You have walled-off your network, layered your defenses, and now you can sit back and relax, right? What about all of those BYOD devices accessing your network from home offices, customer locations, airports, etc.? Are those protected? Join our experts to learn more about the importance of considering endpoints when building your security plan.
Principal Solution Architect, CheckmarxRead Bio
General Manager, Kaspersky (South Asia)Read Bio
Superintendent of Police, Central Bureau of Investigation,GoIRead Bio
CISO, Max Bupa Health Insurance Co. LtdRead Bio
Director Transformation strategy, Asia Pacific and Japan, ZscalerRead Bio
Head of System Engineering, India and SAARC, Forescout Technologies IncRead Bio