Free-To-Attend Cyber Security Online Event

13 - 15 July 2021

Agenda Day 2

We continue to note the fact that cyber security has gone from the Department of No to the Department of Know. Morphing from a department focused on keeping an organization safe through the limitation of tools to understanding the stakeholders goals and subsequently enabling safe business to occur. That is not the finish line. There is no finish line in business enablement. Processes and procedures must continue to evolve.

  • Adopting an evolutionary mindset is a key to reducing vulnerabilities
  • Realizing that cyber security is a behavioral discipline not a technological discipline- technology is simply a tool
  • Keeping pace with change to be ready for zero day activity


Watch the on demand session here

  • Calibrating the team and organization to be ready for industry innovation which can further secure the enterprise
  • Consistently and continually aligning security with the business 
img

Sidarth Chobe

VP / Info Sec Tech Lead Analyst | E-Trading Security, Cyber Security Services
Citi

10:00 am - 10:45 am Digital Trust in the World of Remote Work: The State of Digital Trust in Asia

Karunanand Menon - Senior Solutions Architect, Asia, OKTA Inc

With organizations all but irrevocably embracing some level of remote work, business leaders these days are thinking a lot more about security, digital transformation and growth. Yet, there is one element that underpins every one of these priorities − digital trust. Without it, every area of the business would cease to function.

Maintaining trust is crucial to business success. As digital transformation creates new avenues for engaging with consumers and supporting staff, the associated cyber-attack surface expands in parallel. Organizations benefit from digital trust because it not only helps avoid harm, but it also drives loyalty, income and value.


Watch the on demand session here



img

Karunanand Menon

Senior Solutions Architect, Asia
OKTA Inc

11:00 am - 11:45 am Towards a Future-Proof Security Stack

Sam Curry - Chief Security Officer, Cybereason

Our collective goal is to reverse the advantage in cyber conflict enjoyed by attackers and to give defenders an asymmetric edge. To date, that hasn’t been working as most of our tools and technologies are geared to yesterday’s cyberwar. The key here is to of course align with the business and deploy people, process, and technology correctly; but we need to lean into behavioral telemetry, new data structures, and focus on the results we want. This will help us get ahead of emerging Supply Chain threats now visible beneath the waterline and to counter the scourge of ransomware. It’s time to put the older technologies and processes of security in their right place and to embrace new and emerging technologies that work, to experiment, and to innovate in ways that the industry has lacked for at least a decade. We are headed to a future-proof security stack, and it’s attainable now!


1. What is a future-proof technology stack 

2. How to embrace new and emerging security technologies

3. Countering supply chain and ransomware attacks

4. aligning security requirements with business needs


Watch the on demand session here



img

Sam Curry

Chief Security Officer
Cybereason

12:00 pm - 12:45 pm The War Against Ransomware – How APJ Enterprises are Wining the Fight

Kelvin Wee - Director for Security Engineering – APJ, SentinelOne

Just like remote working, it seems that we are bound to get used to ransomware attacks as part of our lives. Every week there is a new organisation facing a ransomware attack. According to reports, the incidents we see in the news are just a small slice of the true number of victims. It’s believed that in the first months of 2021 over six ransomware groups compromised almost 300 organisations, stealing an estimated $45 million from their victims.

 

It’s time for us to fight back.

 

One enterprise in our own region was hit by a ransomware attack but they fought back and came out as the winner. How did they do it?


Join this session to hear the full story and learn all about AI-driven innovations that are helping enterprises win the war against ransomware.


Kelvin Wee, SentinelOne’s director for Security Engineering and resident white hat hacker will show you:

· Why there’s been a rise of ransomware attacks,

· Why legacy, signature-based endpoint platforms are failing to protect enterprises in Asia against zero-day and fileless attacks,

· The pitfalls of the “1-10-60” model and how to gain 100% visibility with real time, on-device prevention, detection, and response,

· Live Hack: Step-by-step on how a well-known bank in Asia managed to win the war against their ransomware attackers.


Watch the on demand session here



img

Kelvin Wee

Director for Security Engineering – APJ
SentinelOne

Today's anywhere workforce needs everywhere protection. And when 80% of CISO's say they've experienced a breach, we've reached a turning point. Enabling and protecting productivity in this future of Work requires a new approach. But it means thinking differently.

Many security organizations have adopted a Zero Trust approach to security. While this has traditionally been aligned with trusting identities, it extends into overall threat protection, meaning security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click–resulting in a truly preventative approach to securing the anywhere, anytime workforce.

By now, you've also heard the acronym SASE (Secure Access Service Edge), a secure networking architecture that many security leaders are looking to deploy within their organizations. But what is the tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other?

During this session, Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, will tackle these questions and dive deep on:

  • Why focusing on detection is a reactive approach to security
  • The relationship between SASE and Zero Trust
  • Getting the upper hand in fighting online security threats targeting your users.

The world has reached a security inflexion point and a unique opportunity to reconsider how networks, IP assets, and end-users are protected from an expanding array of cyber threats. Those who choose the right path could emerge more secure than ever before with the capabilities to deliver security without compromise to the new workforce.


Watch the on demand session here



img

Mark Guntrip

Senior Director, Cybersecurity Strategy
Menlo Security, Inc.

img

Boon Peng Lau

Director of Solutions Architect, APAC
Menlo Security, Inc.

Sue Nguyen

Senior Marketing Manager
Menlo Security, Inc.

Tommy Mak

Sales Engineer
Menlo Security, Inc.

2:00 pm - 2:45 pm A Chief Risk Officer Perspective

Shanthi Chary - Chief Risk Officer, FlashFX

“It depends on your risk tolerance.” That’s a familiar refrain from cyber security executives when asked about best practice. This session features a Chief Risk Officer discussing risk tolerance from an overall organizational point of view.

  • Identifying risk for the organization
  • Ticking the regulatory boxes for compliance
  • Understanding the constant exposure to risk and being vigilant on any potential gaps
  • Evaluating the risk of each partner through due diligence based on established criteria
  • Continually evolving with the pace of change


Watch the on demand session here

img

Shanthi Chary

Chief Risk Officer
FlashFX