Sabrina Konecky, Director, Information Security, Eli Lilly & Company
Avoiding hype and buzz is difficult. This session discusses various steps in the secure access journey to ensure that your enterprise is protected and resources are used wisely.
Gartner’s secure access service edge (SASE) framework outlines the convergence of networking and security capabilities to create an effective and secure edge. The cybersecurity concept emphasizes the need for vendor rationalization to reduce complexity while increasing visibility and ease of management. This session takes a real-world look at some of the groundwork necessary for fitting into this new model for a better user experience, increased reliability of your services, and increased security for all your web-facing business functions.
Even before the session takes place, we’ll debunk a few myths:
Join this fireside chat session as we breakdown and uncover how the SASE philosophy can offer the best for today, while setting you up for success tomorrow. We’ll discuss SASE uncovering what it is vs. what it isn’t. We’ll plot the road to SASE – and answer the questions:
Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:
As the various facets of network security converge to a cloud-service model with SASE, CISOs everywhere struggle to find the best solution to enable Zero Trust internet access without imposing restrictions and burdens on end-users or compromising their security stack. SASE requires a more robust strategy such as the use of a flexible secure web gateway (SWG).
Through the new concept of isolation, those who place a high priority on security can provide 100 percent malware-free email and web browsing in an easy to use, non disruptive, and scalable manner to allow customers to automatically meet their business needs and scale to wherever users conduct business.
Join this session to learn more about how Isolation technology is changing the future of SASE and Zero Trust Security.
Pat Beonoit, BISO, CBRE
Secure access tools can only be effective if the business remains enabled. Users can only be as effective as the access they are granted allows. This session examines that ‘multi factor authentication’ of secure access technology should include not only architectural interoperability but interoperability with your human resources.