Agenda Day 2: 27th October 2021

9:00 am - 9:40 am The Cloud: Future of security for a legacy company

Vishnu Mulinty - Former Head of Technology Delivery, New Zealand Post

Cloud migration for legacy systems can be a rough road for companies that fail to plan ahead, with 43% of IT leaders saying it takes too long, as cloud adoption continues to present challenges; significant barriers to adoption being security, governance, and lack of resources and expertise. New Zealand Post approached their journey to the cloud with a holistic and agile framework, presenting opportunities for business, technical and financial benefits, and experiencing an increase in productivity.

Join Vishnu today to learn how: 

  • Enable automated cloud orchestration and optimisation to enhance performance management across applications and services
  • Win low-hanging fruit and achieve key business objectives with data governance
  • Establish proactive threat visibility and predictive security
img

Vishnu Mulinty

Former Head of Technology Delivery
New Zealand Post

  • Leading by example: How Zoho runs on Zoho and is managed by ManageEngine
  • Review the road ahead with its roadblocks
  • Learn to embrace a unified approach to endpoint management and security
  • Discover how zero trust improves employee experience


img

Romanus Prabhu

Director of Product Support & Security Evangelist
ManageEngine

img

Ramoncito Puyat

CISA
Senior Consultant & Assessor for Quality, Information Security and Business Continuity

Amid a surge in new international data privacy laws and regulations, it is becoming increasingly challenging for organisations to stay compliant. It has therefore never been more important to develop a secure infrastructure to enable compliance obligations to be fulfilled, particularly following the shift to remote working during the COVID-19 crisis. The first step to achieving this aim is data classification, which provides a solid foundation to build towards onward compliance.


In this session, our team will explain how integrating data classification with necessary data protection tools such as DLP, rights management, encryption and more, will elevate your cybersecurity strategy. There will also be advice and tips on the right steps to take on this journey.


This session will demonstrate:

  • The increasingly challenging cybersecurity and data protection landscape
  • How to develop a robust compliance and data loss architecture
  • Why classification by design is the foundation of effective data protection and compliance


img

Maheswaran Shanmugasundaram

Regional Manager
HelpSystems

img

David Land

Managing Director Asia Pacific & Japan
HelpSystems

12:00 pm - 12:45 pm Trust in Technology: “Are we there yet?”

Robinson Roe - Managing Director Asia Pacific, Japan, OneTrust

Just reading the words, “trust in technology”, evokes a range of responses. But every time we click on “Accept”, without reading a word of the Terms & Conditions or Policy Notice, we are putting our trust in technology. Cybercrime is on the rise. Increased digitisation is great but we need to make sure it can be trusted. We are definitely not there yet! OneTrust’s mission is to use technology to help organisations be more trusted. In this session we will share a Trust Blueprint to help organisations plot their course towards there. Spoiler alert, to paraphrase Ralph Waldo Emmerson, “there is a journey, not a destination.”



img

Robinson Roe

Managing Director Asia Pacific, Japan
OneTrust

1:00 pm - 1:45 pm Two Sides of the PAM Coin

Tony Goulding - Cyber Security Evangelist, ThycoticCentrify

There are two sides of the PAM coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches. When considering a mature Privileged Access Management (PAM) solution, and for best practices like Zero Trust and Zero Standing Privileges, you need a vault, and you need privilege elevation. You need both sides of the PAM coin.

How do you effectively control administrator activity and access with privilege elevation? Are you enforcing strong authentication and identity assurance with Multi-Factor Authentication (MFA) for all privileged access? Cloud providers offer some basic IAM capabilities, but without unified management of access to other platforms, are you leaving gaps in security and increasing the likelihood of breaches?

In this interactive session, Tony Goulding will walk us through these important concepts and considerations for PAM maturity to secure the modern enterprise.

  • What the two sides of the PAM coin are and why you should be using both for effective privileged access security.
  • Insights on how to effectively reduce your attack surface.
  • How least privilege and just-in-time access benefits elastic, agile environments.
  • How should organisations approach and evolve PAM maturity?


img

Tony Goulding

Cyber Security Evangelist
ThycoticCentrify

  • No mandate, no problem! How to focus on engagement to drive behavioural change for cyber 
  • Cyber hygiene: encourage ownership for proactive and effective measures both at home and at work  
  • The lessons learnt in streamlining, redesigning, and implementing change through content
img

Daisy Wong

Cyber Culture and Engagement Lead
Department of Premier and Cabinet, Victoria Government, Australia

img

Sophia Kakavoules

Cyber Culture Coordinator
Department of Premier and Cabinet, Victoria Government, Australia