ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit South East Asia: Zero Trust

August 04-06, 2020

View More Events

WELCOME / Summit Overview

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

With many enterprises now employing a 100% remote workforce, more than ever security leaders need to know exactly who is logging into critical systems and accessing role-appropriate data. This is the role of zero trust. Not a product or a service, zero trust is a strategy that employs multifactor authentication, biometric and behavioral analytics and continuous monitoring to verify user identities and control access to sensitive resources.

Join our virtual summit to gain expert insight from practitioners, researchers and vendors on the myths and realities about zero trust and how it is being deployed successfully.

Details

Free Registration

Same Agenda August 4th, 5th, and 6th at 8:30 am SGT

Registering for a group?
email at  priti.dutta@ismg-summits.com / mahesh.verma@ismg-summits.com

  Speakers Associated with ISMG

  • Event Gallery

Justice BN Srikrishna

Former Judge, Supreme Court of India

Brijesh Singh

Inspector General of Police-Training, Govt. of Maharashtra

Loknath Behera

State Police Chief and Director General of Police, Kerala State

Sameer Ratolikar

CISO, HDFC Bank

Ashutosh Jain

CISO, Axis Bank

Bharat Panchal

Chief Risk Officer - India, Middle East and Africa, FIS

Amit Sharma

Director & Advisor (Cyber), Ministry of Defence, GoI

Sridhar Sidhu

EVP-Enterprise Information Security, Wells Fargo

FEATURED SPEAKERS

Ron Ross

Fellow, National Institute of Standards and Technology (NIST)

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Varun Haran

Managing Director, Asia & Middle East, ISMG

Suparna Goswami

Associate Editor, ISMG

Manoj Tewari

Sr. Director, Information Security and Compliance, International SOS

Anthony Bargar

Former Deputy CISO, US Department of Defense and vCISO, South East Asia

Gautam Aggarwal

Senior Vice President, Operations and Technology and APAC Regional CTO, Mastercard

Shoen Yih Yum

Director, Cyber Security Programme Centre, Cyber Security Agency of Singapore

Baljit Singh Dhillon

Head-Cybersecurity Strategy and Architecture, Axiata Group Malaysia

Lenka Fibikova

Security Transformation Lead-Enterprise Access Management, Standard Chartered Bank

Karunanand Menon

Senior Sales Engineer, APAC - Sales Engineering, Okta

Martyn Crew

Director of Solutions Marketing, Gigamon

Niel Pandya

Cybersecurity Lead, APJ, Micro Focus

Jay Kelley

Principal Product Marketing Manager, F5 Networks

Michael Dubinsky

Head of Product Management, Zero Trust, Symantec

Matthew Burns

Director, BigFix, Asia Pacific and Japan, HCL Software

Tony Jarvis

CTO - APAC, Check Point

Draft Agenda / Session Date & Time



  • Tuesday, August 4th

  • Wednesday, August 5th

  • Thursday, August 6th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
9:15 am
9:00 am - 9:15 am

Opening Remarks

9:15 am -
10:00 am
9:15 am - 10:00 am

When Perimeter Defenses Are Compromised: Applying Zero Trust Concepts to Achieve Cyber Defense-In-Depth

Speaker:
Ron Ross, Fellow, National Institute of Standards and Technology (NIST)

The Advanced Persistent Threat (APT) is extremely dangerous to the national and economic security. To address this reality in the 21st century, the one-dimensional protection strategy focused solely on perimeter-based defenses must be transitioned to a new multidimensional, defense-in-depth protection strategy that includes three, mutually supportive and reinforcing concepts: (1) penetration resistant architectures; (2) damage limiting operations; and (3) system designs that support cyber resiliency and survivability.

A promising concept that can support a multidimensional protection strategy is Zero Trust Architectures.

Attend this session to learn more about:

  • Multidimensional protection strategies
  • NIST's view of zero trust
  • The role of zero trust in this new defensive strategy
10:00 am -
10:30 am
10:00 am - 10:30 am

Keynote Session: COVID-19 & Enterprise Security Governance: Teleworking, Meetings, Monitoring and Security During the New Normal

Speaker:
Shoen Yih Yum, Director, Cyber Security Programme Centre, Cyber Security Agency of Singapore

The uncertainty caused by COVID-19 has heightened cybersecurity risks for enterprises who need to address the new normal and take appropriate measures to protect their organization and workforce while working remotely. This disruption in business operations has expanded the attack surface.

The key note discusses the changing threat landscape of the country owing to the widespread of COVID-19 pandemic and how enterprises are grappling with the situation and leveraging new concepts such as "zero trust" in protecting their virtual environment.

10:30 am -
10:45 am
10:30 am - 10:45 am

Tech Spotlight: Zeroing-in On Zero Trust

Speaker:
Tony Jarvis, CTO - APAC, Check Point

Over 52% of organizations have already started redesigning their security infrastructures based on the "zero trust" model, and 18% are planning to initiate the effort in the coming year. But keeping your business data protected in a "perimeter everywhere" environment requires more than just a patchwork security architecture. It's critical to take a practical and holistic approach to zero trust implementation, based on a single, consolidated security architecture.

The session discusses:

  • Effective ways to build a zero trust security framework;
  • Key components of a zero trust model to protect the current environment;
  • Why organizations should to zero-in on zero trust to protect their data.
10:45 am -
11:15 am
10:45 am - 11:15 am Track A

Identity-Centric Approach to 'Zero Trust': Going Beyond Perimeter Security

Speaker:
Karunanand Menon, Senior Sales Engineer, APAC - Sales Engineering, Okta

The "zero trust" security model emphasizes that enterprises should have a "trusted" internal network and an "untrusted" external network. The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, show that we can no longer have a perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders regardless of their location, device or network.

Identity and access management is essential to a zero trust strategy. People are the new perimeter, with identity the critical component to establishing a secure environment.

This session addresses:

  • The shifts in the security landscape that paved the way for zero trust;
  • How the zero trust ecosystem will look;
  • Building an effective zero trust program and architecture.
10:45 am - 11:15 am Track B

'Zero Trust': The Foundation for Next-Generation Security

Speaker:
Martyn Crew, Director of Solutions Marketing, Gigamon

One of the key lessons from the shift to the "work from home model" is this: "Trust no device; trust no one." This "zero trust" mantra will be the foundation for many organizations' next-generation security strategies and architectures. But can such an approach be implemented cost-effectively?

As organizations move to a long-term, distributed workplace strategy, they must develop a next-generation security architecture.

This session addresses:

  • Why zero trust is the right foundation for next-generation security architecture;
  • Why network wide visibility is the foundation of an effective zero trust strategy;
  • How to implement a zero trust strategy in a phased and cost-effective way.
11:15 am -
11:30 am
11:15 am - 11:30 am

Expo Hall & Networking

11:30 am -
12:00 pm
11:30 am - 12:00 pm Track A

Defining a "Zero Trust" Architecture for a Remote Workforce

Speaker:
Lenka Fibikova, Security Transformation Lead-Enterprise Access Management, Standard Chartered Bank

The COVID-19 pandemic has shown that large-scale remote working is feasible. Many predict workforce location flexibility will remain important long after the health crisis is over. But that will require much broader implementation of "zero trust" concepts to ensure that our organizations and their most valuable assets stay secure. This session addresses how location-based authentication can help support continuous authentication. It will also discuss whether full user tracing is needed to gain sufficient confidence about who is using the organization's resources, and how location-based authentication can improve security even on premises. And it will outline how to set up an effective access control strategy.

The session offers insights on:

  • Continuous authentication for a zero trust approach;
  • Key security tenets of zero trust;
  • Creating an effective access control strategy
11:30 am - 12:00 pm Track B

Implementing "Zero Trust": A Practitioner's Approach

Speaker:
Baljit Singh Dhillon, Head-Cybersecurity Strategy and Architecture, Axiata Group Malaysia

The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.

The session discusses:

  • Progress toward adopting the zero trust model;
  • Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
  • Meeting stringent regulatory requirements for critical data while also devising a plan for boundary-less security.
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

COVID-19: A Test on Our 'Zero Trust' Posture

Speaker:
Niel Pandya, Cybersecurity Lead, APJ, Micro Focus

Covid-19 came at a time when most of us were comfortable with our security posture. Do enterprises need to conduct a reality check of their security posture to meet the new demands? What did we miss? Were we under-prepared to tackle the new demands of the remote workforce culture? Had Covid-19 changed our security requirements or just highlighted their importance?

Have we limited 'zero trust' only to capabilities to trust identity; what about data and applications? And what is the role of AI and ML in our Zero Trust campaign?

This session discusses:

  • How to assess your current security posture?
  • How to embrace change to enable the business
  • Philosophy of least privilege access.
12:00 pm - 12:30 pm Track B

Provisioning Secure Remote Access Using the 'Zero Trust' Model

Speaker:
Michael Dubinsky, Head of Product Management, Zero Trust, Symantec

As organizations move to redesign their security architecture to a 'zero trust' security model, some struggle to prioritize the capabilities needed to achieve their desired Zero Trust outcomes, while not drowning in costs and complexity.

The talk will provide an overview of how new solutions can help you implement a 'zero trust' security model for your organization based on enforcing least privilege access and enhance visibility.

The session will discuss:

  • How 'zero trust' will help reduce the load on VPN;
  • Improving identity and access controls;
  • Use of Web security service, SASE and CASB to define access
12:30 pm -
12:45 pm
12:30 pm - 12:45 pm

Networking Break

12:45 pm -
1:15 pm
12:45 pm - 1:15 pm

Ways to Secure Applications Using a "Zero Trust" Framework

Speaker:
Jay Kelley, Principal Product Marketing Manager, F5 Networks

"Zero trust" is a pre-emptive architectural methodology for security that assumes compromise has already occurred. Every user cannot be trusted, and all communications must be secured regardless of network, user and location.

In a zero trust journey, organizations need a secure entry points to applications and resources. But that's just the start. Zero trust is multilayer security. A comprehensive, holistic security approach is necessary to address the tenets of this architecture, and the mantra is "never trust; always verify," with one addition: Continuously monitor.

This session addresses:

  • The The principles of zero trust;
  • The pillars and control points in a zero trust architecture;
  • Enabling multi-cloud application security for zero trust.
1:15 pm -
1:30 pm
1:15 pm - 1:30 pm

Tech Spotlight: Securing the Remote Workforce: Managing Your Endpoints

Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software

In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.

The security teams have the considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines and enforcing corporate IT policies.

The session discusses:

  • Technologies that help you enroll, deploy, secure and support remote endpoints;
  • The Need for continuous monitoring;
  • Ways to secure business operations.
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

Panel: Zero Trust in Action - Building a "Zero Trust" Architecture for Remote Workforce

Moderator: Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Speakers:
Anthony Bargar, Former Deputy CISO, US Department of Defense and vCISO, South East Asia
Gautam Aggarwal, Senior Vice President, Operations and Technology and APAC Regional CTO, Mastercard
Manoj Tewari, Sr. Director, Information Security & Compliance, International SOS

COVID-19, as you all know is driving new technological demands for enterprises as businesses are dealing with the needs of a sudden, remote workforce and increasingly embracing mobile, cloud, and edge computing. Against this, Zero Trust principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. It is said that using zero trust platform requires redefining access control and security strategies.

The session discusses:

  • Use cases for zero trust and redefining access control strategies;
  • Challenges to expect;
  • Metrics of success.
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Expo Hall and Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
9:15 am
9:00 am - 9:15 am

Opening Remarks

9:15 am -
10:00 am
9:15 am - 10:00 am

When Perimeter Defenses Are Compromised: Applying Zero Trust Concepts to Achieve Cyber Defense-In-Depth

Speaker:
Ron Ross, Fellow, National Institute of Standards and Technology (NIST)

The Advanced Persistent Threat (APT) is extremely dangerous to the national and economic security. To address this reality in the 21st century, the one-dimensional protection strategy focused solely on perimeter-based defenses must be transitioned to a new multidimensional, defense-in-depth protection strategy that includes three, mutually supportive and reinforcing concepts: (1) penetration resistant architectures; (2) damage limiting operations; and (3) system designs that support cyber resiliency and survivability.

A promising concept that can support a multidimensional protection strategy is Zero Trust Architectures.

Attend this session to learn more about:

  • Multidimensional protection strategies
  • NIST's view of zero trust
  • The role of zero trust in this new defensive strategy
10:00 am -
10:30 am
10:00 am - 10:30 am

Keynote Session: COVID-19 & Enterprise Security Governance: Teleworking, Meetings, Monitoring and Security During the New Normal

Speaker:
Shoen Yih Yum, Director, Cyber Security Programme Centre, Cyber Security Agency of Singapore

The uncertainty caused by COVID-19 has heightened cybersecurity risks for enterprises who need to address the new normal and take appropriate measures to protect their organization and workforce while working remotely. This disruption in business operations has expanded the attack surface.

The key note discusses the changing threat landscape of the country owing to the widespread of COVID-19 pandemic and how enterprises are grappling with the situation and leveraging new concepts such as "zero trust" in protecting their virtual environment.

10:30 am -
10:45 am
10:30 am - 10:45 am

Tech Spotlight: Zeroing-in On Zero Trust

Speaker:
Tony Jarvis, CTO - APAC, Check Point

Over 52% of organizations have already started redesigning their security infrastructures based on the "zero trust" model, and 18% are planning to initiate the effort in the coming year. But keeping your business data protected in a "perimeter everywhere" environment requires more than just a patchwork security architecture. It's critical to take a practical and holistic approach to zero trust implementation, based on a single, consolidated security architecture.

The session discusses:

  • Effective ways to build a zero trust security framework;
  • Key components of a zero trust model to protect the current environment;
  • Why organizations should to zero-in on zero trust to protect their data.
10:45 am -
11:15 am
10:45 am - 11:15 am Track A

Identity-Centric Approach to 'Zero Trust': Going Beyond Perimeter Security

Speaker:
Karunanand Menon, Senior Sales Engineer, APAC - Sales Engineering, Okta

The "zero trust" security model emphasizes that enterprises should have a "trusted" internal network and an "untrusted" external network. The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, show that we can no longer have a perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders regardless of their location, device or network.

Identity and access management is essential to a zero trust strategy. People are the new perimeter, with identity the critical component to establishing a secure environment.

This session addresses:

  • The shifts in the security landscape that paved the way for zero trust;
  • How the zero trust ecosystem will look;
  • Building an effective zero trust program and architecture.
10:45 am - 11:15 am Track B

'Zero Trust': The Foundation for Next-Generation Security

Speaker:
Martyn Crew, Director of Solutions Marketing, Gigamon

One of the key lessons from the shift to the "work from home model" is this: "Trust no device; trust no one." This "zero trust" mantra will be the foundation for many organizations' next-generation security strategies and architectures. But can such an approach be implemented cost-effectively?

As organizations move to a long-term, distributed workplace strategy, they must develop a next-generation security architecture.

This session addresses:

  • Why zero trust is the right foundation for next-generation security architecture;
  • Why network wide visibility is the foundation of an effective zero trust strategy;
  • How to implement a zero trust strategy in a phased and cost-effective way.
11:15 am -
11:30 am
11:15 am - 11:30 am

Expo Hall & Networking

11:30 am -
12:00 pm
11:30 am - 12:00 pm Track A

Defining a "Zero Trust" Architecture for a Remote Workforce

Speaker:
Lenka Fibikova, Security Transformation Lead-Enterprise Access Management, Standard Chartered Bank

The COVID-19 pandemic has shown that large-scale remote working is feasible. Many predict workforce location flexibility will remain important long after the health crisis is over. But that will require much broader implementation of "zero trust" concepts to ensure that our organizations and their most valuable assets stay secure. This session addresses how location-based authentication can help support continuous authentication. It will also discuss whether full user tracing is needed to gain sufficient confidence about who is using the organization's resources, and how location-based authentication can improve security even on premises. And it will outline how to set up an effective access control strategy.

The session offers insights on:

  • Continuous authentication for a zero trust approach;
  • Key security tenets of zero trust;
  • Creating an effective access control strategy
11:30 am - 12:00 pm Track B

Implementing "Zero Trust": A Practitioner's Approach

Speaker:
Baljit Singh Dhillon, Head-Cybersecurity Strategy and Architecture, Axiata Group Malaysia

The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.

The session discusses:

  • Progress toward adopting the zero trust model;
  • Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
  • Meeting stringent regulatory requirements for critical data while also devising a plan for boundary-less security.
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

COVID-19: A Test on Our 'Zero Trust' Posture

Speaker:
Niel Pandya, Cybersecurity Lead, APJ, Micro Focus

Covid-19 came at a time when most of us were comfortable with our security posture. Do enterprises need to conduct a reality check of their security posture to meet the new demands? What did we miss? Were we under-prepared to tackle the new demands of the remote workforce culture? Had Covid-19 changed our security requirements or just highlighted their importance?

Have we limited 'zero trust' only to capabilities to trust identity; what about data and applications? And what is the role of AI and ML in our Zero Trust campaign?

This session discusses:

  • How to assess your current security posture?
  • How to embrace change to enable the business
  • Philosophy of least privilege access.
12:00 pm - 12:30 pm Track B

Provisioning Secure Remote Access Using the 'Zero Trust' Model

Speaker:
Michael Dubinsky, Head of Product Management, Zero Trust, Symantec

As organizations move to redesign their security architecture to a 'zero trust' security model, some struggle to prioritize the capabilities needed to achieve their desired Zero Trust outcomes, while not drowning in costs and complexity.

The talk will provide an overview of how new solutions can help you implement a 'zero trust' security model for your organization based on enforcing least privilege access and enhance visibility.

The session will discuss:

  • How 'zero trust' will help reduce the load on VPN;
  • Improving identity and access controls;
  • Use of Web security service, SASE and CASB to define access
12:30 pm -
12:45 pm
12:30 pm - 12:45 pm

Networking Break

12:45 pm -
1:15 pm
12:45 pm - 1:15 pm

Ways to Secure Applications Using a "Zero Trust" Framework

Speaker:
Jay Kelley, Principal Product Marketing Manager, F5 Networks

"Zero trust" is a pre-emptive architectural methodology for security that assumes compromise has already occurred. Every user cannot be trusted, and all communications must be secured regardless of network, user and location.

In a zero trust journey, organizations need a secure entry points to applications and resources. But that's just the start. Zero trust is multilayer security. A comprehensive, holistic security approach is necessary to address the tenets of this architecture, and the mantra is "never trust; always verify," with one addition: Continuously monitor.

This session addresses:

  • The The principles of zero trust;
  • The pillars and control points in a zero trust architecture;
  • Enabling multi-cloud application security for zero trust.
1:15 pm -
1:30 pm
1:15 pm - 1:30 pm

Tech Spotlight: Securing the Remote Workforce: Managing Your Endpoints

Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software

In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.

The security teams have the considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines and enforcing corporate IT policies.

The session discusses:

  • Technologies that help you enroll, deploy, secure and support remote endpoints;
  • The Need for continuous monitoring;
  • Ways to secure business operations.
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

Panel: Zero Trust in Action - Building a "Zero Trust" Architecture for Remote Workforce

Moderator: Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Speakers:
Anthony Bargar, Former Deputy CISO, US Department of Defense and vCISO, South East Asia
Gautam Aggarwal, Senior Vice President, Operations and Technology and APAC Regional CTO, Mastercard
Manoj Tewari, Sr. Director, Information Security & Compliance, International SOS

COVID-19, as you all know is driving new technological demands for enterprises as businesses are dealing with the needs of a sudden, remote workforce and increasingly embracing mobile, cloud, and edge computing. Against this, Zero Trust principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. It is said that using zero trust platform requires redefining access control and security strategies.

The session discusses:

  • Use cases for zero trust and redefining access control strategies;
  • Challenges to expect;
  • Metrics of success.
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Expo Hall and Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
9:15 am
9:00 am - 9:15 am

Opening Remarks

9:15 am -
10:00 am
9:15 am - 10:00 am

When Perimeter Defenses Are Compromised: Applying Zero Trust Concepts to Achieve Cyber Defense-In-Depth

Speaker:
Ron Ross, Fellow, National Institute of Standards and Technology (NIST)

The Advanced Persistent Threat (APT) is extremely dangerous to the national and economic security. To address this reality in the 21st century, the one-dimensional protection strategy focused solely on perimeter-based defenses must be transitioned to a new multidimensional, defense-in-depth protection strategy that includes three, mutually supportive and reinforcing concepts: (1) penetration resistant architectures; (2) damage limiting operations; and (3) system designs that support cyber resiliency and survivability.

A promising concept that can support a multidimensional protection strategy is Zero Trust Architectures.

Attend this session to learn more about:

  • Multidimensional protection strategies
  • NIST's view of zero trust
  • The role of zero trust in this new defensive strategy
10:00 am -
10:30 am
10:00 am - 10:30 am

Keynote Session: COVID-19 & Enterprise Security Governance: Teleworking, Meetings, Monitoring and Security During the New Normal

Speaker:
Shoen Yih Yum, Director, Cyber Security Programme Centre, Cyber Security Agency of Singapore

The uncertainty caused by COVID-19 has heightened cybersecurity risks for enterprises who need to address the new normal and take appropriate measures to protect their organization and workforce while working remotely. This disruption in business operations has expanded the attack surface.

The key note discusses the changing threat landscape of the country owing to the widespread of COVID-19 pandemic and how enterprises are grappling with the situation and leveraging new concepts such as "zero trust" in protecting their virtual environment.

10:30 am -
10:45 am
10:30 am - 10:45 am

Tech Spotlight: Zeroing-in On Zero Trust

Speaker:
Tony Jarvis, CTO - APAC, Check Point

Over 52% of organizations have already started redesigning their security infrastructures based on the "zero trust" model, and 18% are planning to initiate the effort in the coming year. But keeping your business data protected in a "perimeter everywhere" environment requires more than just a patchwork security architecture. It's critical to take a practical and holistic approach to zero trust implementation, based on a single, consolidated security architecture.

The session discusses:

  • Effective ways to build a zero trust security framework;
  • Key components of a zero trust model to protect the current environment;
  • Why organizations should to zero-in on zero trust to protect their data.
10:45 am -
11:15 am
10:45 am - 11:15 am Track A

Identity-Centric Approach to 'Zero Trust': Going Beyond Perimeter Security

Speaker:
Karunanand Menon, Senior Sales Engineer, APAC - Sales Engineering, Okta

The "zero trust" security model emphasizes that enterprises should have a "trusted" internal network and an "untrusted" external network. The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, show that we can no longer have a perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders regardless of their location, device or network.

Identity and access management is essential to a zero trust strategy. People are the new perimeter, with identity the critical component to establishing a secure environment.

This session addresses:

  • The shifts in the security landscape that paved the way for zero trust;
  • How the zero trust ecosystem will look;
  • Building an effective zero trust program and architecture.
10:45 am - 11:15 am Track B

'Zero Trust': The Foundation for Next-Generation Security

Speaker:
Martyn Crew, Director of Solutions Marketing, Gigamon

One of the key lessons from the shift to the "work from home model" is this: "Trust no device; trust no one." This "zero trust" mantra will be the foundation for many organizations' next-generation security strategies and architectures. But can such an approach be implemented cost-effectively?

As organizations move to a long-term, distributed workplace strategy, they must develop a next-generation security architecture.

This session addresses:

  • Why zero trust is the right foundation for next-generation security architecture;
  • Why network wide visibility is the foundation of an effective zero trust strategy;
  • How to implement a zero trust strategy in a phased and cost-effective way.
11:15 am -
11:30 am
11:15 am - 11:30 am

Expo Hall & Networking

11:30 am -
12:00 pm
11:30 am - 12:00 pm Track A

Defining a "Zero Trust" Architecture for a Remote Workforce

Speaker:
Lenka Fibikova, Security Transformation Lead-Enterprise Access Management, Standard Chartered Bank

The COVID-19 pandemic has shown that large-scale remote working is feasible. Many predict workforce location flexibility will remain important long after the health crisis is over. But that will require much broader implementation of "zero trust" concepts to ensure that our organizations and their most valuable assets stay secure. This session addresses how location-based authentication can help support continuous authentication. It will also discuss whether full user tracing is needed to gain sufficient confidence about who is using the organization's resources, and how location-based authentication can improve security even on premises. And it will outline how to set up an effective access control strategy.

The session offers insights on:

  • Continuous authentication for a zero trust approach;
  • Key security tenets of zero trust;
  • Creating an effective access control strategy
11:30 am - 12:00 pm Track B

Implementing "Zero Trust": A Practitioner's Approach

Speaker:
Baljit Singh Dhillon, Head-Cybersecurity Strategy and Architecture, Axiata Group Malaysia

The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.

The session discusses:

  • Progress toward adopting the zero trust model;
  • Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
  • Meeting stringent regulatory requirements for critical data while also devising a plan for boundary-less security.
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

COVID-19: A Test on Our 'Zero Trust' Posture

Speaker:
Niel Pandya, Cybersecurity Lead, APJ, Micro Focus

Covid-19 came at a time when most of us were comfortable with our security posture. Do enterprises need to conduct a reality check of their security posture to meet the new demands? What did we miss? Were we under-prepared to tackle the new demands of the remote workforce culture? Had Covid-19 changed our security requirements or just highlighted their importance?

Have we limited 'zero trust' only to capabilities to trust identity; what about data and applications? And what is the role of AI and ML in our Zero Trust campaign?

This session discusses:

  • How to assess your current security posture?
  • How to embrace change to enable the business
  • Philosophy of least privilege access.
12:00 pm - 12:30 pm Track B

Provisioning Secure Remote Access Using the 'Zero Trust' Model

Speaker:
Michael Dubinsky, Head of Product Management, Zero Trust, Symantec

As organizations move to redesign their security architecture to a 'zero trust' security model, some struggle to prioritize the capabilities needed to achieve their desired Zero Trust outcomes, while not drowning in costs and complexity.

The talk will provide an overview of how new solutions can help you implement a 'zero trust' security model for your organization based on enforcing least privilege access and enhance visibility.

The session will discuss:

  • How 'zero trust' will help reduce the load on VPN;
  • Improving identity and access controls;
  • Use of Web security service, SASE and CASB to define access
12:30 pm -
12:45 pm
12:30 pm - 12:45 pm

Networking Break

12:45 pm -
1:15 pm
12:45 pm - 1:15 pm

Ways to Secure Applications Using a "Zero Trust" Framework

Speaker:
Jay Kelley, Principal Product Marketing Manager, F5 Networks

"Zero trust" is a pre-emptive architectural methodology for security that assumes compromise has already occurred. Every user cannot be trusted, and all communications must be secured regardless of network, user and location.

In a zero trust journey, organizations need a secure entry points to applications and resources. But that's just the start. Zero trust is multilayer security. A comprehensive, holistic security approach is necessary to address the tenets of this architecture, and the mantra is "never trust; always verify," with one addition: Continuously monitor.

This session addresses:

  • The The principles of zero trust;
  • The pillars and control points in a zero trust architecture;
  • Enabling multi-cloud application security for zero trust.
1:15 pm -
1:30 pm
1:15 pm - 1:30 pm

Tech Spotlight: Securing the Remote Workforce: Managing Your Endpoints

Speaker:
Matthew Burns, Director, BigFix, Asia Pacific and Japan, HCL Software

In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.

The security teams have the considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of at-home machines and enforcing corporate IT policies.

The session discusses:

  • Technologies that help you enroll, deploy, secure and support remote endpoints;
  • The Need for continuous monitoring;
  • Ways to secure business operations.
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

Panel: Zero Trust in Action - Building a "Zero Trust" Architecture for Remote Workforce

Moderator: Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Speakers:
Anthony Bargar, Former Deputy CISO, US Department of Defense and vCISO, South East Asia
Gautam Aggarwal, Senior Vice President, Operations and Technology and APAC Regional CTO, Mastercard
Manoj Tewari, Sr. Director, Information Security & Compliance, International SOS

COVID-19, as you all know is driving new technological demands for enterprises as businesses are dealing with the needs of a sudden, remote workforce and increasingly embracing mobile, cloud, and edge computing. Against this, Zero Trust principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. It is said that using zero trust platform requires redefining access control and security strategies.

The session discusses:

  • Use cases for zero trust and redefining access control strategies;
  • Challenges to expect;
  • Metrics of success.
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Expo Hall and Networking

View Schedule

SPONSORS / This Summit's Sponsors

Okta
Gigamon
Symantec
Check Point
Micro Focus
f5
HCL

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

LOCATION / Venue & Address

Virtual Summit

Register and attend online.

Live presentations, Q&A, and Expo Hall demos will be held April 21st. All recordings will be available the 2 days following the summit.

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Registering for a group?
email at  priti.dutta@ismg-summits.com / mahesh.verma@ismg-summits.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data