
8:30 am - 9:00 am

Registration & Exhibit Browsing

Managing Editor, Asia & the Middle East, ISMG
With many enterprises now employing a 100% remote workforce, more than ever security leaders need to know exactly who is logging into critical systems and accessing role-appropriate data. This is the role of zero trust. Not a product or a service, zero trust is a strategy that employs multifactor authentication, biometric and behavioral analytics and continuous monitoring to verify user identities and control access to sensitive resources.
Join our virtual summit to gain expert insight from practitioners, researchers and vendors on the myths and realities about zero trust and how it is being deployed successfully.
Same Agenda August 4th, 5th, and 6th at 8:30 am SGT
Speaker:
Ron Ross, Fellow, National Institute of Standards and Technology (NIST)
The Advanced Persistent Threat (APT) is extremely dangerous to the national and economic security. To address this reality in the 21st century, the one-dimensional protection strategy focused solely on perimeter-based defenses must be transitioned to a new multidimensional, defense-in-depth protection strategy that includes three, mutually supportive and reinforcing concepts: (1) penetration resistant architectures; (2) damage limiting operations; and (3) system designs that support cyber resiliency and survivability.
A promising concept that can support a multidimensional protection strategy is Zero Trust Architectures.
Attend this session to learn more about:
Speaker:
Shoen Yih Yum, Director, Cyber Security Programme Centre, Cyber Security Agency of Singapore
The uncertainty caused by COVID-19 has heightened cybersecurity risks for enterprises who need to address the new normal and take appropriate measures to protect their organization and workforce while working remotely. This disruption in business operations has expanded the attack surface.
The key note discusses the changing threat landscape of the country owing to the widespread of COVID-19 pandemic and how enterprises are grappling with the situation and leveraging new concepts such as "zero trust" in protecting their virtual environment.
Speaker:
Tony Jarvis, CTO - APAC, Check Point
Over 52% of organizations have already started redesigning their security infrastructures based on the "zero trust" model, and 18% are planning to initiate the effort in the coming year. But keeping your business data protected in a "perimeter everywhere" environment requires more than just a patchwork security architecture. It's critical to take a practical and holistic approach to zero trust implementation, based on a single, consolidated security architecture.
The session discusses:
Speaker:
Karunanand Menon, Senior Sales Engineer, APAC - Sales Engineering, Okta
The "zero trust" security model emphasizes that enterprises should have a "trusted" internal network and an "untrusted" external network. The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, show that we can no longer have a perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders regardless of their location, device or network.
Identity and access management is essential to a zero trust strategy. People are the new perimeter, with identity the critical component to establishing a secure environment.
This session addresses:
Speaker:
Martyn Crew, Director of Solutions Marketing, Gigamon
One of the key lessons from the shift to the "work from home model" is this: "Trust no device; trust no one." This "zero trust" mantra will be the foundation for many organizations' next-generation security strategies and architectures. But can such an approach be implemented cost-effectively?
As organizations move to a long-term, distributed workplace strategy, they must develop a next-generation security architecture.
This session addresses:
Speaker:
Lenka Fibikova, Security Transformation Lead-Enterprise Access Management, Standard Chartered Bank
The COVID-19 pandemic has shown that large-scale remote working is feasible. Many predict workforce location flexibility will remain important long after the health crisis is over. But that will require much broader implementation of "zero trust" concepts to ensure that our organizations and their most valuable assets stay secure. This session addresses how location-based authentication can help support continuous authentication. It will also discuss whether full user tracing is needed to gain sufficient confidence about who is using the organization's resources, and how location-based authentication can improve security even on premises. And it will outline how to set up an effective access control strategy.
The session offers insights on:
Speaker:
Baljit Singh Dhillon, Head-Cybersecurity Strategy and Architecture, Axiata Group Malaysia
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.
The session discusses:
Speaker:
Niel Pandya, Cybersecurity Lead, APJ, Micro Focus
Covid-19 came at a time when most of us were comfortable with our security posture. Do enterprises need to conduct a reality check of their security posture to meet the new demands? What did we miss? Were we under-prepared to tackle the new demands of the remote workforce culture? Had Covid-19 changed our security requirements or just highlighted their importance?
Have we limited 'zero trust' only to capabilities to trust identity; what about data and applications? And what is the role of AI and ML in our Zero Trust campaign?
This session discusses:
Speaker:
Michael Dubinsky, Head of Product Management, Zero Trust, Symantec
As organizations move to redesign their security architecture to a 'zero trust' security model, some struggle to prioritize the capabilities needed to achieve their desired Zero Trust outcomes, while not drowning in costs and complexity.
The talk will provide an overview of how new solutions can help you implement a 'zero trust' security model for your organization based on enforcing least privilege access and enhance visibility.
The session will discuss:
Speaker:
Jay Kelley, Principal Product Marketing Manager, F5 Networks
"Zero trust" is a pre-emptive architectural methodology for security that assumes compromise has already occurred. Every user cannot be trusted, and all communications must be secured regardless of network, user and location.
In a zero trust journey, organizations need a secure entry points to applications and resources. But that's just the start. Zero trust is multilayer security. A comprehensive, holistic security approach is necessary to address the tenets of this architecture, and the mantra is "never trust; always verify," with one addition: Continuously monitor.
This session addresses:
Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software
In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.
The security teams have the considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines and enforcing corporate IT policies.
The session discusses:
COVID-19, as you all know is driving new technological demands for enterprises as businesses are dealing with the needs of a sudden, remote workforce and increasingly embracing mobile, cloud, and edge computing. Against this, Zero Trust principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. It is said that using zero trust platform requires redefining access control and security strategies.
The session discusses:
Speaker:
Ron Ross, Fellow, National Institute of Standards and Technology (NIST)
The Advanced Persistent Threat (APT) is extremely dangerous to the national and economic security. To address this reality in the 21st century, the one-dimensional protection strategy focused solely on perimeter-based defenses must be transitioned to a new multidimensional, defense-in-depth protection strategy that includes three, mutually supportive and reinforcing concepts: (1) penetration resistant architectures; (2) damage limiting operations; and (3) system designs that support cyber resiliency and survivability.
A promising concept that can support a multidimensional protection strategy is Zero Trust Architectures.
Attend this session to learn more about:
Speaker:
Shoen Yih Yum, Director, Cyber Security Programme Centre, Cyber Security Agency of Singapore
The uncertainty caused by COVID-19 has heightened cybersecurity risks for enterprises who need to address the new normal and take appropriate measures to protect their organization and workforce while working remotely. This disruption in business operations has expanded the attack surface.
The key note discusses the changing threat landscape of the country owing to the widespread of COVID-19 pandemic and how enterprises are grappling with the situation and leveraging new concepts such as "zero trust" in protecting their virtual environment.
Speaker:
Tony Jarvis, CTO - APAC, Check Point
Over 52% of organizations have already started redesigning their security infrastructures based on the "zero trust" model, and 18% are planning to initiate the effort in the coming year. But keeping your business data protected in a "perimeter everywhere" environment requires more than just a patchwork security architecture. It's critical to take a practical and holistic approach to zero trust implementation, based on a single, consolidated security architecture.
The session discusses:
Speaker:
Karunanand Menon, Senior Sales Engineer, APAC - Sales Engineering, Okta
The "zero trust" security model emphasizes that enterprises should have a "trusted" internal network and an "untrusted" external network. The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, show that we can no longer have a perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders regardless of their location, device or network.
Identity and access management is essential to a zero trust strategy. People are the new perimeter, with identity the critical component to establishing a secure environment.
This session addresses:
Speaker:
Martyn Crew, Director of Solutions Marketing, Gigamon
One of the key lessons from the shift to the "work from home model" is this: "Trust no device; trust no one." This "zero trust" mantra will be the foundation for many organizations' next-generation security strategies and architectures. But can such an approach be implemented cost-effectively?
As organizations move to a long-term, distributed workplace strategy, they must develop a next-generation security architecture.
This session addresses:
Speaker:
Lenka Fibikova, Security Transformation Lead-Enterprise Access Management, Standard Chartered Bank
The COVID-19 pandemic has shown that large-scale remote working is feasible. Many predict workforce location flexibility will remain important long after the health crisis is over. But that will require much broader implementation of "zero trust" concepts to ensure that our organizations and their most valuable assets stay secure. This session addresses how location-based authentication can help support continuous authentication. It will also discuss whether full user tracing is needed to gain sufficient confidence about who is using the organization's resources, and how location-based authentication can improve security even on premises. And it will outline how to set up an effective access control strategy.
The session offers insights on:
Speaker:
Baljit Singh Dhillon, Head-Cybersecurity Strategy and Architecture, Axiata Group Malaysia
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.
The session discusses:
Speaker:
Niel Pandya, Cybersecurity Lead, APJ, Micro Focus
Covid-19 came at a time when most of us were comfortable with our security posture. Do enterprises need to conduct a reality check of their security posture to meet the new demands? What did we miss? Were we under-prepared to tackle the new demands of the remote workforce culture? Had Covid-19 changed our security requirements or just highlighted their importance?
Have we limited 'zero trust' only to capabilities to trust identity; what about data and applications? And what is the role of AI and ML in our Zero Trust campaign?
This session discusses:
Speaker:
Michael Dubinsky, Head of Product Management, Zero Trust, Symantec
As organizations move to redesign their security architecture to a 'zero trust' security model, some struggle to prioritize the capabilities needed to achieve their desired Zero Trust outcomes, while not drowning in costs and complexity.
The talk will provide an overview of how new solutions can help you implement a 'zero trust' security model for your organization based on enforcing least privilege access and enhance visibility.
The session will discuss:
Speaker:
Jay Kelley, Principal Product Marketing Manager, F5 Networks
"Zero trust" is a pre-emptive architectural methodology for security that assumes compromise has already occurred. Every user cannot be trusted, and all communications must be secured regardless of network, user and location.
In a zero trust journey, organizations need a secure entry points to applications and resources. But that's just the start. Zero trust is multilayer security. A comprehensive, holistic security approach is necessary to address the tenets of this architecture, and the mantra is "never trust; always verify," with one addition: Continuously monitor.
This session addresses:
Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software
In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.
The security teams have the considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines and enforcing corporate IT policies.
The session discusses:
COVID-19, as you all know is driving new technological demands for enterprises as businesses are dealing with the needs of a sudden, remote workforce and increasingly embracing mobile, cloud, and edge computing. Against this, Zero Trust principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. It is said that using zero trust platform requires redefining access control and security strategies.
The session discusses:
Speaker:
Ron Ross, Fellow, National Institute of Standards and Technology (NIST)
The Advanced Persistent Threat (APT) is extremely dangerous to the national and economic security. To address this reality in the 21st century, the one-dimensional protection strategy focused solely on perimeter-based defenses must be transitioned to a new multidimensional, defense-in-depth protection strategy that includes three, mutually supportive and reinforcing concepts: (1) penetration resistant architectures; (2) damage limiting operations; and (3) system designs that support cyber resiliency and survivability.
A promising concept that can support a multidimensional protection strategy is Zero Trust Architectures.
Attend this session to learn more about:
Speaker:
Shoen Yih Yum, Director, Cyber Security Programme Centre, Cyber Security Agency of Singapore
The uncertainty caused by COVID-19 has heightened cybersecurity risks for enterprises who need to address the new normal and take appropriate measures to protect their organization and workforce while working remotely. This disruption in business operations has expanded the attack surface.
The key note discusses the changing threat landscape of the country owing to the widespread of COVID-19 pandemic and how enterprises are grappling with the situation and leveraging new concepts such as "zero trust" in protecting their virtual environment.
Speaker:
Tony Jarvis, CTO - APAC, Check Point
Over 52% of organizations have already started redesigning their security infrastructures based on the "zero trust" model, and 18% are planning to initiate the effort in the coming year. But keeping your business data protected in a "perimeter everywhere" environment requires more than just a patchwork security architecture. It's critical to take a practical and holistic approach to zero trust implementation, based on a single, consolidated security architecture.
The session discusses:
Speaker:
Karunanand Menon, Senior Sales Engineer, APAC - Sales Engineering, Okta
The "zero trust" security model emphasizes that enterprises should have a "trusted" internal network and an "untrusted" external network. The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, show that we can no longer have a perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders regardless of their location, device or network.
Identity and access management is essential to a zero trust strategy. People are the new perimeter, with identity the critical component to establishing a secure environment.
This session addresses:
Speaker:
Martyn Crew, Director of Solutions Marketing, Gigamon
One of the key lessons from the shift to the "work from home model" is this: "Trust no device; trust no one." This "zero trust" mantra will be the foundation for many organizations' next-generation security strategies and architectures. But can such an approach be implemented cost-effectively?
As organizations move to a long-term, distributed workplace strategy, they must develop a next-generation security architecture.
This session addresses:
Speaker:
Lenka Fibikova, Security Transformation Lead-Enterprise Access Management, Standard Chartered Bank
The COVID-19 pandemic has shown that large-scale remote working is feasible. Many predict workforce location flexibility will remain important long after the health crisis is over. But that will require much broader implementation of "zero trust" concepts to ensure that our organizations and their most valuable assets stay secure. This session addresses how location-based authentication can help support continuous authentication. It will also discuss whether full user tracing is needed to gain sufficient confidence about who is using the organization's resources, and how location-based authentication can improve security even on premises. And it will outline how to set up an effective access control strategy.
The session offers insights on:
Speaker:
Baljit Singh Dhillon, Head-Cybersecurity Strategy and Architecture, Axiata Group Malaysia
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.
The session discusses:
Speaker:
Niel Pandya, Cybersecurity Lead, APJ, Micro Focus
Covid-19 came at a time when most of us were comfortable with our security posture. Do enterprises need to conduct a reality check of their security posture to meet the new demands? What did we miss? Were we under-prepared to tackle the new demands of the remote workforce culture? Had Covid-19 changed our security requirements or just highlighted their importance?
Have we limited 'zero trust' only to capabilities to trust identity; what about data and applications? And what is the role of AI and ML in our Zero Trust campaign?
This session discusses:
Speaker:
Michael Dubinsky, Head of Product Management, Zero Trust, Symantec
As organizations move to redesign their security architecture to a 'zero trust' security model, some struggle to prioritize the capabilities needed to achieve their desired Zero Trust outcomes, while not drowning in costs and complexity.
The talk will provide an overview of how new solutions can help you implement a 'zero trust' security model for your organization based on enforcing least privilege access and enhance visibility.
The session will discuss:
Speaker:
Jay Kelley, Principal Product Marketing Manager, F5 Networks
"Zero trust" is a pre-emptive architectural methodology for security that assumes compromise has already occurred. Every user cannot be trusted, and all communications must be secured regardless of network, user and location.
In a zero trust journey, organizations need a secure entry points to applications and resources. But that's just the start. Zero trust is multilayer security. A comprehensive, holistic security approach is necessary to address the tenets of this architecture, and the mantra is "never trust; always verify," with one addition: Continuously monitor.
This session addresses:
Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software
In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.
The security teams have the considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines and enforcing corporate IT policies.
The session discusses:
COVID-19, as you all know is driving new technological demands for enterprises as businesses are dealing with the needs of a sudden, remote workforce and increasingly embracing mobile, cloud, and edge computing. Against this, Zero Trust principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. It is said that using zero trust platform requires redefining access control and security strategies.
The session discusses:
Register and attend online.
Live presentations, Q&A, and Expo Hall demos will be held April 21st. All recordings will be available the 2 days following the summit.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering for a group?
email at priti.dutta@ismg-summits.com / mahesh.verma@ismg-summits.com