Identity-as-the-Perimeter ANZ

May 25, 2021 | Online Event

Agenda Day 1

9:00 am - 9:45 am Attracting The Talent Needed For An Advanced Identity Approach

Magesh Dhanasekaran - Manager, Security Architecture and Design, UniSuper

All is naught if the talent is not embedded in the enterprise. Evaluating internal talent to ensure the right mindset is evolving the Identity infrastructure is important. Some suggest that each cyber security identity operation would benefit from non-cyber security talent. With limited cyber security expertise available, alternative sources of talent are necessary.


  • Taking stock of the talent in house
  • Realizing inherent skill sets currently not being utilized
  • Sourcing for additional talent to fit Identity criteria
  • Continually refreshing the team as technology advances
img

Magesh Dhanasekaran

Manager, Security Architecture and Design
UniSuper

10:00 am - 10:45 am Establishing Zero Trust, One Step At A Time

Sami Laine - Director of Technology Strategy, Okta

Last year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. What are the best-practice models for securing it? Why is continuing to rely on traditional approaches courting disaster? What are the steps you must take to implementing Zero Trust across your ecosystem? What are the top trends in Identity Management and how can your organisation leverage these for customer success? In this session, Sami will focus on:

  • The full Zero Trust reference architecture and steps to get there
  • Why Identity is the foundational layer to build contextual access controls from


img

Sami Laine

Director of Technology Strategy
Okta

11:00 am - 11:45 am Building A Remote-Ready Security Strategy

Dave Lewis - Global Advisory CISO, Duo

Join this session to learn how you can:

  • Easily extend Zero Trust philosophy to any device 
  • Take your first steps to implement and measure a successful IAM program
  • Best practices and lessons learned

Enterprise-ready cloud services and hybrid solutions have made it easier for users to complete their work wherever they are, but this flexibility expands the attack surface that you are expected to secure. Many organizations today are using zero-trust principles in their IAM (Identity & Access Management) strategy to solve this challenge, not just authenticating users but also checking if they meet the security policy at the point of access each time they log in. Learn how to develop your IAM program while avoiding the top implementation pitfalls.



img

Dave Lewis

Global Advisory CISO
Duo

As digitalization accelerated over the last 18 months, cyber risk has rocketed to the top of the risk register for many organizations. With an amazing amount of data being shared as part of the digital transformation journey, the question of securing assets and access to underlying systems needs to be addressed.

Identity and Access Management plays an increasingly important role in this context and the role of privileged access to key data and secrets needs to be properly assessed. The reality is that the growing importance of data as a corporate asset is increasing. We deep dive into how Bupa’s programmatic approach to privilege access management fueled their digital transformation in a highly regulated industry. We look at how ongoing improvement and effective change management helped in uplifting their security posture and in developing a single pane of glass to manage identities and roles based access.

  • Understanding the business conditions in a highly regulated industry
  • Insights into aligning digital transformation with IAM at Bupa
  • Lessons learned from a programmatic approach to Privilege Access Management / Identity Security
  • Considerations on the changing role of privileged access to data and secrets in an organization


img

Thomas Fikentscher

Regional Director, ANZ
CyberArk

img

Michael Freeman

Security Manager, Identity and Access, Technology Security Platform
Bupa

1:00 pm - 1:45 pm Livin' on the Edge: Identity in a World With No Boundaries

Richard Bird - Chief Customer Information Officer, Ping Identity

What a ride it has been for identity over the last four years! We moved from "identity is the new perimeter" to "identity is the core of security" to Zero Trust and right into a global pandemic that tested everyone's patience, capabilities and technical solutions; from companies, to employees, to consumers. While identity is still most certainly the core of security and privacy, the lessons of the last year have proven that we need to meet humans who are crossing the veil into the digital world, "out there", on the edge.

  • What is this "edge"? How do you get there?
  • What does it mean for Zero Trust, privacy regulations and consumer protection and rights?

Join internationally renowned cybersecurity and identity expert Richard Bird as he serves as our guide to the "out there", where we are all soon to be livin' on the edge!



img

Richard Bird

Chief Customer Information Officer
Ping Identity

2:00 pm - 2:45 pm Setting Strategic Principles and A Framework To Evolve To Identity-As-The-Perimeter

Dovid Clarke - Head of Cyber Security, Sydney Airport
  • Hitting the ground running on day 1 by becoming principles based
  • Business-based, Fit-For-Purpose, Critical Infrastructure-Focused, Proactive Mindset
  • Eliminating siloed teams which means everyone is running the same race
  • Simply sitting with technology does wonders
  • Diving in on business engagement
  • Moving from reactive to proactive mindset
  • Adapting to a common language and culture
  • Focusing people, process, partners & systems
  • Gaining key fundamentals to ensure identity as the perimeter
img

Dovid Clarke

Head of Cyber Security
Sydney Airport