Loading Events
  • Date: 13 Jan 2022 (Thursday)

  • Time: 11:00 am – 12:00 pm

  • Language: Cantonese


In times like these, it’s tempting for IT teams and company leadership to get caught up in the latest developments or next month’s trends, especially when it comes to how and where work is done. But organizations that develop a long-term strategy for all scenarios—extended work-from-home, return to the office, or hybrid models of any flavour—will come out stronger than ever after the pandemic.
In this seminar, some scenarios & best practices will be shared for employees and customers, keeping them engaged and resilient.

Reasons to attend

  • To learn more about cyber security
  • To learn how to utilize MITRE framework for protection


Lawrence Tsui
Director, Business Development & Strategic Solutions
Fortinet Hong Kong, Macau and Mongolia

Lawrence is responsible for defining the product strategy and tactical plan, and providing the security advisories and solutions to large and strategic account in the region.

He has more than 20 years of experience consulting, designing and implementing solutions in cybersecurity domain.

Prior to Fortinet, he was the Head of Technical Service in Information Security Distributor, managed the pre-sales consulting team as well as support services team, and tasked to deliver the security solution and excellent services in a variety of industries.

Sign Up for This Webinar Now

HK - Event - 2022.01.13 How to Utilize MITRE framework to Protect Your Workforce

Other Webinars of the Series

[Past Event] 18 Nov 2021 (Thur), 11am – 12pm

In this seminar, our expert will share with you what’s the key drivers and impacts of ransomware, how does it work, and how to close the security gaps to stop it.

[Past Event] 16 Dec 2021 (Thur), 11am – 12pm

In this seminar, our expert will share some important business consideration on cyber security when having digital transformation.

17 Feb 2022 (Thur), 11am – 12pm

In this seminar, our expert will share some insight how could help streamline the operation effectively, provide full network visibility, demonstrate compliance with automated respond to incidents more quickly.