Virtual Cybersecurity SEA Summit: Zero Trust 2021
Category

Virtual Cybersecurity SEA Summit: Zero Trust 2021

Security solutions have long worked in silos. However, establishing context between security silos is key to a successful ‘zero trust’ implementation. MinKwang Lim, director, Capabilities Ecosystem MasterPlan Office, Cybersecurity Agency of Singapore, discusses the promise of a 'zero trust' strategy which offers a framework for securely connecting the right users to the correct data.

Keynote: Establishing Enterprise Business Resilience with Context-Based ‘Zero Trust’

MinKwang Lim, Director, Capabilities Ecosystem MasterPlan Office, Cybersecurity Agency of Singapore - Director, Capabilities Ecosystem MasterPlan Office, Cybersecurity Agency of Singapore  •   • 

Start this Session

Plenary Session: Critically Secure - 'Zero Trust' Approach to Securing Your Critical Information Infrastructure

Indranil Mukherjee, Cybersecurity, CIO, Major Healthcare Group, Singapore - Cybersecurity, CIO, Major Healthcare Group, Singapore  •   • 

Start this Session

Securing Users’ Access to Applications Using ZTNA

Linette Mananghaya, Senior Security Solutions Engineer, Sophos - Senior Security Solutions Engineer, Sophos  •   • 

Start this Session

Aligning Your ‘Zero Trust’ Journey using a SASE Model

Ireneus Laszlo Legeza II, CEO of TechEd Global Academy and BlackOps Cybersecurity Consortium, Philippines - CEO, TechEd Global Academy and BlackOps Cybersecurity Consortium, Philippines  •   • 

Start this Session

The Identity-Focused Security for Your 'Zero Trust' Journey

Karunanand Menon, Senior Sales Engineer, APAC, Okta - Senior Sales Engineer, APAC, Okta  •   • 

Start this Session

Ways to Establish your Zero Trust Readiness: CISOs' Manifestations

Krishna Mohan Kasi, Vice President-Business & IT Audit, BNP Paribas - Vice President-Business & IT Audit, BNP Paribas  •   • 

Start this Session

Trusting the Verification in a 'Zero Trust': A Practical Approach for Secure Access

Eddie Doyle - Global Security Strategist, Check Point Software Technologies  •   • 

Start this Session

The Impact of Digital Transformation on Security Strategy

David Cass - Federal Reserve Bank of NY  •   • 

Start this Session

Panel Discussion: Rising Ransomware Attacks: A ‘Zero Trust’ Response Strategy

Deepayan Chanda - Financial and Banking Industry, Australia , Steven SIM Kok Leong, President, ISACA Singapore Chapter - President, ISACA Singapore Chapter , Thomas Likas; Global Head of Security Architecture and Engineering, Takeda Pharmaceuticals - Global Head of Security Architecture and Engineering, Takeda Pharmaceuticals  •   • 

Start this Session

Build 'Zero Trust' Foundations with Identity & Endpoint

Neha Monga, Director - Product Marketing, Cybersecurity & Data Governance, Microsoft - Director - Product Marketing, Cybersecurity & Data Governance, Microsoft  •   • 

Start this Session

Session Contributors

David Cass

VP - Cyber & IT Risk, Federal Reserve Bank of NY

Read Bio
Deepayan Chanda

Enterprise Security Architect - Cyber Defense

Read Bio
Eddie Doyle

Global Security Strategist, Check Point Software Technologies

Read Bio
Ireneus Laszlo Legeza II, CEO of TechEd Global Academy and BlackOps Cybersecurity Consortium, Philippines

CEO, TechEd Global Academy and BlackOps Cybersecurity Consortium, Philippines

Read Bio
MinKwang Lim, Director, Capabilities Ecosystem MasterPlan Office, Cybersecurity Agency of Singapore

Director, Capabilities Ecosystem MasterPlan Office, Cybersecurity Agency of Singapore

Read Bio
Neha Monga, Director - Product Marketing, Cybersecurity & Data Governance, Microsoft

Director - Product Marketing, Cybersecurity & Data Governance, Microsoft

Read Bio
Sean D. Mack

CIO & CISO, Wiley

Read Bio
Thomas Likas; Global Head of Security Architecture and Engineering, Takeda Pharmaceuticals

Global Head of Security Architecture and Engineering, Takeda Pharmaceuticals

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.