E-Crime: Strengthening internal systems and processes to combat cyber crime



16-17 May 2013






 Sunway Putra Hotel, Kuala Lumpur


In malaysia cyber crime is not predominantly an external threat anymore. Organizations are reporting the risk of cyber crime coming from inside the organization. The biggest threat that a cyber crime could affect an organization is the reputation of organization. The cyber criminals intrude into your organization and getting information out. Such act directly results into financial loss and reputation loss.


Given the increasing amount of cyber threats there is a need for more proactive measures to prevent more Internet users from becoming cybercrime victims and it will take more than reviewing or improving current cyber security laws.


amending laws take time and it is slower than the prevailing problem. Business houses need to intensify education and awareness efforts to educate users on Internet risks.


This conference educates users to tackle internal threats and respond to cyber crime activities. The e-Crime Conference is designed to meet the needs of key stakeholders and decision makers who are responsible for designing and coordinating information security, safeguarding IT assets and sensitive information, protecting customers, defending against internal or external threats and responding to incidents.


Benefits of the Program:

After this program you will be able to:

  • Devise a e-crime prevention program with high involvement of management.
  • Build a culture of e-security in your organization to prevent e-crimes.
  • Identify key cyber security risks that your businessfaces.
  • learn how to protect your critical assets from e-crime and cyber attack.
  • Determine loopholes in the security of your company’s assets and fix them.
  • Counter the latest attack techniques being used by e-criminals to damage critical national assets, data and infrastructure.
  • Develop the criteria to choose, manage and work with vendors on a long term basis.
  • Equip yourself with malaysian Cyber laws and its relevance to your e-crime prevention program.
  • understand the relation between cyber security and business objectives through real life case studies for better understanding of how computer criminals work.


Who Should Attend:

  • CIO - Chief Information Officer
  • CTO - Chief Technology Officer
  • CISO - Chief Information Security Officer
  • Enterprise Security Director
  • Director Enterprise architect solutions
  • ICT Strategies & Infrastructure manager
  • IT Security manager
  • Data Centre Security manager
  • Disaster recovery manager
  • Director e-Security projects
  • Head of Information Security Operations
  • Enterprise Security Engineer
  • Executive manager Enterprise Infrastructure
  • General manager Security & Compliance manager
  • Infrastructure Support & IT Security Director/manager
  • Director of IT Business
  • Engagement Solutions manager