Join one of the our largest cybersecurity events - Cyber Week ‘22: Today’s Vision, Tomorrow’s Reality,with a brand new format and targeted, industry-specific sessions across Banking, Financial, Security & Insurance, High Technology & Manufacturing and China Gateway. Domain experts will provide insights on how companies can build a holistic cybersecurity framework today, to strengthen their security posture against the realities of vulnerabilities and risks, tomorrow.
How Organisations Can Overcome the Top 3 Critical Infrastructure Challenges in Cybersecurity? Representatives from the Cyber Security and Technology Crime Bureau will discuss the top cybersecurity challenges in Hong Kong, the changing regulatory landscape and provide effective responses on countering cyberattacks.
How Enterprises Can Maximise their digital transformation, as they embrace overseas commerce and partner with foreign organisations, while ensuring compliance with local 'restrictions'/ Driving Digital Transformation Through Overseas Partnerships and Ensuring Business Process Compliance With Local Restrictions
The industry’s first AIOps for NGFWs revolutionizes firewall operations with ML-powered insights for the best security posture and optimal health. AIOps reduces time to detect network security gaps by up to 99% and uses machine learning to predict up to 51% of disruptions to NGFWs before they impact the firewalls.
In 2022, CyberWeek will return in a virtual format with the theme, Today’s Vision, Tomorrow’s Reality. This year the forum will pivot to focus on a cross-section of Industries, including Financial Services, High Tech and Manufacturing, China Gateway and Retail & ECommerce. This will provide enterprises an opportunity to delve deeper into the challenges faced by these critical infrastructure verticals. The forum will create an opportunity for leading enterprise experts and practitioners to share knowledge and expertise that will shape the future of cybersecurity.
As digitalization evolves, financial services firms are tackling competing priorities of generating more business value and accelerating their transformation, whilst maintaining a strong cybersecurity posture in the connected world.
Join this session to hear how cybersecurity leaders ensure operational resilience, reinforce customer trust and boost digital revenue.
Speaker:
Ian Lim, Field Chief Security Officer
Vishal Lanjekar, Unit42 Consulting Lead
Cyber attacks can be extremely damaging for Financial Institutions, and unfortunately they are here to stay. As such, a focus on robust management of cyber risk remains critical. The active development of cybersecurity regulations in Asia Pacific will also continue to progress and FIs will need to ensure that they keep pace with changes and refinements. While it may seem that there are many emerging regulations and standards, the underlying direction and overarching themes are clear.
Join this session as we discuss cyber programs that are designed with security, vigilance and resilience in mind, guided by a clear strategy and supported by strong governance measures, will be well placed to meet evolving standards.
Speaker: David Jiang, Risk Advisory Partner, Deloitte Risk Advisory China
^Language - Mandarin
In the quest to achieve market leadership, financial services industry (FSI) firms continue to focus on becoming holistically digital, customer-facing enterprises. But are they there yet? In a competitive environment of rising cost pressures, where rapid action and response is imperative, financial institutions must modernize their technology function to support expanded digitization of both the front and back ends of their businesses.
Security that scales alongside your cloud journey is a top priority. Replacing legacy connectivity or security stack is a big deal and requires—if not triggered by your cloud and remote workforce programs—sometimes a harsh (ransomware) push to make it happen, but there is a new chance for your Zero Trust program, which shouldn’t be overlooked and wasted!
Join this session as we discuss The Cloud Opportunity for Zero Trust: As organizations are increasingly moving workloads, applications, and users to the cloud, and adopting DevOps, is now the right time to architect your security right from the beginning and not post-mortem?
Speaker: Riccardo Galbiati, Cyber Transformation Advisor
Providing a secure model for hybrid work requires agility, and it demands scalability. Gone are the days when security and remote work was only enabled by boxes and fixed licenses that limited the ability of organizations to support hybrid work properly. Find out how the secure access service edge (SASE) approach is a great model for enabling hybrid work with software-enabled paths.
Speaker: Siddharth Deshpande, Field Chief Technology Officer
The wave of technological advances and digital innovation over the last decade has rapidly transformed the BFSI sector, making financial services more efficient and easily accessible to everyone. From making purchases, payments, and withdrawals to crowdfunding, investing, and applying for loans, people can now avail a plethora of banking services digitally, all from the comfort of their homes. As enabling and disrupting fintech is to our way of life, this accelerated pace of digital innovation has become a lucrative avenue for cybercriminals, spurring a sharp increase in cyberattacks.
As BFSI continues to grow as one of the most dominant industries, the security of the entire ecosystem against active threats to personal data accessible via mobile or desktop applications must take precedence.
Join this session for a panel discussion with cybersecurity leaders from China, Taiwan and Hong Kong.
Speakers:
- TW: Ming-Hsien Wu, Senior Vice President, Cathay Life Insurance
- HK: Ricky Woo, Executive Director, CISO and Technology Security, DBS Bank
- China : Li Qiang, General Manager, Information Department, Fullgoal Fund Management Co.Ltd
Moderator: Keung Kang, Director Systems Engineering
^Language - Mandarin & Cantonese
No matter where an organization is on the journey toward smart manufacturing and Industry 4.0, the landscape is rapidly changing. IT and OT environments can no longer be separate, siloed entities. This shift requires a much more holistic view of security than most other industries. It is vital that those responsible for security and operational uptime across IT and OT collaborate.
In this session we’ll discuss
- Harnessing Industry 4.0 and realizing the associated benefits, with a focus on digital transformation, demands a change to the thinking that underpins more traditional models of manufacturing.
- The secure unification of IT and OT systems and how cyber security is a fundamental enabler in delivering a digital first, automated and data driven manufacturing enterprise.
Speaker: Alex Nehmy, Director Industry 4.0
The rise of the Internet of Things (IoT), the declining costs of sensors, and cloud computing are disrupting the high tech and manufacturing industry as more organizations retrofit or build out connected factories. The push to modernize the plant floor increases the risk of a cyberattack on vulnerable endpoints that must be protected, especially operational technology (OT).
This session will explore examines how legacy OT systems are holding manufacturers back, the importance of modernizing on new technology, and the proper actions manufacturers should start with to ensure a secure digital transformation (DX) journey.
^Language - Mandarin
Increased IoT device adoption is helping organizations increase value, productivity, and reduce costs. The IoT explosion creates serious security concerns for enterprises as the IoT devices are shipped with vulnerabilities, are difficult to patch, lack security controls, and yet have unfettered access to the network.
Join this session as we discuss the recent IoT attacks on enterprises and how have organizations reassessed their risk management strategy and moved toward adopting a Zero Trust approach to securing IoT devices.
Speaker: Riccardo Galbiati, Cyber Transformation Leader
The COVID-19 pandemic has accelerated the adoption of IoT devices. However, this trend increases the attack surface, which is likely to attract more attacks and exploits targeting IoT devices and IoT supply chains.
In this session, Unit 42 looks into the current IoT supply chain ecosystem, and explains the multi-layer threats and weaknesses impacting IoT supply chains.
Can an understanding of risks and real-world examples at hardware, firmware, operation and vulnerability layers help effectively develop risk control and mitigation strategies, which prevent a successful cyber attack from becoming a reality?
Regulatory compliance is another challenge that is often overlooked when companies are looking to adopt IoT technology. We’ll discuss
- ISO 27001, NIST Framework, IEC 62443
- Operational resilience and IR
- Accurate inventories of internet-facing outsourcing/public cloud implementations
- ISO 27001, NIST Framework, IEC 62443
Speaker: Vishal Lanjekar, Unit 42 Consulting Lead
- Cybersecurity, fraud, physical security, infra operations, etc.
- Info sharing on perceived threats, incidents, customer experience
- Alert fatigue
- Manual process
- Less product ,more use case: 3rd party UEM, Splunk, XSIEM (mention)
- CASE STUDY: Flex (USA) Enable a unified approach to defend against cyberthreats with strong network security and the ability to extend central security policies to remote workers.
Speaker: Leonard Kleinman, Field Chief Technology Officer (CTO)
In this session we’ll discuss how global expansion, mobile workforces, and cloud computing are shifting the locations of your applications, data, and users. These changes introduce new opportunities, but they also introduce new vectors for cybersecurity risk.
Speaker: Danny Cheng, SASE, GTM and Sales Specialist, Greater China
Cloud-delivered security and network access to help organizations protect their workforces around the world (ZTNA 2.0)
Global expansion, mobile workforces, and cloud computing are shifting the locations of your applications, data, and users. These changes introduce new opportunities globally, but they also introduce new vectors for cybersecurity risk. Zero Trust Network Access 2.0 overcomes the limitations of legacy ZTNA solutions, providing secure connections to deliver better security outcomes for businesses with hybrid workforces.
Join this session to find out how a Zero Trust cybersecurity strategy that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction to secure users, applications and infrastructure.
Speaker: Anson Leung, Head of SASE SE Specialist, Greater China
We all know the trends that are driving the digital transformation of our businesses. The shift to remote and hybrid work, accelerated by the pandemic, are now here
to stay. The benefits of cloud, which allow us to dive deeper into data, innovate faster, and compete better and the evolution of the marketplace, requiring us to reach our customers where and when they need us.
It’s critical that staff, business partners and customers are able to access internal business systems anytime and anywhere. Additional measures and capabilities are also needed to fulfill local legal and cybersecurity law requirements such as GDPR or MLPS 2.0. It’s difficult to keep the network and security management mechanism of global companies consistent.
Join this session to find out how Prisma SASE and with support from our Managed SASE partner HKT on how to manage remote offices and mobile users, anywhere in the world, including navigating access and security complexities in China.
Speakers:
Chefield Kan, Product Development Manager, China Business, Commercial Group, HKT
Danny Cheng, SASE, GTM and Sales Specialist, Greater China
Palo Alto Networks is a leader in the cybersecurity space and has employees and offices in more than 35 countries, including China. To provide best-in-class security and user experience, Palo Alto Networks IT teams use Prisma Access to provide network security and access to employees globally. The infrastructure team has implemented the hybrid solution described in this document to connect employees in China to Prisma Access (outside China) by using public cloud infrastructure in mainland China.
Join this session to learn how Palo Alto Networks uses Prisma Access to provide best-in-class security and user experience.
Speaker: Fong Peng Keong, SASE Systems Engineering Manager JAPAC
The global pandemic, which is still ongoing, has brought seismic changes to the world of retail. Online, retailers are busier than ever and challenged by the need to fill orders and refresh inventory at an increasingly rapid pace, as well as reduce revenue and wastage caused by returns. Offline, in the world of malls, high streets, and bricks 'n' mortar, the challenges are very different, as retailers face declining footfall and the need to compete with global e-tailers on convenience as well as price. Given everything that has occurred over the last two years, it isn’t surprising that resilience is a key buzzword in all areas of B2C operations.
Speakers:
Amit Chetal, Global Retail Lead
Join this session as we discuss
- Improve Customer Experience While Empowering Associates: Adapt quickly to meet digital-first needs anytime, everywhere.
- Provide choice and secure access to company apps and resources for customers and employees from any device or location.
Speakers:
Joseph Wong, Head of Infrastructure, Group Information Technology, A.S. Watson Group
Amit Chetal, Global Retail Lead
Every retailer operating in this pandemic would like to be more digital, with integrated channels, offering curbside pickup and profitable home delivery models, with repurposed stores that double as storehouses to complement their warehouses. What this means to retailers is the ability to rapidly and affordably adapt to whatever the current situation requires. And that necessitates a business built with cloud at its core.
Speakers:
Sam Lai, Territory Business Development Manager, Amazon Web Services
Ken Lam, Assistant Vice President, Security Business, Commercial Group, HKT
^Language - Cantonese
Retail branches are experiencing waves of cyber attacks unlike anything ever seen before. The attackers are determined, smart, innovative, and organized—in fact, most successful attacks are initiated by criminal enterprises, not basement hackers. They exploit weak points such as unpatched servers and endpoint devices to enter the network and steal information or launch ransomware attacks that can cripple the business.
Join this session to find out how:
- Connecting all parts of your business—in-store, warehouse, supply chain and back office—to meet customers where they are and rapidly adapt to meet changing consumer and associate expectations.
- Digital technologies such as cloud computing and data analytics are transforming the retail branch rapidly—and the pace is picking up.
- Retailers need reliable, consistent security across their entire network and user base.
Speaker: Amit Chetal, Global Retail Lead
Riccardo Galbiati works for the Office of the CSO at Palo Alto Networks Australia undertaking strategic conversations with CISOs and Executives through direct engagement, round tables and public speaking events.
Riccardo is the Zero Trust subject matter expert and evangelist for the Asia and Pacific region, with a mission to dispel all the myths about, and mistakes people make, when it comes to designing and deploying a Zero Trust strategy. Riccardo has spent over 15 years working in Cyber Security as part of various European consultancy firms, telcos and security vendors.
Len is the Field Chief Technology Officer (CTO) - Cortex for Palo Alto Networks JAPAC focusing on critical industry sectors such as Government, Banking and Finance, Utilities and Education. His mission is to to work with executives and business stakeholders to make security a strategic priority that translates into business value and assist in the development of a risk-based cyber security culture aimed at protecting our digital lives.
Ian Lim is field chief security officer for Asia Pacific at Palo Alto Networks. In his role, Ian helps to develop innovative solutions, threat prevention strategies, and risk management frameworks for business executives as well as the wider cybersecurity community.
With over 20 years of dedicated cybersecurity experience, Ian has led global security departments for Fortune 100 companies, deploying defense-in-depth capabilities to thwart advanced attacks.
Mr Cheng, SASE GTM and Sales Specialist of Paloalto Networks is an experienced Regional Manager and evangelist for Emerging Technology adoption for enterprise customers in Asia with primary focus in SASE, SD-WAN and Advanced Security Protection. He has also broad experience with Identity Access Management (IAM) and most recently focusing on helping customers to adopt the Security Access Service Edge (SASE) services across the Greater China region.
Mr. Cheng previous work experience includes Gartner, RSA, Forgerock, Checkpoint across North Asia.
Amit enables retail and hospitality companies to drive change with digitization. Leading a team of industry experts and thought leaders who offer decades of experience and speak in the voice of the customer. Together, we evaluate evolving industry challenges and then shape a vision for innovation and a strategy aligned to meet customer needs. At the heart of our approach is a digital framework, These forward-thinking influencers are the industry “disrupters,” and their input helps guide a proven, practical approach to digital transformation.
Alex Nehmy is Director of Industry 4.0 Strategy at Palo Alto Networks. Alex has specialised in cyber security for the past 20 years. Alex has consulted nationally and internationally for KPMG as well as led cyber security for Australia's largest defence prime.
Alex built the cyber security capabilities for The University of Adelaide and also SA Power Networks, where he brought the IT and Operational Technology groups together to secure the South Australian electricity grid and watched the disruption from the green energy revolution play out with the huge growth of rooftop solar and initiatives such as the virtual power plant with Tesla.
Alex brings a wealth of industry experience, especially in critical infrastructure, to Palo Alto Networks
In today's threat landscape, prevention is never going to be enough. As evident from news reports, breaches are going to happen. So what's changed? Are we seeing new attack methods, and what is the impact on our defenses? Join us for a fireside chat with Brian Krebs, our special guest speaker and Amitabh Singh, Palo Alto Networks CTO.
Speakers:
- Brian Krebs, Leading Cybercrime Journalist & New York Times Bestselling Author of "Spam Nation"
- Amitabh Singh, Cortex CTO and Evangelist EMEA, Palo Alto Networks
Zero Trust initiatives are in progress or in planning stages at many companies. While the primary focus tends to be on the products and policies directly controlling resource access, the role of the SOC in Zero Trust is often ignored. However, the SOC plays a vital role in every Zero Trust implementation. Join Palo Alto Networks CTO and founder Nir Zuk to see Zero Trust in action and the steps your SecOps team can take today. His talk will address:
What is Zero Trust;
The SOC’s integral supervisory and validation role; and
Key steps a SOC can take today to accelerate the move to a Zero Trust effort
Speaker: Nir Zuk, Founder and Chief Technology Officer, Palo Alto Networks
With over 25 years’ cybersecurity and telecommunication experience, Keung Kang is Head of System Engineering, Greater China at Palo Alto Networks, where he leads and manages the system engineer team works on providing pre-sales service, solution consultation and technical support between China, Hong Kong and Taiwan.
Ricky is currently the Executive Director and Chief Information Security Officer of DBS Hong Kong. He was also the Head of Technology Risk Strategy & Policy of Bank of China (Hong Kong), overseeing the entire technology risk governance framework and various control measures. During his tenure, the institution won the First Computer IT Governance Achievement Award from the Information Systems Audit and Control Association (ISACA), and it was the only winner of non-public sector.
Brian Krebs is an independent investigative reporter who writes about cybercrime at the award-winning Web site KrebsOnSecurity.com. Formerly with The Washington Post (1995 to 2009), Krebs is probably best known for breaking stories on high-profile data breaches, including those that hit Target, Home Depot, Michaels, and Ashley Madison.
A frequent interviewee and public speaker, Krebs has been profiled by 60 Minutes, The New York Times, Poynter.org, and Business Week. Krebs’s book, Spam Nation: The Inside Story of Organized Cybercrime - From Global Epidemic to Your Front Door – is now a New York Times bestseller.
In January 2015, the National Press Foundation announced it was awarding Krebs its Chairman's Citation, an award designed to "recognize individuals whose accomplishments fall outside the traditional categories of excellence." In October 2014, the Association of Certified Fraud Examiners gave Krebs the "Guardian Award," an honor given annually to a journalist "whose determination, perseverance, and commitment to the truth have contributed significantly to the fight against fraud."
Krebs graduated in 1994 from George Mason University, where he earned a Bachelor of Arts in International Studies.
Chefield Kan is an experienced product development manager who specialized in China-Hong Kong cross border and International connectivity services for Enterprise customers. He is experienced in developing and managing traditional connectivity services like IPVPN, IP-transit, Cloud Connect, as well as emerging technologies like Software Defined Wide Area Network (SD-WAN) and Secure Access Service Edge (SASE) services. He is currently focusing on helping customers to adopt the SASE services across the Greater China region.
Daryl is a Associate Director at PwC’s Cybersecurity practice and a member of PwC’s DarkLab. Daryl has over 8 years of experience in providing cybersecurity services to clients across different industries in China, Japan, Korea, Australia and the US. He has worked with world leading technology firms to design innovative and disruptive security solutions to protect millions of users around the world. His key areas of expertise include cloud security strategy, penetration testing and red teaming, threat modeling and secure architecture review.
David is the partner of Deloitte Risk Advisory China, has 25+ years experience on cybersecurity and privacy protection. Provided privacy framework cyber strategy, cyber architecture, BCM, services to various industries and their senior management. Familiar with GAPP, GDPR, APEC Privacy, HIPPA, CSL, DSL, PIPL, led implement numerous projects include GDPR, CCPA, CSL, PCI DSS, NIST, CSA TCI, ISO 270001, Cobit4, SOC, ITIL, SOX 404. David is one of the writer of 2009 CISM manual, chief editor of re-valuation of IT, founder of ITValue and Shanghai ITMAN club
Jeff is a Senior Manager in PwC’s DarkLab, Cybersecurity & Cloud practice. Jeff has over 16 years of IT experience key focus on Cybersecurity, DevSecOps, Application Modernisation, Cloud Migration, Security and Compliance as Code. Jeff experienced on different industrial sector including Banks, Insurance, government, enterprise & cloud provider on various projects.
Ken Lam leads Security Product Marketing and Solutions Consulting team in HKT's Commercial Group. He focuses on business development and formulates security strategy including integration of solutions & services. He has led and participated in wide range of IT security projects, like Cloud, network & content security solutions, security assessment and Managed Security Services by SOC, for enterprises of all sizes.
Ken has been working in the Telecommunications & Information Technology industry for nearly 15 years and has extensive experiences in solutions consultancy, with expertise in Information Security.
Ken is a Certified Information Systems Auditor (CISA) and holds a Bachelor's degree in Information Technology from The Hong Kong Polytechnic University.
With Palo Alto Networks, Anson focus on SASE solution application in various industries’s use case, helping Multinational customer establish secure connectivity into china and china enterprise expands their footprint to oversea.
Anson has more than 20 years of relevant experience in SDWAN optimisation, application acceleration, cloud transformation and network security, providing technical consulting services and solution architecture design for enterprise customers in different industries in Greater China.
Before joining Palo Alto Networks, Anson worked in pioneering technology solution companies such as Riverbed Technology, Cisco Meraki, etc, and plays an important role in developing solution, partner eco system and business for those companies in Greater China.
Morpheus has more than 10 years of experience in IT security, networking technology & Professional services. He brings with him a wide scope of knowledge and experience in SOC operations & SIEM technology. He has been working in different leading MSSPs in providing Managed Security Solution, DDoS solutions, and 24x7 Information Security Surveillance Services.
Morpheus is a Certified Information System Security Professional (CISSP).
Felix Cheng designs and deploys mission critical infrastructure for service providers, airports, and casinos. Over the last few years, he focused on software solutions such as application performance monitoring and analytics, cloud services and cybersecurity solutions. In his spare time, Felix has developed a simple mobile app that helped Wi-Fi engineers to perform quick site surveys.
Sam joined Amazon Web Services (AWS) since 2019 with 8 AWS certifications. He is serving AWS growth segment customers from different industries including Retails, Ecommerce, Transport& Logistics, etc. from Startup, SMB to MNC. He helped numerous of companies in cloud transformation to adopt their first workload and innovate with new technology to thrive their business.
Wickie Fung is general manager, Hong Kong and Macau at Palo Alto Networks. In this role, he is responsible for developing market strategy and helping customers plan and implement robust cybersecurity infrastructure.
With more than 20 years of experience in the technology industry, Wickie has vast knowledge in cybersecurity especially in the area of cloud security and user authentication solutions. He works with customers from a wide range of industries such as finance, healthcare, government and other verticals across the region.
Prior to joining Palo Alto Networks, Wickie was Business Director, Information Protection & Strategic Industrial Solutions for the Asia Pacific and Japan region at Symantec, where he played an instrumental role in helping customers from the banking, healthcare and e-commerce industry plan their cyber security transformation. Other roles held at Symantec were Head of Sales, Symantec Cloud, North Asia and Senior Sales Manager. Wickie started his career at HP.
Adrian Chan is vice president for the Greater China region at Palo Alto Networks. Adrian is responsible for leading the company’s overall business strategy and driving business growth in China, Hong Kong and Taiwan.
Adrian is a veteran in the technology industry with more than 20 years of experience in enterprise technologies and data center solutions. Prior to joining Palo Alto Networks, Adrian worked at NetApp for sixteen years and held various senior leadership roles, his last being Vice President and General Manager, Greater China Region. Adrian has a proven track record of transforming the Greater China business into a multimillion-dollar business. Before NetApp, Adrian worked for GTI (Global Technology Integrator Limited), a Hong Kong IT provider, and Bull Information Systems, a French owned computer company.
• Preparation for Evolving Regulatory Landscape
• Phishing Awareness Campaign Result
• Effective Responses to Cyber Attacks
Speakers:
- Raymond Lam, Senior Superintendent of Police (Cyber Security, Forensics and Training), Cyber Security and Technology Crime Bureau, Hong Kong Police Force
- Wickie Fung, General Manager, Hong Kong and Macau, Palo Alto Networks
Samuel has over 20 years on ICT industries with compelling hands-on and consulting experience. Skilled in public cloud, data center networking, cloud connectivity and security solutions. He helped different customers including large enterprise, FSI and public sector in cloud adoption, specialized in networking and security best practice. He also keens on learning new latest technology with different vendors’ badges and acquired business management knowledge with the top local MBA program. He is passionate to solve customer’s cloud adoption pain points via different technologies.
Nir Zuk brings a wealth of network security expertise and industry experience to Palo Alto Networks. Prior to co-founding Palo Alto Networks, Nir was CTO at NetScreen Technologies, which was acquired by Juniper Networks in 2004. Prior to NetScreen, Nir was co-founder and CTO at OneSecure, a pioneer in intrusion prevention and detection appliances. Nir was also a principal engineer at Check Point Software Technologies, and was one of the developers of stateful inspection technology.
With over 20 years of experience in the technology and cybersecurity domains, Fong Peng Keong is Palo Alto Networks SASE Systems Engineering Manager for the JAPAC region, focussed on cyber/network transformation initiative and security for the hybrid workforce.
In this role, he leads the highly specialized technical presales focusing on SASE architecture and network transformation projects for the largest corporations and government agencies in the region.
He joined Palo Alto Networks from Akamai where he was a key specialist presales leader focussed on emerging Enterprise Security across Asia-Pacific and Japan.
Prior to Akamai, Peng Keong spent almost a decade at companies like Cisco Systems, Brocade and 3Com where he held various technical sales leadership roles across the Asia-Pacific and Japan region. Peng Keong holds a Bachelor in Electrical Engineering from National University of Singapore.
He joined Hong Kong Maxim’s Group as Director of Information Technology since June 2015, overseeing the Group’s information technology activities and management for over 70 brands and 1,800 outlets across Hong Kong, Mainland China and Southeast Asia. Managing a workforce of over 100 employees, he is responsible for managing IT operations and formulating strategy to support business growth. In the past three years, he was member of Digital Team for the various mobile apps implementation and enhanced eCommerce functions, with a focus on the systems and applications upgrade to cope with business transformation to digital. He is Jardine CIO committee member.