Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

On-Demand Webinar

Navigating the Latest IT Security Guidelines for Hong Kong Enterprises

On-Demand

Practical Guidelines for Hong Kong Based Enterprise Companies
Aligning to the latest IT Security Guidelines (G3)

The nature and scope of cyber threats is anything but static. More than 29,000 CVEs were published in the past year, of which thousands were assigned with high severity scores that would require immediate remediation. How do you prioritize which vulnerabilities to fix first?

In this technology showcase, we will cover how the cybersecurity practices have evolved from traditional vulnerability assessment to a Continuous Threat Exposure Management (CTEM) program, and offer practical advice on how HK-based enterprises can align to the latest IT Security Guidelines (G3) - released in April 2024.

Benefits of a consolidated unified platform approach include:

  • Centralized view of all assets (IT, OT, web assets, cloud assets, active directory and more)
  • CVE/CVSS/CVR risk-based criticality scores explained
  • Different scanner method
  • Recommended remediation actions
  • Keeping track of vulnerability status

This session is conducted in Cantonese and recommended for IT Security professionals working for enterprises and government agencies in Hong Kong.

Watch Now