800+
DELEGATES

40+
SPEAKERS

30+
EXHIBITORS & SPONSORS

60+
PRESS AGENCIES

THANK YOU

On behalf of the Organizing Committee, we would like to take this opportunity to express our warmest gratitude to all speakers, sponsors/exhibitors and delegates attending Vietnam Security Summit 2022 in-person that was wrapped up successfully on June 23, 2022 at JW Marriott Hanoi Hotel.

 
The event drew  the participation of over 1000 delegates. Featuring 01 Keynotes Session, 03 Conference Sessions and an International Expo, Vietnam Security Summit this year has achieved its goal as a high-quality forum for government sector, enterprises and solution providers to exchange and share valuable knowledge and experiences, thereby responding to sophisticated cyber attacks and protecting their organizations against emerging threats.
 
Once again, thank you very much for your participation and support in this prestigious summit.
 
We look forward to welcoming you at Vietnam Security Summit 2023!

2022 SPEAKERS

MR. NGUYEN THANH PHUC
Director General, Authority of Information Security Ministry of Information and Communications

COLONEL DR. NGUYEN NGOC CUONG
Deputy Director General, Department of Cyber Security and High-tech Crime Prevention, Ministry of Public Security

MR. LE QUANG HA
Deputy CEO, Viettel Cyber Security

MR. PHAM ANH TUAN
Member of BoDs cum Director of Banking Technology Modernization Board, Vietcombank

MR. LE HOANG DUONG
Director of Cyber Security Center, FPT Information System Corporation

MR. PHO DUC GIANG
Director, PwC Vietnam Cybersecurity Ltd.

COLONEL TRAN DUC SU
Director, Center for Information Technology and Cyber Security Monitoring, Vietnam Government Information Security Commission

MR. XIAOXIN GONG
Senior Cyber Security Expert, Huawei Global Cyber Security and Privacy Protection Office (GSPO)

MR. TIM MCKENZIE
Principal Consultant for Trustwave, SANS Certified Instructor, SANS Institute

MR. NGUYEN MINH HAI
Security Consultant, Fortinet Vietnam

MR. VU NGOC ANH
Senior Security Engineer, Trellix

MR. VU ANH TIEN
Industry Principal - Cybersecurity, Frost & Sullivan

MS. YAKI YANG
Project Sale Manager, Hikvision

MR. VALERIAN ROSSIGNEUX
Director, Sales Engineering Crowdstrike

MAJOR GENERAL TONG VIET TRUNG
Deputy Commander, Cyberspace Operations Command, Command 86

MR. VU LE
Security Solutions Engineer, Sophos

MS. ADITI JAIN
Principal Product Manager, ARCON TechSolutions Pvt. Ltd.

MR. NGUYEN VAN SON
CTO, Mi2 JSC

MR. JOE CUNNINGHAM
Regional Risk Officer, Visa Asia Pacific

MR. DINH TRONG DU
Senior Technical Engineer, Samsung Vina Electronics Co.,ltd

Mr. Le Duc Anh
Business Development Manager, GROUP-IB

MR. PHAM QUYNH THANG
General Director, Allied Telesis Vietnam Co.,Ltd

MR. VU THE HAI
SOC Manager, VSEC

MR. HOLLIS VALENCIA
Head of Presales, Southeast Asia, Quest Technology Systems Singapore Pte Ltd

MR. LAU YAN QING
Sales Engineer Delinea

MR. VU DO KHANH
Executive Advisor, PLATFORMBASE

MR. ROBERT LAURIE
Enterprise Security Architect, David Lynas Consulting

MR. NGUYEN LE THANH
Vice President, VNG

MR. NGUYEN TRUNG TIN
CEO Polaris Infosec

EXPO HIGHLIGHTS

ARCON’s product portfolio includes:

  • ARCON | Privileged Access Management (PAM)

  • ARCON | User Behaviour Analytics (UBA)

  • ARCON | Security Compliance Management (SCM)

  • ARCON | Endpoint Privilege Management (EPM)

These enterprise-class solutions provide seamless access and have scalable architecture. More than 500+ global enterprises, spanning wide range of industries such as Banking, Finance, Insurance, Telecom, Government,… trust ARCON solutions to safeguard their critical business information….

 See more >> 

The conventional way to protect from attackers and threats is to use a firewall to inspect all traffic to and from the Internet, but which still leaves the network vulnerable to attacks from within the network itself.
We created this solution to instantly respond to threats. The AMF Security solution uses our innovative Isolation Adapter technology, adding autonomous intelligence to the network to automatically decide the appropriate reaction for any detected attack. The AMF-Sec controller integrates with most common firewall products, to centralize your security policies and single panel to manage your responded action.
The Allied Telesis Self-Defending Network does not require any special software to be installed on the end-point. Our solution allows the security appliance to monitor a copy of the traffic (I.e. one-armed) so no latency is introduced, and blocks any threats instantly and automatically.

  See more >> 

CrowdStrike™
is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage – even malware-free intrusions.

  See more >> 

Hikvision is committed to serving various industries through its cutting-edge technologies of machine perception, artificial intelligence, and big data, leading the future of AIoT: through innovative AIoT applications, we are dedicated to empowering every individual to enjoy a better future by building an intelligent world that is more convenient, efficient and secure.

  See more >> 

For Advising service, FPT IS is proud to be the first Vietnamese company to be issued PCI QSA certification by PCI SSC, allowing FPT IS to advise, assess and grant Payment Card Industry Data Security Standard (PCI DSS) certification. In addition, FPT IS also provides advising services to help organizations and enterprises comply with ISO 27001 on Information Security Management System (ISMS).
For Vulnerability assessment (VA) service and Penetration testing (Pentest) service, FPT IS helps our customers to promptly detect and prevent vulnerabilities causing insecurity to IT systems and applications.
For 24/7 security monitoring service, grasping the trend of 24x7x365 monitoring, FPT IS provides FPT.EagleEye mSOC service with 4 main functions including Record, Detect, Investigate, Act.

  See more >> 

Samsung Knox data security solution is the culmination of many years of research and development by globally R&D departments, with real-world testing on billions of mobile devices.
Samsung Knox helps prevent sensitive data from being leaked while employees use smartphones and tablets, blocks all intrusions from malicious software, and provides IT admins with comprehensive tools to manage devices, improve the work efficiency of users

  See more >> 

Delinea is a leading provider of privileged access management (PAM) solutions that empower seamless security for the modern, hybrid enterprise. Our solutions put privileged access at the center of cybersecurity by defining the boundaries of access. With Delinea, privileged access is more accessible.

  See more >> 

Fortinet provides Industry-Leading Cybersecurity solutions across All Networks, Endpoints, and Clouds.

Fortinet Broad Portfolio of Solutions to Protect Your Digital Attack Surface are as followings:

  • Security-driven Networking

  • Zero Trust Access

  • Adaptive Cloud

  •  Security Fabric Management Center NOC / SOC

  See more >> 

Threat Intelligence & Attribution: A system for analyzing and attributing cyberattacks, threat hunting, and protecting network infrastructure based on data relating to adversary tactics, tools, and activity
Threat Hunting Framework: Adversary-centric detection of targeted attacks and unknown threats for IT and OT environments
Atmosphere: Block, detonate and hunt for the most advanced email threats with patented email security technology.
Fraud Hunting Platform: Client-side digital identity protection and fraud prevention in real time
Digital Risk Protection: AI-driven digital risk identification and mitigation platform

  See more >> 

Smart Lock System: Our smart physical lock system is designed with the highest level of anti-intrusion function, meeting the security standards used in the military. Our smart physical locks do not use batteries, in order to ensure absolute security in situations such as power outages or natural disasters.
Digital Smart Key: Our digital smart key can be set to open one or more smart locks in our physical locking system. Customers can use a single key to open a series of different locking devices such as locks for warehouses, cabins, servers,…
Real-time Smart Security System (ICT Compact Network Locking System): our real-time smart security system uses cloud computing linked with smart physical locking system and digital smart key to bring the most comprehensive security solution for users.

  See more >> 

SANS is the most trusted source for Information Security Training, Certification and Research

  • Broad curriculum

  • High-quality courseware

  • Multiple delivery options

  • SANS Cyber Ranges including NetWars and BootUp CTFs

  • Vietnamese Simultaneous Translation for Line Online events…

Are you interested in taking SANS training in your native language? SANS have a number of courses available to study in multiple languages directly through our local instructors, via our Simultaneous translation option.

  See more >> 

Scenario-based Penetration Test: Scenario-based Penetration Test service provided by ECQ helps address the issue of limited threat visibility by simulating attacks from an external, internal, and rogue user point of view. Utilizing the same Tactics, Techniques, and Procedures as of real world advesaries or APT attackers, Scenario-based Penetration Test can be thought of as a lighter approach to Adversary Simulation where attacks are conducted based on each specific scenarios and require shorter execution time.
External: In External scenario, ECQ analyzes all possible attack vectors from an adversary point of view and execute all necessary hacking techniques to establish initial foothold to the target network. ECQ also simulates attacks originating from external branches or partners’ network to help an organization understand better the threats that are coming from a compromised system of a remote branch or third-party vendor.
Internal: Internal scenario penetration test helps an organization evaluate the risks of having a compromised system in the internal network and validate the effectiveness of internal security controls such as SOC/EDR/IDS.

  See more >> 

Niagara Networks
Open Visibility Platform™: Packet data is an incredibly sophisticated area that any SOC and NOC massively use to identify security threats – Niagara Networks’ visibility solutions collect, inspect and deliver the right packet data to threat detection/prevention tools. Our award-winning Open Visibility Platform™ is designed to be open, exposing numerous points for technological integration and extensibility, and offers organizations the agility to host any virtualized security applications and monitoring tools.

Synopsys – Software Integrity Group

  • Coverity

  • Black Duck Source and BinaryAnalysis

  • Defensics

  See more >> 

Key Product:

  • CDN Acceleration

  • Media Delivery Solutions

  • DDoS Mitigation

  • WAF

  • Edge Computing

  • Colocation Services

  See more >> 

Cloudbric WAF+
Cloudbric WAF+ : is a fully managed, smart web security service to protect any business or organization from web threats. Our Security as a Service (SECaaS) solution implements not only WAF functionality, but also four other necessary functions to make your web-based solutions secure against attacks.

Cloudbric ADDoS
Cloudbric ADDoS : Advanced DDoS Protection is a cutting-edge DDoS attack protection and mitigation service. While Cloudbric WAF+ offers an essential DDoS detection service, Cloudbric ADDoS features a higher level of DDoS protection. Cloudbric ADDoS collects, analyzes, and distributes intelligence regarding DDoS attacks between edge locations in real-time across the world.

  See more >> 

DLC delivers Accredited Training & Certification in the SABSA Framework for Enterprise Security. Our training portfolio enables students to deliver business-driven security solutions in their organizations and take the next step on their career path towards security leadership.

  See more >> 

One Identity:

  • syslog-ng – high performance log management

  • SafeGuard – Store, Manage, Record and Analyze Privileged Access

Yubico – next generation 2 factor authentication for cyber users
SSH:
Tectia Quantum-Safe and Zero-Trust Editions
PrivX: privileged access management
SSH tectia/server: encrypted communication
Universal Key Manager
GoAnyWhere – Automate & secure file transfers to protect sensitive data
Graylog – leading log management
Lucy – Security awareness training

  See more >> 

The network monitoring system – Hanel NMS
Hanel NMS effectively solves network monitoring problems.
Hanel NMS helps administrator to monitor the system, device hardware information, network bandwidth, network problems, help early diagnose possible problems, system performance and responsiveness, thereby offering options to optimize, upgrade and minimize problems affecting network operation.
Hanel NMS allows users to configure email or SMS for pre-set event-based alerts. Ideally, Hanel NMS also provides accurate data and reports based on the database.

  See more >> 

Managed Security Service (MSSP), provided by NetNam, ensures the ability to monitor and detect early threats, thereby developing responding plans to minimize damage to the IT system, and helping customers reduce the burden of budgets and human resources. netSecure: Monitoring and responding to security incidents Pentest as Service: Assessing information security Security Defense Services: Protecting applications and security systems Managed Security Services: Managing device and security system Network & Application Monitoring: Monitoring network infrastructure and applications

  See more >> 

Main Item 1 : ZombieZERO Inspector
ZombieZERO Inspector is a network-type product for APT defense that is installed in the network section, email section, and network linkeage section, and is a solution to detect and respond to new/variant malicious codes flowing into the inside based on behavior.

Main Item 2 : ZombieZERO EDR
ZombieZERO EDR is an agent-type product (software) for APT defense installed on endpoints, and is a solution to detect and respond to new/variant malicious codes that can be executed on endpoints (PCs or servers) which is the users section.

Main Item 3: SECaaS (Security as a Service)
ZombieZERO SECaaS is the cloud service for ZombieZERO EDR. It prevents information leakage with the malware detection and blocking functions of ZombieZERO EDR. and the functions of a secure sockets layer private virtual network (SSL VPN) that prevents data leakage.

  See more >> 

Micro Focus:
Solutions of Micro Focus are specifically designed to improve performance, improve efficiency, and optimize costs for customers. Micro Focus provides a wide range of products such as Source Code level application vulnerability detection, SIEM, SOAR, SOC, ITOM, and ITSM solutions…

Progress:
Progress provides powerful and reliable network monitoring solutions. The Kemp LoadMaster application load balancing solution is highly appreciated by users, improving the availability and optimizing the system’s resources. Featured products: Application Load Balancing – Kemp LoadMaster; Network monitoring and analysis solution – Flowmon; Network monitoring and management solution – IPSwitch…

  See more >> 

Active XDR (Active Extended Detection and Response): the solution to help you detect any hidden risks and defend in the most effective way.
BAS (Breach and Attack Simulation): With the BAS solution, we will provide the industry’s largest ecosystem of technology alliances to be available 24/7 for the most potential threats.
APT (Advanced Persistent Threat): This solution provides timely information and allows experts to accurately grasp the system situation, helping to prevent maximum cases of Hacker intrusion and promptly causing consequences for the system.
SOC tools: Includes powerful tools in building SOC systems (According to Gartner’s standards): NDR, EDR, BAS.
NPMD: New generation network performance monitoring and analysis technology based on Netflow/IPFIX standard.

  See more >> 

WAPPLES
WAPPLES is a web application firewall (WAF) that performs AI-based logical analysis to HTTP and HTTPS traffic, protecting web applications, APIs, and mobile apps from attacks. By safeguarding applications from both known and zero-day vulnerabilities, WAPPLES is an effective solution against sensitive data exfiltration, website defacement, malicious bots, and DDoS, helping organizations meet regulatory compliance.

iSIGN+
iSIGN+ is an appliance type SSO solution that can be easily installed, operated, and supported on existing servers. iSIGN+ is an SSO/EAM solution that enables secure access to multiple services with a secure SSO (Single Sign On) and manages user rights via role-based access control.

  See more >> 

Sophos Managed Threat Response (MTR) provides 24/7 threat hunting, detection, and response capabilities delivered by an expert team as a fully-managed service.
Threat Notification Isn’t the Solution – It’s a Starting Point
With Sophos MTR, your organization is armed with a 24/7 team of threat hunters and response experts who will:

  • Proactively hunt for and validate potential threats and incidents

  • Use all available information to determine the scope and severity of threats

  • Apply the appropriate business context for valid threats…

Machine-Accelerated Human Response
Built on our Intercept X Advanced with EDR technology, Sophos MTR fuses machine learning technology and expert analysis for improved threat hunting and detection, deeper investigation of alerts, and targeted actions to eliminate threats with speed and precision.

  See more >> 

WHAT PARTICIPANTS SAID?

SPONSORS 2022

GALLERY 2022