Day 1 | Wednesday, 17 February 2021

All times SGT

9:00 am - 10:00 am SGT Security Awareness & Secure Access

Ellie Warner - Global Head, Cyber Training and Awareness, Standard Chartered

Ellie Warner, Global Head, Cyber Training and Awareness, Standard Chartered

Secure access tools can only be effective if the business remains enabled. Users can only be as effective as the access they are granted allows. This session examines that ‘multi factor authentication’ of secure access technology should include not only architectural interoperability but interoperability with your human resources.

  • Examining everything through a risk management lens
  • Auditing the end-to-end awareness program and doing more than rolling out the same thing again 
  • Unpacking desired behaviors and heat maps to gain more insight
  • Expediting different yet active learning with nuanced targeted audiences 
  • Perfecting the art of the nudge 
  • Discovering the relationship between Secure Access technologies and Secure Access mindsets
  • Realizing that Zero Trust technologies only work with Users’ Full Trust of the security operation

Ellie Warner

Global Head, Cyber Training and Awareness
Standard Chartered

10:00 am - 11:00 am SGT Rapidly Evolving SASE & Practical Implementation Considerations

Nick Savvides - Senior Director of Strategic Business, APAC, Forcepoint

SASE has become the new model for converged network and cyber security architecture to lead enterprises into the 2020’s, but it is continuing to evolve and change. Originally incorporating some aspects of the Zero Trust security model, many implementations are blurring the lines, incorporating more aspects. Furthermore, while the SASE model promises simplicity, the reality for many organisations is that there is significant technology, architectural, process and even contractual hurdles in adopting a SASE model.

This session will explore:

  • The concept of SASE and why it’s considered the security architecture of the future
  • How SASE approaches can differ and how it’s evolving
  • The role of Zero Trust and how it’s affecting SASE beyond networking
  • Network challenges in adopting SASE
  • Practical adoption of SASE in mixed on-prem and cloud environments


Nick Savvides

Senior Director of Strategic Business, APAC

11:00 am - 12:00 pm SGT SASE vs. Zero Trust: What’s The Difference?

Jonathan Andresen - Senior Director, Products & Solutions Marketing, Bitglass

Network security architecture best practices are undergoing a dramatic shift. Two key terms have come to dominate infosec discussions among IT professionals: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE). In practical terms, which is more important, what is the relationship between them, and how will they improve cybersecurity effectiveness?

As security teams prepare for either a return to the office or a more distributed workforce, and as cyber threats continue to proliferate, it’s essential that IT teams understand the differences between these two important security paradigms.

Join this exclusive web event and learn:

  1. The key elements and major differences between both Zero Trust and SASE
  2. How to improve security by leveraging ZTNA within a SASE architecture
  3. Common SASE and ZTNA use cases
  4. How SASE simplifies security operations, lowers management overhead and improves ROI;
  5. Practical steps to implement with Zero Trust and SASE in the short and medium term


Jonathan Andresen

Senior Director, Products & Solutions Marketing

12:00 pm - 1:00 pm SGT Getting Hands-on With Sase: Real-world Examples And Guidelines For A Sase Architecture

Lee Dolsen - Director, Solution Architecture, Zscaler

With applications moving to the cloud, IoT becoming more common, and users connecting from everywhere, traditional network security is no longer able to solve the fundamental challenge of security and is instead adding significant complexity and cost. SASE was created specifically to deal with these challenges, by treating identity as the new perimeter. Join this session to go beyond the basics and learn how you can achieve the right SASE architecture for your organisation, and realise the benefits of such an approach.

In this session we will:

  • Learn what is SASE and what isn’t SASE
  • Learn the main benefits and how to achieve them
  • Hear best practice examples of organisations using SASE
  • Learn how to get started on your SASE journey

Lee Dolsen

Director, Solution Architecture

1:00 pm - 2:00 pm SGT How SASE Takes Up Where SD-WAN Left Off

Eyal Webber-Zvik - Vice President of Product Marketing, Cato Networks

Gartner predicts that by 2024, more than 60% of SD-WAN customers will have implemented a SASE architecture, compared to 35% in 2020. And why is this? Because IT teams are finding it harder to effectively manage and maintain their networks with just SD-WAN. While SD-WAN can reduce cost, it fails to meet the broader needs of the modern digital business, such as cloud, remote workforce, and global reach. In fact, recent research shows that focusing too much on SD-WAN for cost saving can undermine long-term SD-WAN satisfaction.

What should you do?

Eyal Webber-Zvik, shares results from this research, demonstrates why SASE is the future of SD-WAN, and captures insights from enterprises in Singapore, Asia-Pacific, and worldwide.

This session covers:

  • Impact of digital transformation on IT’s network confidence
  • How to cope with network challenges in an evolving business environment
  • Why SASE is the future of SD-WAN and network security 
  • Drill down into the critical needs SASE addresses, and SD-WAN doesn’t

Eyal Webber-Zvik

Vice President of Product Marketing
Cato Networks

2:00 pm - 3:00 pm SGT On The Leading Edge Of Fraud: The Data, The User & The Risk

Martin Ingram - Product Owner, IAM, Royal Bank of Scotland

Martin Ingram, Product Owner- IAM, Royal Bank of Scotland

Risk appetite is personal. Each enterprise determines its risk fate based on a number of factors including the regulatory landscape and the profit motive. A higher risk appetite means a higher possibility for fraud.

  • Understanding the security of the action the data is taking
  • Securing the 'perimeter of one,' no matter if it’s an internal stakeholder, a 3rd party partner or a customer
  • Realizing any given risk and actioning security in real time
  • Taking control and action beyond what you can simply buy
  • Consistently evolving the management of risk and improving the security of data and user 

Martin Ingram

Product Owner, IAM
Royal Bank of Scotland