Identity-as-the-Perimeter Asia

April 27, 2021 | Online Event

Agenda Day 1

9:00 am - 9:45 am Unpacking The Past 15 Years of IAM

Andrew Beauchamp - Group Head- Director of Identity, FWD


  • Understanding that Identity began as operational for only large organizations
  • Recognizing that compliance changed the appetite for and focus on identity
  • Noting that product innovation met the market
  • Realizing that security propelled the connecting of identity and access as a risk initiative
  • Becoming better, faster, more efficient and frictionless
  • Maintaining identity as the centrifugal force of the enterprise value chain


img

Andrew Beauchamp

Group Head- Director of Identity
FWD

10:00 am - 10:45 am Identity-Centric approach to Zero Trust: Going Beyond Perimeter Security

Karunanand Menon - Senior Solutions Architect, Asia, OKTA Inc

Zero Trust security throws away the idea that we should have a “trusted” internal network and an “untrusted” external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees, partners, contractors, etc.) regardless of their location, device or network. There is no silver bullet when it comes to achieving a Zero Trust security architecture, but identity and access management is the core technology that organizations should start with on their Zero Trust journeys.

We’ll explore the shifts in the security landscape that led to the creation of Zero Trust, what the Zero Trust Extended Ecosystem (ZTX) framework looks like today, and how organizations can utilize Okta as the foundation for a successful Zero Trust program now, and in the future.

img

Karunanand Menon

Senior Solutions Architect, Asia
OKTA Inc

11:00 am - 11:45 am The Acceleration of Identity As The Perimeter

Jayanta Debnath - Head of Identity and Access Management - Cybersecurity, Standard Chartered Bank
  • Migrating mindsets from a physical perimeter mentality
  • Securing any agent-less resource
  • Existing in an application-based and cloud-native enterprise environment
  • Threat profiling to stay ahead of zero day vulnerabilities
  • Removing user hurdles while retaining security
  • Discovering decentralized identities 
img

Jayanta Debnath

Head of Identity and Access Management - Cybersecurity
Standard Chartered Bank

12:00 pm - 12:45 pm Digital Identity as a Foundation of Zero Trust

Johan Fantenberg - Principal Solutions Architect, ForgeRock

Businesses are operating under the threat of constant disruption, whilst the never-ending march of the “Dark Army” threatens security & privacy more than ever. The need to deliver richer & more powerful services, whilst embracing modern approaches to cybersecurity & trust? As traditional barriers to security dissolve, digital identity is the constant foundation delivering the appropriate level of access, at the right time. Learn to say yes, more.

● Dovetailing the understanding of the user, endpoint and data for true continuous risk evaluation

● Key components of an identity and access management platform to meet continuous security requirements

● How to deliver the appropriate level of access, at the right time.

● Securing each identity with appropriate context

img

Johan Fantenberg

Principal Solutions Architect
ForgeRock