With massive digital acceleration these past couple of years due to remote working, we see more companies being exposed to cyber-attacks especially with risk surpassing cyber security efforts in APAC region in comparison to other regions across the globe. In this session, you will learn how to protect your organisation against the intensifying threat landscape as we move toward an increasingly digital, hybrid workplace and will focus on:
Cybersecurity is a top priority for every organization. At least, it should be. The challenge is that the attack surface is expanding, and the threat landscape is adapting so quickly that it is increasingly difficult to keep up with the sheer volume of threats. Cybereason and Google Cloud partnered to deliver the “SOC of the Future” to help companies address these security challenges.
Join this session to learn to see how the combination of Google Cloud to normalize, index, correlate, and analyze data at scale, with the artificial intelligence and MalOp engine of Cybereason yields a powerful tool for defending against attacks.
There are two sides of the PAM Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches. When considering a mature Privileged Access Management (PAM) solution, and for best practices like Zero Trust and Zero Standing Privileges, you need a vault, and you need privilege elevation. You need both sides of the PAM coin. On the other side of the coin, effective control of administrator activity and access with privilege elevation combined with enforcement of strong authentication and identity assurance with Multi-Factor Authentication (MFA) for all privileged access is equally as critical to achieve Zero Trust goals.
As passengers, every time we travel through an airport we move through checkpoints to confirm our identity and that we are in the correct place.
There are similarities between an airport and least privilege: the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities. In fact, NIST, the authors of a number of documents on Zero Trust, leverage the airport analogy to describe best practices around Zero Trust and identity.
So what can we learn from the checks and balances of an airport to apply to our own organisations’ Zero Trust efforts?
Join Scott Hesford, Solutions Director APJ at BeyondTrust, as he looks at the airport analogy, described by NIST in its Zero Trust documentation, and how modern PAM solutions can support the implementation of Zero Trust.
The rapid shift to remote work and ensuing mass-adoption of cloud security technologies have left organizations and security professionals with a lot of questions around how to secure their cloud data and apps according to their needs. With cloud adoption still continuing to accelerate, the evolution of the next generation of modern attacks will now start to traverse through and towards an enterprise’s cloud control plane. Organisations are struggling to protect these environments as the traditional controls simply don’t fit in the cloud world, and most organisation are quickly figuring out as we did on-premise that we can’t prevent all attacks. Join Vectra Ai for this informative session as they will discuss a new approach to cloud security as well steps you can take to secure your control plane.
Benefits of attending this session:
Different industries have different domains on how they manage third-party risk, and each industry will normally start with a framework to access the typical risk appetite in an organization. Fawad will give a few examples of different industries and what are the typical risk appetite with vendors exposed to, the level of engagement acquired and how to check security hygiene by leveraging on technologies to monitor and mitigate risk with focus on: