2019 Cybersecurity Conference Go back »
Click here to view pictures of this event.
-
Time2019-02-22 | 13:30 - 18:00
-
Venue:Four Seasons Hotel, Beijing Ballroom
-
Address:
-
Fee:Members: 300 |
Non Members: 600
We would love to hear your feedback, and it just takes a minute.
Sponsors and partners
Presentations in Chinese unless otherwise stated in the agenda. Simultaneous translation services will be provided. This event is sold out and a waiting list is in effect. Those on the waiting list will be notified should a space become available. As venue capacity has been reached we will not admit walk-ins.
Following the promulgation of the Cybersecurity Law in 2016, 2019 may be the year that will witness the release of several pieces of the law’s key implementing rules, as well as intensified law enforcement efforts. At this critical juncture, the European Chamber is delighted to welcome a distinguished group of government body representatives, lawyers, security experts and industry representatives to jointly examine how the law has been and will be implemented in the future.
At this year’s Cybersecurity Conference topics will include:
- What do we currently know about the implementing rules and cybersecurity law enforcement, and what can we infer on their future development?
- What are the key requirements of the Classified Cybersecurity Protection Scheme and the status of the relevant rules?
- How has China been stepping up its personal information protection efforts?
- How cryptography is occupying an increasingly visible role in cybersecurity legislation and what are the obligations laid down by the cryptography regulatory framework?
- Understanding the implications of the Cybersecurity Law and its implementing rules for businesses and the accompanying best practices in compliance?
Agenda
Presentations in Chinese language unless otherwise stated. Translation services will be provided.
13:00-13:30 Registration
13:30-13:40 Welcome remarks by Adam Dunnett, Secretary General, European Chamber (remarks in English)
13:40-14:00 Message from the Cybersecurity Sub-working Group Chair, Clas Neumann, Chair of European Chamber Cybersecurity Sub-working Group, SAP Senior Vice President & Head of Global SAP Labs Network & Head of Fast Growth Market Strategy Group (presentation in English)
14:00-14:30 Cybersecurity rule-making and law enforcement overview, Chen Jihong, Partner at Zhonglun Law Firm
14:30-15:00 China’s Classified Cybersecurity Protection Scheme, Chen Luping, Chief Engineer of Ministry of Industry and Information Technology (MIIT) Center of Computer & Micro-electronics Industry Development (China Software Testing Centre)
15:00-15:15 Coffee break
15:15-15:45 Latest developments regarding key national standards on personal information protection, He Yanzhe, Chief Inspector of Cybersecurity Review Department, Cybersecurity Evaluation Centre, China Electronics Standardisation Institute
15:45-16:15 How cryptography contributes to cybersecurity, Zhang Yuegong, Ph.D., Associate Professor, Member of the National Cryptography Standardisation Technical Committee, Expert of National Research Group for Commercial Cryptography Application Technology, Vice President of Beijing Commercial Cryptography Industry Association, CEO of Beijing Sansec Technology Development Company, Ltd.
16:15-16:45 Presentation on China’s encryption regulations, Jim Fitzsimmons, Cyber Consulting Director, Control Risks
(presentation in English)
16:45-18:00 Panel & Q&A on the overall Cybersecurity Law implementation
- Chen Jihong, Partner at Zhonglun Law Firm
- Yuan Li, Security Consultant, MIIT Centre of Computer & Micro-electronics Industry Development (China Software Testing Centre)
- He Yanzhe, Chief Inspector of Cybersecurity Review Department, Cybersecurity Evaluation Centre, China Electronics Standardisation Institute
- Paul El Khoury, Head of Product Security, SAP Labs China
- Adan Zhan, Deputy Director, Data Science and Innovation, China Enterprise ICT Solutions Limited
- Bruce Fu, Vice Chair of ICT Working Group & Senior Director & Co-lead of the Global Tech Practice at APCO Worldwide (Panel Moderator)
Conference moderated by Barbara Li, Vice Chair of Cybersecurity Sub-working Group & Partner at Norton Rose Fulbright
Terms & Conditions
Events have very limited seating so to ensure your attendance we encourage advance online registration and payment. We cannot guarantee entry to anyone not registered in advance.
All events follow the Chatham House rule unless otherwise stated.
All listed speakers and content is confirmed at the time of publication. We reserve the right to make changes to the agenda as required.
Cancellation Policy
If you cannot attend the event for which you have registered, please cancel your registration no later than one business day prior to the event. If you fail to notify us of your cancellation in a timely fashion, you will be charged for event costs.
To cancel you can: 1) email ldu@europeanchamber.com.cn, or 2) cancel online if you registered for the event through the website.
Advisory Council Policy
Members of the Advisory Council may receive complimentary admission to Chamber seminars, conferences and factory visits up to two attendees per event. Additional participants will be charged at the member rate.
Advisory Council members will still be charged the standard member rate for participation in training courses and special events, such as gala balls, government appreciation dinners, or admission to corporate social events/tournaments.
For further information contact Graeme Wallace gwallace@europeanchamber.com.cn
Speakers
Mr. Clas Neumann
Mr. Clas Neumann
Clas Neumann is Global Head of the SAP Labs Network since 2009, and has been leading the Fast Growth Market Strategy team since 2013. In his role as Labs Head, Neumann acts as the central coordinator of all network activities. In his role as Head Fast Growth Market Strategy he leads the investments for SAP’s growth markets in Africa, China, Middle-East and Russia. Neumann has co-authored different books & article son innovation in emerging markets and been recognized through different awards for his engagement in society and business.
Mr. Chen Jihong
Mr. Chen Jihong
Chen Jihong is a Partner at Zhong Lun Law Firm and is widely regarded as one of the leading cyber security and IP lawyers in the PRC having advised some of the world's largest companies, both foreign and domestic.
Mr Chen’s main areas of legal expertise include: TMT Law, Intellectual property protection, IP portfolio management, IP licensing, e-Commerce, Privacy and data protection, anti-unfair competition, cyber security, domain name dispute resolution, IT and High-tech related legal matters.
Fluent in both Chinese and English, Jihong received his Masters at Tsinghua University in 1996, before graduating from Chicago-Kent College of Law in 2002. Mr Chen is widely published in leading academic journals and has received numerous awards domestically in the areas of IP and telecommunications law, most recently Mr. Chen was selected as “2015 China Top 15 IP Lawyers” by Asia Law and Business and in 2016 was awarded “Telecommunications Law -Lawyer of the Year in China” by Corporate INTL.
Mrs. Chen Luping
Mrs. Chen Luping
Chen Luping is the Chief Engineer of the Centre of Computer & Micro-electronics Industry Development, also known as the China Software Testing Centre (CSTC), a state-level third party testing agency directly guided by the MIIT, for software and hardware products. The CSTC is one of the institutions that are qualified to carry out testing and evaluation under China’s classified security protection scheme.
Mr. He Yanzhe
Mr. He Yanzhe
He Yanzhe is the Chief Inspector of Cybersecurity Review Department, Cybersecurity Evaluation Centre from the MIIT-affiliated China Electronics Standardisation Institute (CESI). He is involved in the drafting of various Chinese data protection standards and is a regular speaker at influential dialogues on cyber security and data flow security across China.
Mr. Zhang Yuegong
Mr. Zhang Yuegong
Zhang Yuegong is an expert in the field of cryptography. He holds a series of titles include Member of the National Cryptography Standardisation Technical Committee, Expert of the National Research Group for Commercial Cryptography Application Technology, Vice President of the Beijing Commercial Cryptography Industry Association, and CEO of Beijing Sansec Technology Development Company, Ltd.
Dr. Paul El Khoury
Dr. Paul El Khoury
Dr. Paul EL KHOURY is the Head of Product Security for SAP Labs China, defining the product security strategy and driving its execution across the different SAP Labs locations in China. He serves as an executive advisor for the SAP’s Chief Security Officer & Head of Global SAP Labs Network on all security topics related to SAP businesses in China. In his previous roles, he was driving various security topics on the technical and organizational level for SAP globally. He holds a Ph.D. in Computer Science from the Université Claude Bernard Lyon1, with focus on security engineering. He is a Certified Information Systems Security Professional and has authored various scientific publications and patents in the field of software security.
Mr. Adan Zhan
Mr. Adan Zhan
詹东东先生负责公司数据科学与创新部门的管理工作,从事ICT信息化建设工作十多年,具有丰富的信息安全、虚拟化、云计算、数据科学等管理、咨询、建设经验,能够结合企业业务发展战略、管理与商业要求,为企业信息化规划建设提供专业的咨询服务,提出有效的信息化ICT解决方案。
多年来,詹东东先生为众多行业包括汽车、零售、制造、教育、金融等提供信息安全、云计算、备份容灾、大数据分析等一站式ICT咨询服务。
同时,詹东东先生多次接受媒体采访,并受邀出席诸多大型行业峰会发表主题演讲,分享信息化建设经验,帮助企业解决在信息化建设方面的问题。
Mr. Jim Fitzsimmons
Mr. Jim Fitzsimmons
Jim Fitzsimmons is a Director in the Cyber Consulting team responsible for managing and delivering complex security projects, as well as partnering clients in understanding and improving their overall cyber security maturity. He has over 25 years of experience in providing IT security and consulting services to a variety of government agencies and industry verticals in the United States, China, Vietnam and Singapore.
Jim has extensive experience working with clients in the identification, management and mitigation of security and resiliency risks. He has led project teams that have developed and evaluated cyber security strategies, operational policies, security architectures, and governance and management models. He has experience in the technology and processes that support data protection and personally identifiable information.
Jim has a BA from Boston University where he studied sociology.
Interested in this topic?
Join the following working groups and fora to get more information and receive regular updates.