
FORUM OVERVIEW
The cybersecurity landscape is increasingly complex, with organizations facing a dynamic array of threats that require a comprehensive understanding of the latest practices and technologies. Key areas of focus include security operations, application and cloud security, AI-driven security solutions, network security, and supply chain vulnerabilities. Overall, the cybersecurity landscape demands constant vigilance, innovation, and a deep understanding of emerging technologies and strategies.
As Hong Kong’s most important annual event for IT Security leaders and professionals, the InfoSecurity Summit brings together leading Cybersecurity experts and thought leaders to share data-driven insights and recommendations for enhancing cyber resilience and provides an essential platform for professionals to develop the skills needed to protect their organizations in this rapidly changing environment. The event this year carries the theme of Strengthening security posture against evolving threats targeting 250+ Enterprise IT and Cybersecurity Decision Makers and Professionals across industries, this summit will look at a numbers of critical Cybersecurity themes in 2026 and presents practical actions and solutions to support Cybersecurity leaders in creating a resilient and sustainable enterprise.
FORUM DETAILS
Date:
Time:
Venue:
27th March 2026 [Friday]
09:45- 15:40
Cordis Hong Kong
555 Shanghai Street, Mongkok
Hong Kong
FORUM AGENDA
08:45
Registration, Showcase Visit and Networking
09:45
Opening Keynote: : Insights from the frontlines : Evolving cyber threat landscape – what are we against ? During the session Mohit would discuss and share the latest developments on cyber threat landscape, complexities associated with Cyber threats such as ransomware, impact of AI on vulnerabilities, latest trends that we observe from our Incident response investigations along with some recommendations.

10:10
Keynote 1: Defending the AI Era: Safely Adopting GenAI with SentinelOne Prompt Security In the AI era, organizations need to harness GenAI’s productivity gains while defending against new risks such as shadow AI, data leakage, and prompt injection across employees, developers, and homegrown applications. SentinelOne Prompt Security delivers an LLM-native AI security control plane that provides real-time visibility into GenAI usage, granular policy-based controls, and automated protection against AI-specific attacks, all without disrupting user experience. By securing employee AI tools, AI code assistants, internal AI apps, and agentic AI/MCP workflows in a model-agnostic way, it enables enterprises to safely adopt GenAI at scale, transforming AI from a source of risk into a catalyst for innovation and growth.

10:35
Panel Discussion One: Generative AI in Cyber Defense: Navigating Opportunities and Safeguarding Against Emerging Threats Join this boardroom to discuss: • How does GenAI change the speed and scale of cyberattacks? • What are the biggest challenges in implementing GenAI? • How can organizations ensure the security of their own AI models?
Executive Panelists

Florian Alexandre Bielak
CISO
BitMEX

Raju Daryanani
Head of Group Cybersecurity
Jardine Matheson Ltd

Kanth Kolluru
Global Head of IT
Epic Group

Security Go-To-Market Lead Microsoft Greater China Region
11:20
Morning Networking Coffee Break and Showcase Tour
11:35
Keynote 2: Hong Kong Cybersecurity Outlook 2026 The Hong Kong Cybersecurity Outlook 2026 examines the key cyber threats shaping Hong Kong’s digital landscape. Drawing on 2025 incident data and enterprise surveys, the session highlights rising phishing attacks, increased exploitation of vulnerable systems, and growing risks linked to AI adoption. It outlines five major cybersecurity risks for 2026: AI driven attacks, weak AI governance, supply chain vulnerabilities, cloud dependency, and emerging AI enabled device threats. The presentation also shares insights into the cybersecurity readiness of Hong Kong enterprises and concludes with practical recommendations to help organisations strengthen resilience, manage AI and third party risks, and prepare for the year ahead.

12:00
Keynote 3: Navigating the Dark Data Frontier: A Modern Framework for Data Security In today’s hyper-connected ecosystem, data is no longer confined to a single server or cloud, it is everywhere. As organizations scale, they often face a growing "transparency gap": sensitive information resides in forgotten silos, unmanaged shares, and shadow applications. When you cannot see your data, you cannot secure it, leading to a reactive security posture that increases both operational costs and regulatory exposure. Modern data security requires moving beyond traditional boundaries. It demands a shift toward a "data-centric" strategy that automatically discovers hidden risks and applies intelligent protection that follows the information wherever it travels. This session explores how to balance the freedom of data movement with the necessity of absolute control, ensuring security becomes an accelerator for innovation rather than a roadblock. Join this session to explore: Closing the Visibility Gap: Why identifying "dark data" is the critical first step in any modern risk strategy. Proactive Guardrails: How to implement seamless, automated controls that protect assets without impacting user productivity. Operational Intelligence: Strategies to reduce the manual burden on security teams by replacing fragmented alerts with unified data context.

Hinson Hui
System Engineer
Forcepoint LLC
12:25
Panel Discussion Two: Be Ready! Preparing Your People for a Cyber Crisis Security leaders face unprecedented challenges as evolving threats rapidly increase enterprise risk. While new technologies offer defenses, they also introduce vulnerabilities. A cyber-ready workforce is crucial for organizational resilience, but how do you prepare with confidence for the when the worst happens and the whole business is impacted? Join this boardroom to discuss: • Managing and mitigating threats while under pressure during a major cyber crisis • Proving that the preparation your team has done works end-to-end in advance • Maintaining stakeholder and third-party confidence though proof of resilience
Panel Chair

Executive Panelists




13:05
Networking Luncheon and Showcase Visit
14:15
Keynote 4: Exploitable Vulnerabilities Are Out of Control: What CISOs Need to Do—A Strategic Approach to Managing Cyber Risk

Regional Business Director, BigFix & Intelligent Operations, North Asia
HCLSoftware
15:05
Afternoon Networking Coffee Break and Showcase Tour
14:40
Keynote 5: Understanding the Threats and Risks Posed by the Rapid Evolution of AI in Today’s World AI has rapidly shifted from experimentation to a powerful risk multiplier, accelerating cyberattacks, disinformation, and regulatory exposure. In this session, we will discuss how AI is already reshaping the threat landscape, how criminal groups are weaponising it, and what organisations must do now. The session begins with a scenario illustrating AI driven fraud and ransomware, then unpacks three concrete ways threat actors are using AI today—from autonomous intrusion and shape shifting malware to deepfake enabled social engineering and AI priced extortion. It then widens the lens to the geopolitical arena, where AI is powering influence operations, hybrid warfare, and a fragmented regulatory environment.

15:15
Closing Keynote: Trends and Risks Impacting Digital Business in 2026 2025 will be remembered as the year of AI. Adoption and use of AI increased at incredible speed over the course of 2025 and the impact of the use of AI’s is bringing rapid change to numerous industries. The sheer speed of this change can be challenging to keep up with, and as such presents significant risks in the context of AI generated misinformation, cybersecurity threats, and trust. These risks are only going to increase in magnitude through 2026, and a combination of education and cybersecurity expertise will be the only way to protect our assets, our reputation, and the uninterrupted operation of our businesses. In this session, technology lawyer Paul Haswell runs through the challenges and opportunities the tech sector faces in the year ahead.

15:40
End of the Summit
AI Compliance in a Rapidly Chaing Regulatory Environment

Speaker to be announced


















