Free-To-Attend Cyber Security Online Event

13 - 15 July 2021

Agenda Day 1

9:00 am - 9:45 am A Review & An Outlook From An Industry Veteran

Jay Spreitzer - Senior Vice President, APAC Region Information Security Lead, Wells Fargo

We kickoff the APAC Summit with an industry veteran looking back, commenting on the present and forecasting the future of global corporate enterprise cyber security.

  • A review of remote workforces
  • A review BYOD and endpoints 
  • A review of 2020 response
  • A review of cloud evolution
  • A review of new and innovative technology attacks and necessary evolving technology needed for defense 
  • A review of supply chain cyber security
  • A review of DevSecOps
  • An outlook of how SolarWinds affects Cyber Security moving forward


img

Jay Spreitzer

Senior Vice President, APAC Region Information Security Lead
Wells Fargo

10:00 am - 10:45 am Security Reality Check - A Behind The Scenes Look At Risky Employee Behaviors

Joseph Carson - Chief Security Scientist (CSS) & Advisory CISO, Thycotic

Thycotic’s Chief Security Scientist Joseph Carson will take the audience on a journey through the eyes of an employee under pressure to get a task finished—and the risks or workarounds he or she takes that sacrifice security to meet business goals. The audience will learn how, by listening to their concerns, helping educate them to break bad habits, and giving them tools to improve their cyber security hygiene, cyber security leaders can encourage employees to balance both productivity and security.

Time permitting, we would include 2 customers to join Joe for the latter part of the session to discuss the issue further. Walk away with an understanding of:

  • Common situations that compel employees to circumvent security
  • What happens when employees cut security corners to get tasks done
  • How to break employees’ security bad habits with productive alternatives
  • What you can do to motivate employees to want to use security
img

Joseph Carson

Chief Security Scientist (CSS) & Advisory CISO
Thycotic

During this session learn from an experience-based approach to Multi-Factor Authentication. Key points for the session include:

  • An understanding of how and why security is not just about compliance and risk management
  • A discovery of how many factors should the Multi-Factor Authentication have
  • A realization of why user-experience is so important in cyber-security
  • An unpacking of what is common in current cyber-threat landscape


img

Adrian Korczyński

Director of Cyber Security Business Unit
Comarch

img

Dariusz Trocyszyn

Consulting Manager
Comarch

12:00 pm - 12:45 pm Securing Trust: How The Security Leader Enables Business Outcomes

Helen Patton - Advisory CISO, Duo Security at Cisco

What is the value of trust for a company, and what role does a security leader play in order to enable it? Join Advisory CISO Helen Patton on July 12, where she will discuss the factors that make a company trustworthy, how a security team builds trust within an organization, and actionable suggestions for improving security and trust in your organization.

In this webinar you will learn:

·      How to define and develop trust, at the individual and organizational level

·      Why trust in the security team is fundamental to a functioning security culture

·      The pillars of trust to consider when evaluating your organization

·      The benefits of reputational trust, and costs when damaged

img

Helen Patton

Advisory CISO
Duo Security at Cisco

1:00 pm - 1:45 pm Managing Data Leakage Through An Understanding Of The Data

Sandra Laton - APAC Head of Data Leakage Protection - Cyber Security, Deutsche Bank

DLP is not an effective effort if there is too much emphasis on the ‘prevent’ portion of your framework. A keen understanding of the data, fused with a realization of the user’s relationship to data and the forecasting of paths of data in transit is the way forward on managing data leakage.

  • Gaining traction through organizational awareness
  • Gaining security through monitoring  best practice
  • Ensuring consistent employee engagement to ensure that stakeholders know what to do when it matters most
  • Understanding that success depends on management buy-in and proliferation of mindset throughout the organization
  • Standardizing, managing and tracking the data to ensure the security of the enterprise
  • Setting cogent consequence and incident management in place
img

Sandra Laton

APAC Head of Data Leakage Protection - Cyber Security
Deutsche Bank