top of page
InfoSec26 - Final-v2.jpg
  • Facebook
  • LinkedIn
  • YouTube
  • 1200px-Flickr.svg

FORUM OVERVIEW

The cybersecurity landscape is increasingly complex, with organizations facing a dynamic array of threats that require a comprehensive understanding of the latest practices and technologies. Key areas of focus include security operations, application and cloud security, AI-driven security solutions, network security, and supply chain vulnerabilities. Overall, the cybersecurity landscape demands constant vigilance, innovation, and a deep understanding of emerging technologies and strategies.

 

As Hong Kong’s most important annual event for IT Security leaders and professionals, the InfoSecurity Summit brings together leading Cybersecurity experts and thought leaders to share data-driven insights and recommendations for enhancing cyber resilience and provides an essential platform for professionals to develop the skills needed to protect their organizations in this rapidly changing environment. The event this year carries the theme of Strengthening security posture against evolving threats targeting 250+ Enterprise IT and Cybersecurity Decision Makers and Professionals across industries, this summit will look at a numbers of critical Cybersecurity themes in 2026 and presents practical actions and solutions to support Cybersecurity leaders in creating a resilient and sustainable enterprise.

FORUM DETAILS

​Date: 

Time: 

Venue: 

27th March 2026 [Friday]

09:45- 15:40

Cordis Hong Kong

555 Shanghai Street, Mongkok 

Hong Kong

FORUM AGENDA

08:45

Registration, Showcase Visit and Networking

09:45 

Opening Keynote: : Insights from the frontlines : Evolving cyber threat landscape – what are we against ? During the session Mohit would discuss and share the latest developments on cyber threat landscape, complexities associated with Cyber threats such as ransomware, impact of AI on vulnerabilities, latest trends that we observe from our Incident response investigations along with some recommendations.

Mohit Kumar KPMGw.jpg

Mohit Kumar

Director, Cyber Incident Response Forensic Hong Kong 

KPMG China

10:10

Keynote 1: Defending the AI Era: Safely Adopting GenAI with SentinelOne Prompt Security In the AI era, organizations need to harness GenAI’s productivity gains while defending against new risks such as shadow AI, data leakage, and prompt injection across employees, developers, and homegrown applications. SentinelOne Prompt Security delivers an LLM-native AI security control plane that provides real-time visibility into GenAI usage, granular policy-based controls, and automated protection against AI-specific attacks, all without disrupting user experience. By securing employee AI tools, AI code assistants, internal AI apps, and agentic AI/MCP workflows in a model-agnostic way, it enables enterprises to safely adopt GenAI at scale, transforming AI from a source of risk into a catalyst for innovation and growth.

Nam Seng LEE SentinelOne_Wix.jpg

Nam Seng Lee

Staff Solutions Engineer

SentinelOne

10:35

Panel Discussion One: Generative AI in Cyber Defense: Navigating Opportunities and Safeguarding Against Emerging Threats Join this boardroom to discuss: • How does GenAI change the speed and scale of cyberattacks? • What are the biggest challenges in implementing GenAI? • How can organizations ensure the security of their own AI models?

Panel Chair 

Paul Jackson Theos.jpg

Paul Jackson

Chief Executive Officer

Theos Cyber

Executive Panelists

FlorianBielak_W.jpg

Florian Alexandre Bielak

CISO

BitMEX

Raju_Daryanani_Jardine_Wix.png

Raju Daryanani

Head of Group Cybersecurity

Jardine Matheson Ltd

Kanth Kollur-Pacific Basin W .jpg

Kanth Kolluru

Global Head of IT

Epic Group 

Harry Pun - MS.jpg

Harry Pun

Security Go-To-Market Lead Microsoft Greater China Region

11:20

Morning Networking Coffee Break and Showcase Tour

11:35

Keynote 2: Hong Kong Cybersecurity Outlook 2026 The Hong Kong Cybersecurity Outlook 2026 examines the key cyber threats shaping Hong Kong’s digital landscape. Drawing on 2025 incident data and enterprise surveys, the session highlights rising phishing attacks, increased exploitation of vulnerable systems, and growing risks linked to AI adoption. It outlines five major cybersecurity risks for 2026: AI driven attacks, weak AI governance, supply chain vulnerabilities, cloud dependency, and emerging AI enabled device threats. The presentation also shares insights into the cybersecurity readiness of Hong Kong enterprises and concludes with practical recommendations to help organisations strengthen resilience, manage AI and third party risks, and prepare for the year ahead.

Otto Lee-HKPC-w.jpg

Otto Lee

Head of Hong Kong Computer Emergency Response Team Coordination Centre

(HKCERT)

12:00

Keynote 3: Navigating the Dark Data Frontier: A Modern Framework for Data Security In today’s hyper-connected ecosystem, data is no longer confined to a single server or cloud, it is everywhere. As organizations scale, they often face a growing "transparency gap": sensitive information resides in forgotten silos, unmanaged shares, and shadow applications. When you cannot see your data, you cannot secure it, leading to a reactive security posture that increases both operational costs and regulatory exposure. Modern data security requires moving beyond traditional boundaries. It demands a shift toward a "data-centric" strategy that automatically discovers hidden risks and applies intelligent protection that follows the information wherever it travels. This session explores how to balance the freedom of data movement with the necessity of absolute control, ensuring security becomes an accelerator for innovation rather than a roadblock. Join this session to explore: Closing the Visibility Gap: Why identifying "dark data" is the critical first step in any modern risk strategy. Proactive Guardrails: How to implement seamless, automated controls that protect assets without impacting user productivity. Operational Intelligence: Strategies to reduce the manual burden on security teams by replacing fragmented alerts with unified data context.

HInson_Hui_FP.jpg

Hinson Hui
System Engineer
Forcepoint LLC

12:25

Panel Discussion Two: Be Ready! Preparing Your People for a Cyber Crisis Security leaders face unprecedented challenges as evolving threats rapidly increase enterprise risk. While new technologies offer defenses, they also introduce vulnerabilities. A cyber-ready workforce is crucial for organizational resilience, but how do you prepare with confidence for the when the worst happens and the whole business is impacted? Join this boardroom to discuss: • Managing and mitigating threats while under pressure during a major cyber crisis • Proving that the preparation your team has done works end-to-end in advance • Maintaining stakeholder and third-party confidence though proof of resilience

Panel Chair 

Wavestone_Axel_Chagnoleau_wix.png

Axel Chagnoleau

APAC Head of Cybersecurity & Operational Resilience Head of Hong Kong

Wavestone

Executive Panelists

Alva Mak AirStar Bank -wix.jpg

Alva Mak

CISO

Airstar Bank

Tony Yu DBS.jpg

Tony Yu

Lead of Active Defence

DBS Hong Kong

c-sam-coco.png

Sam Coco

Head of Global Information Security

Fidelity International

varun kakkar_moet.png

Varun Kakkar

Executive Vice President of Information Security and Privacy

VISTRA

13:05

Networking Luncheon and Showcase Visit

14:15

Keynote 4: Exploitable Vulnerabilities Are Out of Control: What CISOs Need to Do—A Strategic Approach to Managing Cyber Risk

John Chan - HCL Software.jpg

John Chan

Regional Business Director, BigFix & Intelligent Operations, North Asia
HCLSoftware

15:05

Afternoon Networking Coffee Break and Showcase Tour

14:40

Keynote 5: Understanding the Threats and Risks Posed by the Rapid Evolution of AI in Today’s World AI has rapidly shifted from experimentation to a powerful risk multiplier, accelerating cyberattacks, disinformation, and regulatory exposure. In this session, we will discuss how AI is already reshaping the threat landscape, how criminal groups are weaponising it, and what organisations must do now. The session begins with a scenario illustrating AI driven fraud and ransomware, then unpacks three concrete ways threat actors are using AI today—from autonomous intrusion and shape shifting malware to deepfake enabled social engineering and AI priced extortion. It then widens the lens to the geopolitical arena, where AI is powering influence operations, hybrid warfare, and a fragmented regulatory environment.

Greg_Sinclair-Control Risks-w.jpg

Greg Sinclair

Partner, Digital Risks – Advisory APAC

Control Risks

15:15

Closing Keynote: Trends and Risks Impacting Digital Business in 2026 2025 will be remembered as the year of AI. Adoption and use of AI increased at incredible speed over the course of 2025 and the impact of the use of AI’s is bringing rapid change to numerous industries. The sheer speed of this change can be challenging to keep up with, and as such presents significant risks in the context of AI generated misinformation, cybersecurity threats, and trust. These risks are only going to increase in magnitude through 2026, and a combination of education and cybersecurity expertise will be the only way to protect our assets, our reputation, and the uninterrupted operation of our businesses. In this session, technology lawyer Paul Haswell runs through the challenges and opportunities the tech sector faces in the year ahead.

Paul Haswell - 2025.jpg

Paul Haswell

Partner

Hill Dickinson LLP

15:40

End of the Summit

AI Compliance in a Rapidly Chaing Regulatory Environment

Speaker to be announced

SPONSORS

Blackpanda -SentinelOne .jpg
Blackpanda -SentinelOne .jpg
new-microsoft-logo.jpg
© 2026 Market Intelligence Group Limited All rights reserved
bottom of page