ISOC-HK eNewsletter – September 2012



Banner - ISOC HK News Sep, 2012


DNSSEC.ASIA SUMMIT 2012 (Aug 29 – 31)

Photo - DNSSEC Asia 1

Photo - DNSSEC Asia photo 2

Organized by ISOC HK, Cyberport, Dotasia, ICANN, and NSRC, a successful seminar and two-day workshop took place on Aug 29 -31. It was an event fully supported by the IT Community. Our experienced speakers and trainers from ICANN, NSRC, PISA, and HKIRC shared their expertise in DNSSEC. DNSSEC is a security measure that protects Internet users from getting infected with cache poisoning. If an user is impaired, without their knowing their identity and information could be compromised while accessing the Internet. DNSSEC safeguard the Internet by creating a “chain of trust” that requires secret password in order for exchange of information at all levels of the domain. Hands-on experience on dealing with DNSSEC was well received by technical and system participants.For more information about the event, click here



Photo - Internet Security and Privacy Networking Hours Hosted by ISOC HK and Google, participates attended the Internet Security and Privacy Networking Hours on August 15, 2012. Speakers from Google and ISOC HK shared they knowledge and tips on how to build a first line of defense over internet threats. It was a great opportunity for internet users to learn and implement some Internet security and privacy strategies!For more information about the event, click here


LEGCO Election – IT Functional Constituency Election Forum 2012 (Sep 3) The Election Forum aims at creating a platform for IT voters to understand more about the candidates’ view for the upcoming LEGCO Election IT Functional Constituency. Members of the organizers/ supporting organizations including ICT companies, agency or service providers will be invited to learn about and question candidates’ views and plans for ICT development in HK.Date: 3 Sep 2012 (Mon)

Time: 6:00pm – 7:30pm

Venue: Room 202, Duke of Windsor Social Service Building, No. 15 Hennessy Road, Wan Chai

Language: Cantonese


1. Opening Statement (10 mins for each candidate in the order of Candidate A, Candidate B)

2. Floor Question (3 questions for each candidate in the order of Candidate B, Candidate A)

3. Closing Statement (3 mins for each candidate in the order: Candidate B, Candidate A)

Click Here for Event Detail and Registration

Forum for LegCo Election IT Functional Constituency
(ITFC) Candidates (Sep 4-5)

Two forums for the candidates of LegCo ITFC Election will be held on 4 Sep 2012 (English session) and 5 Sep 2012 (Cantonese session). The Forum will provide an opportunity for all eligible ITFC voters to understand the political platforms of the election candidates and to channel/share their views to the election candidates. Your presence to the Forum will make our voice be heard at the LegCo in future.

Date: 4 Sep 2012 (Tue) and 5 Sep 2012 (Wed)

Time: 7:00pm – 8:30pm (registration starts at 6:30pm)

Venue: Lecture Theatre (UT), CityU SCOPE, 8/F, United Centre, 95 Queensway, Admiralty, Hong Kong
Language: English session on 4 Sep and Cantonese session on 5 Sep

Fee: Free of charge

Eligible Participant: only Members of the organising, co-organising and supporting organisations are eligible to attend.

Click Here for Event Detail and Registration

Certificate of Cloud Security Knowledge Basic/Plus (Sep 6)

The CSSK courses focus on security best practices defined in Cloud Security Alliance’s cloud security guidance. Cloud Security Alliance (CSA) is a leader in developing cloud security best practices, or standards. The CCSK Basic course is lecture only, while the CCSK Plus course provides hands-on labs. Both courses prepare students for the CSSK exams.

CSSK Basic (H1L09s): Sep 6 of Dec 10

CSSK Plus (H1L10s): Sep 6-7 or Dec 10-11

For more information, please email [email protected]


The information economy is reaching maximum overload (CNN Money) Aug 22, 12This month I went off the grid — all the way off. I powered my iPhone down, popped the vacation responder on my email, and headed out for a two-week adventure. By day two, I had stopped reflexively reaching for my phone; after a week, I could read a book for more than an hour at a time. Then I came home to a sobering reality: 1,379 messages in my Inbox. Read More

FAA looks at changing its rules for in-flight device usage (The Inquirer)

Aug 28, 12

THE UNITED STATES Federal Aviation Administration (FAA) is taking another look at when electronic devices can be used during flight.
The FAA has asked airlines for their views on electronic device usage during flights. According to the FAA it will investigate what tests airlines conduct on devices to determine usage rules and consider establishing standards to allow electronic devices to be used at any stage of flight.

Here was a rare public acknowledgement that hackers are currently laying the foundation for a critical-infrastructure attack — the nightmare scenario that keeps cybersecurity pros up at night. Read More

How Secure Is the Cloud, Really? (TechNewsWorld)

Aug 28, 12

The hack attack on journalist Mat Honan underscored some of the weak points infiltrators can use to slip past cloud systems’ security. Those insecurities can effect companies as well as individuals. About 39 percent of the businesses that responded to a recent Ponemon survey said moving to the cloud has negatively affected the security of their organizations. Read More


Get the most up-to-date discount, news and events.
Join us now: