 1997
SPEECH
Internet Commerce Expo
Atlanta, USA
Understanding & Using Public Key Cryptography for Secure Internet Transactions
April 10, 1997
SPEECH
Sybase International Users Group
Orlando, USA
Sybase Internet Security
February 20, 1997
SPEECH
DCI’s Internet Expo & C/S Internet Conference
San Jose, USA
Internet Security: Is It Achievable?
October 21, 1996
SPEECH
19th National Information System Security Conference
Baltimore, USA
Database Systems Today: Safe Information at My Fingertips?
July 1, 1996
SPEECH
SAFE Forum, Stanford Law School
Palo Alto, USA
The Cryptographer’s Report: Forty Bits is Not Enough
October 1, 1995
SPEECH
18th National Information System Security Conference
Baltimore, USA
Directions for Database Security
October 1, 1995
CONTRIBUTOR
National Institute of Standards and Technology
An Introduction To Computer Security: The NIST Handbook
October 15, 1992
SPEECH
15th National Computer Security Conference
Baltimore, USA
Making it Work: Applying INFOSEC to the Real World
April 3, 1991
SPEECH
UCLA Extension, Department of Business, Engineering and Management
Los Angeles, USA
Trusted Database Management Systems
May 1, 1989
SPEECH
IEEE Computer Society Symposium on Security and Privacy
Oakland, USA
The Incorporation of Multi-Level IPC into UNIX