Loading…
Total Security Conference Singapore 2020 has ended
PANEL DISCUSSION [clear filter]
Wednesday, October 21
 

9:50am PDT

Securing the End: How to Protect Endpoints Effectively Outside Organization Network Perimeter?
With remote working, at-scale, expected to be the new norm, securing endpoints that connect from outside a network perimeter has become more critical than ever before.
-    How can CISOs protect endpoints that reside outside their security perimeters?
-    How to best monitor, control, maintain, and authenticate endpoints?
- How to balance between confidentiality, availability, and business viability, from policy and access right stand points?

Speakers
ML

Mathieu Lahierre

Principal Application & Data Security - Cybersecurity, Technology Risk & Compliance, BHP


Wednesday October 21, 2020 9:50am - 10:30am PDT

11:40am PDT

Transcending Traditional Boundaries: Adopting Zero Trust Architecture (ZTA) in a Perimeter-less World
With remote working, cloud computing and Internet of Things, traditional network perimeters are no longer sufficient in establishing isolated, safe environments. Therefore, CISOs must assume the network is hostile and always verify before providing the least privilege required.
-    How to safeguard valuable data, assets, applications and services by granular segmentation?
-    How best to verify and authenticate trusts?
-    How to establish access policies based on the principle of lease privilege?
-    What architecture and infrastructure need to be changed to facilitate ZTA?
- How to implement ZTA without sacrificing user experiences?

Wednesday October 21, 2020 11:40am - 12:20pm PDT

2:20pm PDT

Evolving Cyber-security Threat Patterns: How to Orchestrate and Automate Speedy Responses to AI-Driven Cyber-Attacks
With larger attack surfaces vulnerable to more sophisticated and speedier campaign-style attacks driven by machine learning, CISOs must rely on security orchestration, automation and response (SOAR) for efficient defence.
-    How can CISOs visualize and view beyond their dashboard, the security landscape to correctly identify the real threats
-    How to create good eco-systems with multiple defence tools from different vendors
-    With attackers using pivot for AI engines and modifying signatures in real time, how can defence adapt and keep up
- How best to automate responses to decrease response time without disrupting business operations

Wednesday October 21, 2020 2:20pm - 3:00pm PDT

3:40pm PDT

Striking the Balance: Realigning Security Resources to Support Business Recovery and Agility
In a post-Covid-19 world where enterprises strive to recoup lost revenue, speed and agility might take priority over security and compliance, providing enterprising attackers the gap to access sensitive data and essential infrastructure.
-    How can CISO ensure that their enterprises do not get compromised despite the emphasis on speed to market?
-    How to balance and prioritize security investments when under revenue pressure?
-    Is SecOps – integration of IT security and operations – the answer to more efficient cybersecurity?
- How can CISO successfully implement SecOps, from people and technology perspectives?

Wednesday October 21, 2020 3:40pm - 4:20pm PDT

4:20pm PDT

Managing the Inevitable: Ensuring Cyber Resiliency for Business Continuity and Data Recovery
Since cyber-attacks can no longer be fully prevented, it is imperative for organizations to be prepared to respond to and recover from adverse cyber events to limit the severity and ensure business continuity.
-    How well-prepared are organizations in Singapore to respond and restore services?
-    What are the best practices in creating and implementing response and recovery plans?
-    How can attacks and relevant responses be identified efficiently?
- What more can we do to accelerate service restoration?

Speakers
CH

Christopher Han

VP IT & CISO, Sunseap Group


Wednesday October 21, 2020 4:20pm - 5:00pm PDT
 

Filter sessions
Apply filters to sessions.