Building business and operational resilience to cyber threats, compliance and third-party risk

19 - 21 July, 2022 (SGT) | Free Cyber Security Online Event

Welcome Chan

Head of Technology Risk Management ICBC (Asia)

Welcome Chan is the Technology Risk Management Head of the Industrial and Commercial Bank of China (Asia) Limited (ICBCA). With his capacity, he is responsible for ensuring the ICBCA’s information security policies, technology risk matters to ensure the adherence of regulatory and compliance requirements. He also plays a key role on information and cyber security risk matters of the bank and provides security advises to businesses, projects, IT infrastructure and application reviews to alleviate the potential security risks. Prior to joining the ICBCA, he was the Security Manager of CMB Wing Lung Bank, Assistant Vice President of IT Security of China CITIC Bank International, the Information Security Manager of Bank of Communications, Hong Kong Branch, and had held different IT audit management and Security roles of listed companies and manufacturing enterprises.

Welcome holds an MBA degree from the Hong Kong University of Science Technology, and a Bachelor Degree of Electronic and Communications Engineering from The University of Hong Kong. Welcome is also a qualification holder of CISA, CISM, CISSP, CSSLP, CGEIT, CRISC, CPDSE, CCNP, CREST CPSA, CRT and IRCA ISO27001 Information Security Management System (ISMS) Principal Auditor and ISO20000 IT Services Management System (ITSMS) Principal Auditor.

Day 2: 20th July 2022

14:00 Devising an effective Third-Party Risk Management framework for better controls and compliance

With massive digital acceleration post pandemic in a hybrid work environment, managing vendors/supplier/partners (third-party) becomes more complex with more potential for data breaches, downtime, financial losses and other liabilities. Understanding the key framework as well as stages to third-party risk management is crucial in building cyber resilience. Welcome Chan will highlight a step-by-step approach to risk assessment with focus on: 

  • Best practices to manage third-party when accessing sensitive information or materials 
  • Understanding and defining third-party management process lifecycle 
  • Ways to manage risk and compliance issues arising from third-party business 
  • Selecting the right third-party risk metrics for multiple levels of management