CSA APAC Summit 2015


All CSA Summit attendees must be registered as either an RSA conference delegate, RSA Expo, or Exhibitor pass. During the RSA registration process, you will have an option to indicate your interest in attending the CSA Summit.

Register for RSA

Cloud Security Alliance APAC Summit 2015

Time Session Information
Tuesday, July 21 - 1:00pm – 5:00pm

CSA Summit APAC: Enterprise Cloud Adoption and Security Lessons Learned

Safe Cities: Securing the Cyber - World of Greying Boundaries.

With the prevalence of mobile computing and the Internet-of-Things, the boundaries of data, devices, people and their operations have already begun to blur. This creates new challenges for information security, as protection at the edges only is no longer seen as an effective measure given that it is getting more difficult to demarcate the boundaries. For example, it is now common for a single mobile device such as a smart-phone or tablets to be used for both personal and work purposes. In fact, many organizations have also embraced the BYOD (Bring Your Own Device) concept and personal devices are now commonly found in many cooperate networks. Modern advancements in technology, such as cloud computing, also pose a new challenge that exceeds geographical boundaries.