Industry Insights with Geetha Nandikotkur

3rd Party Risk Management , Analytics , Application Security

Southeast Asia Cybersecurity Virtual Summit: A Preview

Security Thought Leaders to Share Insights on Adopting a 'Zero Trust' Framework
Southeast Asia Cybersecurity Virtual Summit: A Preview

As organizations moved to a remote workforce, new threats emerged, including cybersecurity scams, ransomware attacks, leaking of customer credentials, cyber extortion and the evolution of fake websites for extraction of funds.

See Also: 5 Requirements for Modern DLP

The "zero trust" model can play a critical role in mitigating these emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.

The summit will address the use of continuous and location-based authentication, the identity centric-approach to zero trust, role-based access management and enabling least privilege access control. It will offer insights on new ways to protect endpoints that are now vulnerable to cyberthreats.

This virtual event will bring together thought leaders who will offer lessons on leveraging the zero trust model in various sectors to support digital transformation and enterprise security governance.

Hot topics at the summit include:

  • Securing enterprises applications using a 'zero trust' framework;
  • A multilayered security architecture for continuous monitoring;
  • The use of CASB and SASE for securing cloud applications and data;
  • Faster implementation of secure remote access;
  • Reducing VPN vulnerabilities with a zero trust platform

Critical Concerns

The summit will feature security leaders and subject matter experts sharing insights on new approaches to making the zero trust model work in the new environment. Some critical concerns the summit will delve into are:

  • How to take a multidimensional protection strategy;
  • Re-enforcing concepts to establish defense in-depth security architecture;
  • Laying the foundation for next-generation security;
  • Taking on the challenges of balancing security and privacy;

Keynote Address

The summit will commence with a keynote address by Ron Ross of the National Institute of Standards and Technology on "When Perimeter Defenses Are Compromised: Applying Zero Trust Concepts to Achieve Cyber Defense-In-Depth."

A second keynote session by Shoen Yih Yum, director of the Cyber Security Program Center, Cyber Security Agency of Singapore, will address "COVID-19 & Enterprise Security Governance: Teleworking, Meetings, Monitoring, and Security During the New Normal".

A presentation by Lenka Fibikova, security transformation lead-enterprise access management, at Standard Chartered Bank, will offer insights on defining a zero trust architecture for a remote workforce.

In a session titled, "Implementing 'Zero Trust': A Practitioner's Approach," Baljit Singh Dhillon, head of cybersecurity strategy and architecture, Axiata Group, will outline a strategy for taking a practical approach to adopting zero trust by leveraging existing investments.

Other sessions will address such topics as a holistic vision for zero trust, the importance of understanding the "unknown risks" in the new environment, and using artificial intelligence and machine learning in building a zero trust architecture for the remote workforce.

For more information, please visit registration page. I look forward to receiving your feedback on the event and insights on topics and speakers you'd like to see at future events.

About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.