HKT empowered‘Cyber Attack Shanghai 2019’to succeed
2019-12-05 -Shanghai -Cyber Attack Shanghai 2019HKTempowered‘Cyber Attack Shanghai 2019’to succeed
Asone of Hong Kong's premier telecommunication carriers, HKT has been proud to bethe partner of ‘Cyber Attack Shanghai 2019’ held at PwC Shanghai Innovation Centre on 11December 2019.
While enterprisesin China devote more efforts to driving innovation and adopt business modelsaugmented by new technologies, they may become increasingly exposed to cyberattacks of various forms, as well as the risks of personal data breach and lossof intellectual property. In order to defend against evolving cyber threats, IT managers find themselves in greater need of a reliable cybersecurity partner. To address this, HKT has introduced a total solution combining globalcapability with local expertise to include such features as Threat ManagementServices, Continuous Vulnerability Assessment, Management Firewall, WebApplications Firewall, and Endpoint Threat Protection, so as to provide anintegrated security suite alongside Managed Security Services and ProfessionalServices.
Duringthe event, Mr Gilbert Mak, Vice President of China Engineering and Solutions Consultant at HKT, discussed inhis speech how assistance could be given to those operating in China through thedeployment of secure networks, showcasing our 4 core cybersecurity products as well as our advantagesand experiences in deploying safe and effectivenetworks. Boasting a network with nationwide coverage in China and globalconnectivity to offer legally compliant cybersecurity products, HKT prides itselfon having a team of security experts with international accreditations, makingit well positioned to provide comprehensive defence to ensure cybersecurity.
Mr Wang Wei, HKT Assistant Vice President of Business Customer Support, took part in a group discussion analysing the latesttrends in cyber attacks and ways of copingwith increasing threats. He exchanged views with experts on the most concerningcyber-attack vectors; whether businesses would be capable of identifyingthreats and risks most relevant to them (including widespread malware, cyberattacks from other countries, cybercrime, insider breaches and hackingattacks); how to assess potential risks emerging with new technologies, and underwhat circumstances should risks be taken for the sake of commercial benefits.
(Mr GilbertMak from HKT sharing his experience incybersecurity deployment)
(Mr Wang Wei in a group discussion)