Day 2 | Thursday, 18 February 2021

All times SGT

Parag Deodhar, CISO APAC, Major Global Apparel Manufacturer

What is said about secure access doesn't always line up with what is done with secure access. People, process, technology and the seamless integration of those three aspects of the enterprise must be taken into account when taking steps on the secure access journey. Parag lends his perspective.

  • Initial thoughts on Identity as the Perimeter
  • Further thoughts on PAM & IAM
  • Straightforward thoughts on Zero Trust
  • Initial thoughts on SASE

Parag Deodhar

Director - Information Security, Asia Pacific
Major Global Apparel Manufacturer

10:00 am - 11:00 am SGT Identity’s Role In A SASE Architecture

Jefferson Haw - Zero Trust Advocate, Okta

For many organizations, more and more users, data, and services are located outside the protection of the traditional network perimeter. At the same time, employees are using dozens of applications—including on-premises and software-as-a-service (SaaS) apps—to accomplish their  work. Typically, organizations have deployed an array of point products to handle different security requirements for remote workers, such as secure web gateways, application firewalls, secure virtual private network (VPN) access, cloud access security brokers (CASBs), and more. This not only increases administrative costs and complexity, but also makes for inconsistent user experiences. If an organization has not implemented single sign-on (SSO), user experiences become even more complex, and the situation starts to impact remote worker productivity.

In this session, Jefferson will discuss the network security challenges facing organizations with distributed or remote workforces and how you can address them with a centralised Identity management. 


Jefferson Haw

Zero Trust Advocate

11:00 am - 12:00 pm SGT Finding Success by Adopting a SASE Architecture

David Fairman - Chief Security Officer, Netskope

In a world where digital transformation is accelerating, with our data no longer in an environment we control, this session will explore how security programs need to transform in order to address the challenges posed by cloud adoption at pace. David will share:

  •  How to enable your organization to move to Cloud securely
  •  An understanding of the evolution of SASE
  •  An understanding of the interconnection of Zero-Trust and SASE
  •  How to approach your security program transformation

David Fairman

Chief Security Officer

12:00 pm - 1:00 pm SGT Transforming Post Covid – Up-Level your Security for Remote User and Branch Access

Peter Molloy - Director of SASE Sales and GTM, JAPAC, Palo Alto Networks

Moving applications and data from on-premises infrastructure to a hybrid cloud environment can be challenging. However, deploying security does not have to be. Prisma Access provides scalability—for the short and medium term surge in remote working—along with the ability to modernize your infrastructure over the long term to SASE with a single cloud delivered service that all your users and remote locations can securely connect to. In this session, we will go through what is driving SASE growth in JAPAC region, the issues with the legacy model and how the future of network security is in the cloud:

  • Trends shaping remote work in the short and long term
  • Rethinking infrastructure to ensure corporate resources are secure and available 24/7
  • Transforming networking and security to align with the needs of remote workforces

Peter Molloy

Director of SASE Sales and GTM, JAPAC
Palo Alto Networks

1:00 pm - 2:00 pm SGT Working To Gain Full Lifecycle IAM And Establish A Security Culture

Barry Magsanay - Global Head of Information Security & Americas IT Services, Treasury Wine Estates Global

Barry Magsanay, Global Head of Information Security, Treasury Wine Estates

Cloud evolution is usually based on industry/regulations, budget and mindset. If the industry is highly regulated- cloud evolution is based on that fact. If the industry is not- cloud evolution is more about budget and/or mindset. It is now evident that the future of cyber security is at least mostly in the cloud. 

  • IT: Focusing on operational efficiency and highlighting accountability 
  • Business: Providing awareness 101 and bringing everyone along at their own pace to ensure we all wind up on the same page
  • Facilities: Engaging local leadership and ensuring connectivity with local systems and services 
  • Suppliers: Engaging security champions to spread the word to primary and secondary partners
  • 3rd Party Partners: Engaging business technology partners to ensure their security is wrapped into the overall operations
  • Provisioning each player according to the appropriate and necessary privilege access 

Barry Magsanay

Global Head of Information Security & Americas IT Services
Treasury Wine Estates Global