Southeast Asia Cybersecurity Virtual Summit: A PreviewSecurity Thought Leaders to Share Insights on Adopting a 'Zero Trust' Framework
As organizations moved to a remote workforce, new threats emerged, including cybersecurity scams, ransomware attacks, leaking of customer credentials, cyber extortion and the evolution of fake websites for extraction of funds.
See Also: Access Governance Checklist
The "zero trust" model can play a critical role in mitigating these emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
"The summit will address the use of continuous and location-based authentication, the identity centric-approach to zero trust, role-based access management and enabling least privilege access control. "
The summit will address the use of continuous and location-based authentication, the identity centric-approach to zero trust, role-based access management and enabling least privilege access control. It will offer insights on new ways to protect endpoints that are now vulnerable to cyberthreats.
This virtual event will bring together thought leaders who will offer lessons on leveraging the zero trust model in various sectors to support digital transformation and enterprise security governance.
Hot topics at the summit include:
- Securing enterprises applications using a 'zero trust' framework;
- A multilayered security architecture for continuous monitoring;
- The use of CASB and SASE for securing cloud applications and data;
- Faster implementation of secure remote access;
- Reducing VPN vulnerabilities with a zero trust platform
The summit will feature security leaders and subject matter experts sharing insights on new approaches to making the zero trust model work in the new environment. Some critical concerns the summit will delve into are:
- How to take a multidimensional protection strategy;
- Re-enforcing concepts to establish defense in-depth security architecture;
- Laying the foundation for next-generation security;
- Taking on the challenges of balancing security and privacy;
The summit will commence with a keynote address by Ron Ross of the National Institute of Standards and Technology on "When Perimeter Defenses Are Compromised: Applying Zero Trust Concepts to Achieve Cyber Defense-In-Depth."
A second keynote session by Shoen Yih Yum, director of the Cyber Security Program Center, Cyber Security Agency of Singapore, will address "COVID-19 & Enterprise Security Governance: Teleworking, Meetings, Monitoring, and Security During the New Normal".
A presentation by Lenka Fibikova, security transformation lead-enterprise access management, at Standard Chartered Bank, will offer insights on defining a zero trust architecture for a remote workforce.
In a session titled, "Implementing 'Zero Trust': A Practitioner's Approach," Baljit Singh Dhillon, head of cybersecurity strategy and architecture, Axiata Group, will outline a strategy for taking a practical approach to adopting zero trust by leveraging existing investments.
Other sessions will address such topics as a holistic vision for zero trust, the importance of understanding the "unknown risks" in the new environment, and using artificial intelligence and machine learning in building a zero trust architecture for the remote workforce.
For more information, please visit registration page. I look forward to receiving your feedback on the event and insights on topics and speakers you'd like to see at future events.