Public Engagement

February 18, 2021
CONTRIBUTOR
Tatarklubben

Jack Domet On: How to Manage Your Company’s Cyber Risks

January 16, 2018
SPEECH
S4X18 Conference
Miami, USA

It Can Be Better - Effective Engagement With Boards of Directors

October 27, 2017
COURSE
Hong Kong Institute of Directors
Hong Kong, China

Fulfilling Board Cybersecurity Responsibilities

June 29, 2017
SPEECH
Practicing Governance
Hong Kong, China

Demystifying Cybersecurity for Corporate Leadership

September 23, 2016
SPEECH
Risk Management & Security Asia Pacific Summit
Shanghai, China

Cyber Risk Reporting to the Board

September 22, 2016
COURSE
Chatham House Cyber Security Seminar
Hong Kong, China

Cyber Security in Business

June 21, 2016
COURSE
International Security Management Association
Vancouver, Canada

Technology Trends and Cyber Issues that Affect Security Organizations: Critical Information for CSO

October 29, 2015
SPEECH
Bay Area Council & National Cyber Security Alliance Town Hall
San Francisco, USA

Cybersecurity and Critical Infrastructure

November 7, 2014
SPEECH
STEP Global Congress
Miami, USA

Cyber-security for you and your clients in the digital age

February 3, 2014
SPEECH
International Security Management Association (ISMA) Bi-Annual Meeting
San Diego, USA

Emerging Risks Posed by the Collision of the Digital and Physical Worlds

January 23, 2013
SPEECH
Berkeley Startup Cluster: INFUSION Lunch
Berkeley, USA

Martial Artist and Cybersecurity Expert Thomas Parenty on IP Protection

September 5, 2012
SPEECH
CIO Executive Summit 2012
Hong Kong, China

Proactive Risk Management Against Advanced Threats in the World of Cloud, Mobile Computing and Big Data

May 23, 2012
SPEECH
Pacific Basin Economic Council
Hong Kong, China

Managing and Mitigating Cyber Security and Data Breaches

April 24, 2012
SPEECH
InfoSecurity Summit
Hong Kong, China

C-Level Security Perspectives

January 1, 2012
CONTRIBUTOR
Hong Kong Computer Society
Hong Kong, China

A Practical Guide For IT Managers And Professionals On The Personal Data (Privacy) Ordinance

December 7, 2011
COURSE
5th Annual HTCIA Asia Pacific Training Conference
Hong Kong, China

Whodunnit? Anatomy of a Credit Card Fraud

November 30, 2011
SPEECH
Information Security Summit 2011
Hong Kong, China

Security Risks of Cloud, Mobile and Social Networking Environments

June 20, 2011
SPEECH
Information Security Summit
Kuala Lumpur, Malaysia

Global Security Risks and Trends 2011

June 16, 2011
SPEECH
InfoSec Macau
Macau, China

The Enemy Within; the Enemy Without: A Strategic Overview of Threats to Organizational Information Security

May 17, 2011
SPEECH
12th Info-Security Conference
Hong Kong, China

Security Conundrum: Balancing Control vs. Choice

January 25, 2011
SPEECH
2nd BankTech Executive Summit
Hong Kong, China

Information Security Concerns & Challenges in FSI

November 17, 2010
SPEECH
Information Security Summit
Hong Kong, China

Cloud and Mobile Security in a Blurred Perimeter Environment

June 3, 2010
SPEECH
Regional Internet Governance Forum Asia
Hong Kong, China

Security: Cyber-Security and Network Confidence

June 3, 2010
SPEECH
INSEC@Asian Securitex
Hong Kong, China

The Enemy Within, The Enemy Without: Protecting Companies in Asia

March 17, 2010
SPEECH
2nd Annual Hong Kong InfoSecurity Summit
Hong Kong, China

Information Security Concerns & Challenges 2010-2015

December 11, 2009
SPEECH
CSO Conference and Awards
Ho Chi Minh City, Vietnam

A Guide for the New CSO

December 2, 2009
SPEECH
HTCIA 3rd Annual Asia Pacific Regional Training Conference
Hong Kong, China

Digital Forensics – Specialists, eDiscoverers, Lawyers & Managers? How each role shapes the future of forensics.

November 18, 2009
SPEECH
Information Security Summit
Hong Kong, China

Security In The Age Of Cloud Computing, Virtualisation And Social Networking

October 28, 2009
SPEECH
International Industrial Security Conference
Seoul, Korea

Unified Approach to Protecting Enterprise Assets

May 6, 2009
SPEECH
InfoSecurity Summit
Hong Kong, China

Driving Business Value with Security Innovation

March 23, 2009
SPEECH
South China OSAC Conference
Hong Kong, China

Staying Connected Securely in China

March 11, 2009
SPEECH
Cyberport Speaker Series
Hong Kong, China

Creating Safe Collaborative Environments

February 26, 2009
SPEECH
BankTech Executive Summit
Hong Kong, China

Information Security Risk Management: Emerging Threats and Insights for Financial Institutions

November 19, 2008
SPEECH
Information Security Summit
Hong Kong, China

Security Challenges Facing Mobile Executives

November 19, 2008
SPEECH
Information Security Summit
Hong Kong, China

Enhancing Mobility Security In An Information Collaboration World

October 28, 2008
SPEECH
Hospital Facility Physical & Integrated Security Systems
Seoul, Korea

Digital Protections for Patient Data

September 3, 2008
SPEECH
CIO Executive Summit
Hong Kong, China

The Transformation of Enterprise Security

May 21, 2008
SPEECH
9th Info-Security Conference
Hong Kong, China

Effective Strategies to Safeguard Business from Critical Data Loss

March 19, 2008
SPEECH
Security World Conference and Showcase
Hanoi, Vietnam

Best Practice and Solutions for Business Information System Security

February 2, 2008
SPEECH
Chinese University of Hong Kong
Hong Kong, China

How Companies Do and Don’t Protect Themselves

December 12, 2007
SPEECH
HTCIA Asia Pacific Training Conference
Hong Kong, China

Picking up the Pieces: The Aftermath of Computer Crime

December 5, 2007
SPEECH
Information Security Summit
Hong Kong, China

Information Security Evolution – Convergence / Compliance / Certification

August 30, 2007
SPEECH
In-House Congress
Seoul, Korea

Beyond Fake Watches: Protecting Intellectual Property in Asia

July 2, 2007
SPEECH
Visa Asia Pacific Risk Conference
Singapore

Payment Data Security: Making Audits Effective

June 19, 2007
SPEECH
American Chamber of Commerce
Bangkok, Thailand

Digital Defense: What You Should Know About Protecting Your Company’s Assets

May 16, 2007
SPEECH
8th Info-Security Conference
Hong Kong, China

Sacrificing the Possible for the Perfect: Why ISO27001 Undermines Security

June 14, 2007
SPEECH
Hong Kong Business Excellence Forum
Hong Kong, China

Digital Defense: Key to Corporate Success

June 13, 2007
SPEECH
American Consulate General Network Security Executive Luncheon
Hong Kong, China

Collaborating Safely

June 1, 2007
SPEECH
Banking Vietnam
Hanoi, Vietnam

Security in Credit Card Transactions

May 22, 2007
SPEECH
The 2nd Info-Security and Storage Solution Forum Asia
Hong Kong, China

Digital Defense: What You Should Know About Protecting Your Company's Assets

March 21, 2007
SPEECH
Security World
Hanoi, Vietnam

Digital Defense: What You Should Know About Protecting Your Company's Assets

January 27, 2007
SPEECH
Chinese University of Hong Kong
Hong Kong, China

Managing Information-Based Risk

October 22, 2006
SPEECH
The China Economic Growth Forum
Suzhou, China

What Makes Companies Winning Innovators? New Approaches to Global Collaboration

July 13, 2006
SPEECH
Sixth Annual Value-added Internal Audit & Risk Control Conference
Shanghai, China

Building a Proactive Security Infrastructure Across the Enterprise

April 27, 2006
SPEECH
Internal Audit, Corporate Governance & Compliance World Summit
Shanghai, China

Proactive Protection of Financial / Corporate / Sensitive Information

March 31, 2006
SPEECH
HKCS – ISSG Special Forum
Hong Kong, China

Data Privacy & IT Security Governance – What has the IPCC incident taught us?

March 27, 2006
SPEECH
Telecom Infotech Forum: e-Security in the Broadband Age
Hong Kong, China

Enterprise E-Security

March 23, 2006
SPEECH
Fraud, Risk and Security World
Hong Kong, China

Proactive IP Protection: Managing the risk before it’s too late

February 17, 2006
COURSE
US Commercial Service: Security
Hong Kong, China

Email Security Threats

February 14, 2006
SPEECH
Visa International Merchant Forum
Milan, Italy

Securing Confidence

February 4, 2006
SPEECH
Chinese University of Hong Kong
Hong Kong, China

Digital Business: What’s The Right Protection?

November 30, 2005
SPEECH
Guangzhou’s German Chamber of Commerce
Shenzhen, China

IT Security with Special Guest Thomas Parenty

November 9, 2005
SPEECH
Information Security Summit
Hong Kong, China

Best Practices for Forensically Sound Information Security Management

November 8, 2005
SPEECH
Joint AmCham Information Technology & Telecom and Intellectual Property Committee
Hong Kong, China

Beyond Fake Watches: Protecting Intellectual Property in Asia

November 8, 2005
SPEECH
Information Security Summit
Hong Kong, China

Security Architectures for Lifecycle Intellectual Property Protection

September 6, 2005
SPEECH
CIO Forum Asia
Hong Kong, China

CIO’s Information Security Agenda

January 22, 2005
SPEECH
Chinese University of Hong Kong
Hong Kong, China

Digital Identities: Misplaced Trust

January 12, 2005
SPEECH
German Chamber of Commerce
Guangzhou, China

IT Strategies to Protect Intellectual Capital

November 11, 2004
SPEECH
Information Security Summit
Hong Kong, China

Developing Effective Encryption Systems

November 1, 2004
COURSE
Biometric Systems Industry

Providing Training in Biometric System Security

October 30, 2004
SPEECH
The Center for Secure Information Management
Worldwide Broadcast

Protect Your Business, Not Just Its Computers

August 5, 2004
SPEECH
Information Systems Audit and Control Association
Hong Kong, China

Digital Hacking: Cracking E-Commerce Transactions

July 27, 2004
SPEECH
Hong Kong Computer Society EBIZ SIG & Hong Kong Society of Accountants ITIG
Hong Kong, China

eBusiness Objectives Drive Security

June 2, 2004
SPEECH
Information Security Showcase
Hong Kong, China

How to Steal Identities for Fun and Profit

May 18, 2004
SPEECH
Hong Kong Knowledge Management Society
Hong Kong, China

Information Security & Knowledge Management

February 18, 2004
SPEECH
Integrated Security Conference & Expo
Hong Kong, China

A Comprehensive Approach to Business Protection, CIO Interview: Getting the Most out of Security Investment

January 15, 2004
SPEECH
The Young Entrepreneurs Development Council Roundtable Forum
Hong Kong, China

Common lessons in starting different companies

January 13, 2004
SPEECH
American Chamber of Commerce in Hong Kong, Information Technology Committee
Hong Kong, China

Digital Defense: What You Should Know About Protecting Your Company’s Assets

December 2, 2003
SPEECH
Harvard Business School Audio Conference
Worldwide Broadcast

Essential Information Security for Non-Technical Managers

December 1, 2003
SPEECH
CNN Global Office
Worldwide Broadcast

Cyber-security enters boardroom

November 26, 2003
SPEECH
Economist Conferences: Asia Pacific Chief Information Officers’ Roundtable
Hong Kong, China

Now a risk manager as well…

September 24, 2003
SPEECH
University Rotary Club
Palo Alto, USA

Executive Perspectives on Information Security

September 23, 2003
SPEECH
Executive Luncheon: Unlock The Secrets of Corporate Governance
Hong Kong, China

Digital Defense: What You Should Know About Protecting Your Company’s Assets

September 15, 2003
SPEECH
Hong Kong PKI Forum
Hong Kong, China

Truth in Advertising: What PKI Can Really Deliver to Business

July 18, 2003
SPEECH
Hong Kong General Chamber of Commerce Roundtable Luncheon
Hong Kong, China

Digital Defense: Who’s the Enemy?

July 14, 2003
SPEECH
Rotary Club of Wanchai
Hong Kong, China

Information Security: A Business Focus

June 26, 2003
SPEECH
Project Management Institute (PMI) Annual Business Meeting, Northern Utah Chapter
Salt Lake City, USA

Think Before You Spend: Making Your IT Security Dollars Count

February 5, 2002
SPEECH
Sun Microsystems Conference
Worldwide Broadcast

Secure Applications for the Web Services Environment

January 4, 2002
SPEECH
Sybase Web Conference
Worldwide Broadcast

Ensuring Secure, Personalized Information Access - Security’s Role in a Portal

December 13, 2001
SPEECH
Sybase Web Conference
Worldwide Broadcast

The Rules for Application Security are Changing from Product to Service

January 1, 2001
CONTRIBUTOR
National Research Council

An Assessment of the National Institute of Standards and Technology Measurement and Standards Laboratories: Fiscal Year 2001

January 1, 2000
CONTRIBUTOR
National Research Council

An Assessment of the National Institute of Standards and Technology Measurement and Standards Laboratories: Fiscal Year 2000

October 13, 1999
SPEECH
The MIS and IIA Annual Conference on Control, Audit & Security of Information Systems
Washington D.C., USA

Sybase: Security for Internet Computing

August 24, 1999
SPEECH
TechWave
Orlando, USA

Securing Your Multi Tier Environment with Enterprise Application Server

May 5, 1999
SPEECH
Eleventh Annual Software Technology Conference
Salt Lake City, USA

Security for Transaction Server-based Architectures

March 4, 1999
TESTIMONY
Courts and Intellectual Property Subcommittee of the Committee on the Judiciary
Washington D.C., USA

Immediate Need for Relaxation of Export Controls for Software and Hardware with Encryption Capabilities

February 23, 1999
SPEECH
Connect ’99
Sydney, Australia

Sybase Security for E-Commerce

January 1, 1999
CONTRIBUTOR
National Research Council

An Assessment of the National Institute of Standards and Technology Measurement and Standards Laboratories: Fiscal Year 1999

December 9, 1998
SPEECH
Java Business Expo
New York, USA

Security Requirements for Electronic Commerce

October 7, 1998
SPEECH
ISUG European Conference
Hamburg, Germany

Sybase Internet Security

September 7, 1998
SPEECH
Asia Pacific Economic Cooperation (APEC-TEL 18th Meeting)
Port Moresby, Papua New Guinea

Authentication of Electronic Commerce Transactions

May 4, 1998
SPEECH
International Sybase User Group North American Conference
Washington D.C., USA

Internet Security with Sybase

April 26, 1998
SPEECH
Internet Commerce Expo
Boston, USA

Understanding & Using Public Key Cryptography for Secure Internet Transactions

March 17, 1998
TESTIMONY
Constitution, Federalism and Property Rights Subcommittee of the Committee on the Judiciary
Washington D.C., USA

Why Encryption Protects Privacy, Prevents Crime, and Promotes National Security

November 5, 1997
SPEECH
VIENNA ’97: Harmonizing Technology & Business
Vienna, Austria

Internet Security

October 14, 1997
SPEECH
Haas School of Business University of California
Berkeley, USA

How can you trust E-commerce?

October 8, 1997
SPEECH
20th National Information Systems Security Conference
Baltimore, USA

Database Security: Browsers, Encryption, Certificates and More

October 1, 1997
CONTRIBUTOR
The President’s Commission on Critical Infrastructure Protection
Washington D.C., USA

Critical Foundations: Protecting America's Infrastructures

October 1, 1997
CONTRIBUTOR
The President’s Commission on Critical Infrastructure Protection
Washington D.C., USA

Commercial Perspectives on Information Assurance Research

September 11, 1997
SPEECH
Internet Commerce Expo
Los Angeles, USA

Understanding & Using Public Key Cryptography for Secure Internet Transactions

September 4, 1997
TESTIMONY
Commerce Committee
Washington D.C., USA

Immediate Need for Export Control Relief for Software with Encryption Capabilities

July 30, 1997
TESTIMONY
National Security Committee
Washington D.C., USA

Protecting Public and Private Networks Through US Software with Encryption Capabilities is Critical to America's National Security

May 8, 1997
TESTIMONY
International Economic Policy and Trade Subcommittee of the International Relations Committee
Washington D.C., USA

Immediate Need for Export Control Relief for Software with Encryption Capabilities

April 11, 1997
SPEECH
Internet Commerce Expo
Atlanta, USA

Understanding & Using Public Key Cryptography for Secure Internet Transactions

April 10, 1997
SPEECH
Sybase International Users Group
Orlando, USA

Sybase Internet Security

February 20, 1997
SPEECH
DCI’s Internet Expo & C/S Internet Conference
San Jose, USA

Internet Security: Is It Achievable?

October 21, 1996
SPEECH
19th National Information System Security Conference
Baltimore, USA

Database Systems Today: Safe Information at My Fingertips?

July 1, 1996
SPEECH
SAFE Forum, Stanford Law School
Palo Alto, USA

The Cryptographer’s Report: Forty Bits is Not Enough

October 1, 1995
SPEECH
18th National Information System Security Conference
Baltimore, USA

Directions for Database Security

October 1, 1995
CONTRIBUTOR
National Institute of Standards and Technology

An Introduction To Computer Security: The NIST Handbook

October 15, 1992
SPEECH
15th National Computer Security Conference
Baltimore, USA

Making it Work: Applying INFOSEC to the Real World

April 3, 1991
SPEECH
UCLA Extension, Department of Business, Engineering and Management
Los Angeles, USA

Trusted Database Management Systems

May 1, 1989
SPEECH
IEEE Computer Society Symposium on Security and Privacy
Oakland, USA

The Incorporation of Multi-Level IPC into UNIX