THE LEADING CYBER SECURITY
CONFERENCE & EXPO IN VIETNAM
800+
DELEGATES
40+
SPEAKERS
30+
EXHIBITORS & SPONSORS
60+
PRESS AGENCIES
THANK YOU
On behalf of the Organizing Committee, we would like to take this opportunity to express our warmest gratitude to all speakers, sponsors/exhibitors and delegates attending Vietnam Security Summit 2022 in-person that was wrapped up successfully on June 23, 2022 at JW Marriott Hanoi Hotel.
2022 SPEAKERS
EXPO HIGHLIGHTS

ARCON’s product portfolio includes:
-
ARCON | Privileged Access Management (PAM)
-
ARCON | User Behaviour Analytics (UBA)
-
ARCON | Security Compliance Management (SCM)
-
ARCON | Endpoint Privilege Management (EPM)
These enterprise-class solutions provide seamless access and have scalable architecture. More than 500+ global enterprises, spanning wide range of industries such as Banking, Finance, Insurance, Telecom, Government,… trust ARCON solutions to safeguard their critical business information….

The conventional way to protect from attackers and threats is to use a firewall to inspect all traffic to and from the Internet, but which still leaves the network vulnerable to attacks from within the network itself.
We created this solution to instantly respond to threats. The AMF Security solution uses our innovative Isolation Adapter technology, adding autonomous intelligence to the network to automatically decide the appropriate reaction for any detected attack. The AMF-Sec controller integrates with most common firewall products, to centralize your security policies and single panel to manage your responded action.
The Allied Telesis Self-Defending Network does not require any special software to be installed on the end-point. Our solution allows the security appliance to monitor a copy of the traffic (I.e. one-armed) so no latency is introduced, and blocks any threats instantly and automatically.

CrowdStrike™
is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage – even malware-free intrusions.

Hikvision is committed to serving various industries through its cutting-edge technologies of machine perception, artificial intelligence, and big data, leading the future of AIoT: through innovative AIoT applications, we are dedicated to empowering every individual to enjoy a better future by building an intelligent world that is more convenient, efficient and secure.

For Advising service, FPT IS is proud to be the first Vietnamese company to be issued PCI QSA certification by PCI SSC, allowing FPT IS to advise, assess and grant Payment Card Industry Data Security Standard (PCI DSS) certification. In addition, FPT IS also provides advising services to help organizations and enterprises comply with ISO 27001 on Information Security Management System (ISMS).
For Vulnerability assessment (VA) service and Penetration testing (Pentest) service, FPT IS helps our customers to promptly detect and prevent vulnerabilities causing insecurity to IT systems and applications.
For 24/7 security monitoring service, grasping the trend of 24x7x365 monitoring, FPT IS provides FPT.EagleEye mSOC service with 4 main functions including Record, Detect, Investigate, Act.

Samsung Knox data security solution is the culmination of many years of research and development by globally R&D departments, with real-world testing on billions of mobile devices.
Samsung Knox helps prevent sensitive data from being leaked while employees use smartphones and tablets, blocks all intrusions from malicious software, and provides IT admins with comprehensive tools to manage devices, improve the work efficiency of users

Delinea is a leading provider of privileged access management (PAM) solutions that empower seamless security for the modern, hybrid enterprise. Our solutions put privileged access at the center of cybersecurity by defining the boundaries of access. With Delinea, privileged access is more accessible.

Fortinet provides Industry-Leading Cybersecurity solutions across All Networks, Endpoints, and Clouds.
Fortinet Broad Portfolio of Solutions to Protect Your Digital Attack Surface are as followings:
-
Security-driven Networking
-
Zero Trust Access
-
Adaptive Cloud
-
Security Fabric Management Center NOC / SOC

Threat Intelligence & Attribution: A system for analyzing and attributing cyberattacks, threat hunting, and protecting network infrastructure based on data relating to adversary tactics, tools, and activity
Threat Hunting Framework: Adversary-centric detection of targeted attacks and unknown threats for IT and OT environments
Atmosphere: Block, detonate and hunt for the most advanced email threats with patented email security technology.
Fraud Hunting Platform: Client-side digital identity protection and fraud prevention in real time
Digital Risk Protection: AI-driven digital risk identification and mitigation platform
…

Smart Lock System: Our smart physical lock system is designed with the highest level of anti-intrusion function, meeting the security standards used in the military. Our smart physical locks do not use batteries, in order to ensure absolute security in situations such as power outages or natural disasters.
Digital Smart Key: Our digital smart key can be set to open one or more smart locks in our physical locking system. Customers can use a single key to open a series of different locking devices such as locks for warehouses, cabins, servers,…
Real-time Smart Security System (ICT Compact Network Locking System): our real-time smart security system uses cloud computing linked with smart physical locking system and digital smart key to bring the most comprehensive security solution for users.
…

SANS is the most trusted source for Information Security Training, Certification and Research
-
Broad curriculum
-
High-quality courseware
-
Multiple delivery options
-
SANS Cyber Ranges including NetWars and BootUp CTFs
-
Vietnamese Simultaneous Translation for Line Online events…
Are you interested in taking SANS training in your native language? SANS have a number of courses available to study in multiple languages directly through our local instructors, via our Simultaneous translation option.

Scenario-based Penetration Test: Scenario-based Penetration Test service provided by ECQ helps address the issue of limited threat visibility by simulating attacks from an external, internal, and rogue user point of view. Utilizing the same Tactics, Techniques, and Procedures as of real world advesaries or APT attackers, Scenario-based Penetration Test can be thought of as a lighter approach to Adversary Simulation where attacks are conducted based on each specific scenarios and require shorter execution time.
External: In External scenario, ECQ analyzes all possible attack vectors from an adversary point of view and execute all necessary hacking techniques to establish initial foothold to the target network. ECQ also simulates attacks originating from external branches or partners’ network to help an organization understand better the threats that are coming from a compromised system of a remote branch or third-party vendor.
Internal: Internal scenario penetration test helps an organization evaluate the risks of having a compromised system in the internal network and validate the effectiveness of internal security controls such as SOC/EDR/IDS.

Niagara Networks
Open Visibility Platform™: Packet data is an incredibly sophisticated area that any SOC and NOC massively use to identify security threats – Niagara Networks’ visibility solutions collect, inspect and deliver the right packet data to threat detection/prevention tools. Our award-winning Open Visibility Platform™ is designed to be open, exposing numerous points for technological integration and extensibility, and offers organizations the agility to host any virtualized security applications and monitoring tools.
Synopsys – Software Integrity Group
-
Coverity
-
Black Duck Source and BinaryAnalysis
-
Defensics

Key Product:
-
CDN Acceleration
-
Media Delivery Solutions
-
DDoS Mitigation
-
WAF
-
Edge Computing
-
Colocation Services

Cloudbric WAF+
Cloudbric WAF+ : is a fully managed, smart web security service to protect any business or organization from web threats. Our Security as a Service (SECaaS) solution implements not only WAF functionality, but also four other necessary functions to make your web-based solutions secure against attacks.
Cloudbric ADDoS
Cloudbric ADDoS : Advanced DDoS Protection is a cutting-edge DDoS attack protection and mitigation service. While Cloudbric WAF+ offers an essential DDoS detection service, Cloudbric ADDoS features a higher level of DDoS protection. Cloudbric ADDoS collects, analyzes, and distributes intelligence regarding DDoS attacks between edge locations in real-time across the world.

DLC delivers Accredited Training & Certification in the SABSA Framework for Enterprise Security. Our training portfolio enables students to deliver business-driven security solutions in their organizations and take the next step on their career path towards security leadership.

One Identity:
-
syslog-ng – high performance log management
-
SafeGuard – Store, Manage, Record and Analyze Privileged Access
Yubico – next generation 2 factor authentication for cyber users
SSH:
Tectia Quantum-Safe and Zero-Trust Editions
PrivX: privileged access management
SSH tectia/server: encrypted communication
Universal Key Manager
GoAnyWhere – Automate & secure file transfers to protect sensitive data
Graylog – leading log management
Lucy – Security awareness training

The network monitoring system – Hanel NMS
Hanel NMS effectively solves network monitoring problems.
Hanel NMS helps administrator to monitor the system, device hardware information, network bandwidth, network problems, help early diagnose possible problems, system performance and responsiveness, thereby offering options to optimize, upgrade and minimize problems affecting network operation.
Hanel NMS allows users to configure email or SMS for pre-set event-based alerts. Ideally, Hanel NMS also provides accurate data and reports based on the database.

Managed Security Service (MSSP), provided by NetNam, ensures the ability to monitor and detect early threats, thereby developing responding plans to minimize damage to the IT system, and helping customers reduce the burden of budgets and human resources. netSecure: Monitoring and responding to security incidents Pentest as Service: Assessing information security Security Defense Services: Protecting applications and security systems Managed Security Services: Managing device and security system Network & Application Monitoring: Monitoring network infrastructure and applications

Main Item 1 : ZombieZERO Inspector
ZombieZERO Inspector is a network-type product for APT defense that is installed in the network section, email section, and network linkeage section, and is a solution to detect and respond to new/variant malicious codes flowing into the inside based on behavior.
Main Item 2 : ZombieZERO EDR
ZombieZERO EDR is an agent-type product (software) for APT defense installed on endpoints, and is a solution to detect and respond to new/variant malicious codes that can be executed on endpoints (PCs or servers) which is the users section.
Main Item 3: SECaaS (Security as a Service)
ZombieZERO SECaaS is the cloud service for ZombieZERO EDR. It prevents information leakage with the malware detection and blocking functions of ZombieZERO EDR. and the functions of a secure sockets layer private virtual network (SSL VPN) that prevents data leakage.

Micro Focus:
Solutions of Micro Focus are specifically designed to improve performance, improve efficiency, and optimize costs for customers. Micro Focus provides a wide range of products such as Source Code level application vulnerability detection, SIEM, SOAR, SOC, ITOM, and ITSM solutions…
Progress:
Progress provides powerful and reliable network monitoring solutions. The Kemp LoadMaster application load balancing solution is highly appreciated by users, improving the availability and optimizing the system’s resources. Featured products: Application Load Balancing – Kemp LoadMaster; Network monitoring and analysis solution – Flowmon; Network monitoring and management solution – IPSwitch…

Active XDR (Active Extended Detection and Response): the solution to help you detect any hidden risks and defend in the most effective way.
BAS (Breach and Attack Simulation): With the BAS solution, we will provide the industry’s largest ecosystem of technology alliances to be available 24/7 for the most potential threats.
APT (Advanced Persistent Threat): This solution provides timely information and allows experts to accurately grasp the system situation, helping to prevent maximum cases of Hacker intrusion and promptly causing consequences for the system.
SOC tools: Includes powerful tools in building SOC systems (According to Gartner’s standards): NDR, EDR, BAS.
NPMD: New generation network performance monitoring and analysis technology based on Netflow/IPFIX standard.

WAPPLES
WAPPLES is a web application firewall (WAF) that performs AI-based logical analysis to HTTP and HTTPS traffic, protecting web applications, APIs, and mobile apps from attacks. By safeguarding applications from both known and zero-day vulnerabilities, WAPPLES is an effective solution against sensitive data exfiltration, website defacement, malicious bots, and DDoS, helping organizations meet regulatory compliance.
iSIGN+
iSIGN+ is an appliance type SSO solution that can be easily installed, operated, and supported on existing servers. iSIGN+ is an SSO/EAM solution that enables secure access to multiple services with a secure SSO (Single Sign On) and manages user rights via role-based access control.

Sophos Managed Threat Response (MTR) provides 24/7 threat hunting, detection, and response capabilities delivered by an expert team as a fully-managed service.
Threat Notification Isn’t the Solution – It’s a Starting Point
With Sophos MTR, your organization is armed with a 24/7 team of threat hunters and response experts who will:
-
Proactively hunt for and validate potential threats and incidents
-
Use all available information to determine the scope and severity of threats
-
Apply the appropriate business context for valid threats…
Machine-Accelerated Human Response
Built on our Intercept X Advanced with EDR technology, Sophos MTR fuses machine learning technology and expert analysis for improved threat hunting and detection, deeper investigation of alerts, and targeted actions to eliminate threats with speed and precision.
WHAT PARTICIPANTS SAID?















This is the third year of the Vietnam Security Summit 2021 but the first time that the event was held virtually – an appropriate approach to the new normal. This event contributed to raising awareness of each organization, business and people about the necessity of information security and help finding the right solutions to deal with such threats of cyberspace in the coming time.
Mr. Nguyen Huy Dung
Deputy Minister, Ministry of Information and Communications
One of the pillars of digital transformation is cloud computing. Currently, Vietnam’s leading technology enterprises have all followed this direction. Vietnam Security Summit 2021 encouraged all parties to discuss the difficulties and challenges as well as the benefits in ensuring information security for cloud computing.
Mr. Nguyen Thanh Phuc
Director General, Authority of Information Security, Ministry of Information and Communications
Recently, hackers have carried out many attacks on large enterprises, especially data encryption and blackmail attacks. These trends are expected to continue in the coming years, and we need to implement more effective solutions to prevent and secure critical infrastructure that have been discussed in the Summit.
Colonel Tran Duc Su
Director, Center for Information Technology and Cyber Security Monitoring, Vietnam Government Information Security Commission
The level of delegates and the range of different types of businesses at Vietnam Security Summit have been fine. We have made some business-oriented conversations and we are hoping for good results from those connections.
Mr. Le Duc Anh
Business Development Manager, Group IB
Vietnam Security Summit gave an opportunity to present our solutions to people across Vietnam at this trying time.
Mr. Tran Minh Quang
Director of Viettel Threat Intelligent
Unlike every year, this year I had the opportunity to share my knowledge and introduce solutions to protect information systems to everyone in Vietnam and over the world through a smart online platform.
Mr. Dinh Trong Du
Senior Technical Engineer, Samsung
Joining the symposium, I have been part of not only learning but sharing my knowledge with peers and providing input tackle issues better.
Mr. Bui Dinh Giang
CIO, PTSC|PetroVietnam
I had great experiences while joining this event! The quality of the virtual conference is all good with outstanding speakers, superior interpretation, strong network connectivity and sound, etc!
Mr. Hoan Vu Cong
Manager of Digital Banking Department, Agribank
One of the events with excellent Excellent virtual exhibition experience with a user-friendly platform. We can easily schedule a meeting for detailed discussion and communicate to booth representatives via text message, email or video call.
Mr. Luu Ha Nam
CISSP/CISA/CISM/CCSP – Security Manager, VPS Securities JSC
Very informative, eloquent speakers and round table conversations. Can’t wait for Vietnam Security Summit 2022!
Ms. Hoang Thi Mai Huong
IT Risk Control Specialist, MB Ageas
The showing is such a fabulous place with lots of deep insights into the latest cybersecurity technologies.
Mr. Truong Tan Quoc
Technical Deputy Director, SAWACO
At other conferences, you’re just an audience member, whereas Vietnam Security Summit ‘connects’ you with industry peers. What a fantastic event with the entire security community under one roof!!
Mr. Tran Hieu
IT Specialist, TH Milk
The seminars left us with the best practices that could be applied back to our organisation.
Mr. Tuan Tran
IT Security, Panasonic
An exceptional opportunity to hear influential speakers from a wide variety of cross-government backgrounds that will broaden your knowledge
Mr. Nguyen Hoang Ngan
IT Manager, EVNGENCO2
Useful sources of information on how the fight against emerging threats is conducted by various agencies, including private sector companies. I particularly enjoyed the experience!
Mr. Pham Quoc Chinh
CIO, GPBank
