The Secure Access Journey
Sabrina Konecky, Director, Information Security, Eli Lilly & Company
Avoiding hype and buzz is difficult. This session discusses various steps in the secure access journey to ensure that your enterprise is protected and resources are used wisely.
Gartner’s secure access service edge (SASE) framework outlines the convergence of networking and security capabilities to create an effective and secure edge. The cybersecurity concept emphasizes the need for vendor rationalization to reduce complexity while increasing visibility and ease of management. This session takes a real-world look at some of the groundwork necessary for fitting into this new model for a better user experience, increased reliability of your services, and increased security for all your web-facing business functions.
Even before the session takes place, we’ll debunk a few myths:
Join this fireside chat session as we breakdown and uncover how the SASE philosophy can offer the best for today, while setting you up for success tomorrow. We’ll discuss SASE uncovering what it is vs. what it isn’t. We’ll plot the road to SASE – and answer the questions:
The dovetailing of IT and OT continues as we march towards a 5G enabled IoT informed near future. Network infrastructure and architecture must allow for the interoperability and security of all users- both human and IoT endpoints in real time.
It’s been said (as recently as in the session above) that the user is the new perimeter. The theory is that if everything is known about the user, the details how the user is manipulating data can be understood. It has also been said that the new perimeter is data itself. The theory is that if the focus is data-first, privilege can be granted more appropriately.
Pat Beonoit, BISO, CBRE
Secure access tools can only be effective if the business remains enabled. Users can only be as effective as the access they are granted allows. This session examines that ‘multi factor authentication’ of secure access technology should include not only architectural interoperability but interoperability with your human resources.