Accountability and Responsibility for Faster Informed Decision-Making 

2-3 November 2022 l Free Online Event | Going Live: 9AM SGT

Agenda Day One: 2 November 2022

9:00 am - 9:30 am FIRESIDE CHAT: How Can You Detect the Unknown?

George Chen - Global Threat Hunting Manager, PayPal
  • How does Threat Hunting tie in with Detection Engineering and Response?
  • How can threat hunting help mature the security posture of an organization?
  • What techniques can be utilized in threat hunting to compliment detection engineering?
  • How can we reduce false positives?
  • What are the kinds of collaborative efforts between detection and response teams that help drive efficiency or outputs?
  • How does automation help?
  • How do we find unknown threats?


img

George Chen

Global Threat Hunting Manager
PayPal

9:30 am - 10:00 am Adoption of Zero Trust architecture

Sudip Banerjee - Field CTO, APJ, Zscaler

What is the role of zero trust security policies in ensuring continuity of productivity and operations. Among other negative consequences, a cyberattack can potentially slow down productivity across your entire organisation and disrupt business operations. It’s up to you to ensure the smooth continuity of work and operations. Zero Trust Architecture (ZTA) is a major step toward that goal, with its focus on users, assets, and resources rather than obsolete and static network-based perimeters. This presentation will share insights on using zero trust security policies to retain visibility and resiliency in the new landscape that includes the public cloud, SaaS, and the private cloud, how to reduce the chances of an initial attack and lateral propagation with zero trust, and how to use the power of the power of collective intelligence to fight threats using cloud data and AI/ML?


Join this session to learn:

·       How do you scale zero trust security policies across the enterprise?

·       How has zero trust increased visibility to risk, especially in the cloud?

·       What is your approach to automating enforcement of zero trust policies

·       How to simplify network and security architecture to improve the effectiveness of threat detection and response?



img

Sudip Banerjee

Field CTO, APJ
Zscaler

10:00 am - 10:30 am FIRESIDE CHAT: A Multi-Channel Strategy to Align Threat Detection and Visibility Cross-Departmentally

Abul Kalam Azad CISSP,CISA,CISM,CRISC,CEH - Head of Information Security & Compliance, Eastern Bank Ltd


·       What steps have been taken to evaluate infrastructure and implement early detection of early potential attacks?

·       How are you analysing data and changing the response from both a governance and automation perspective?

·       How are you analysing traffic, assessing who the potential bribe advocate is?

·       What examples can you give regarding your experiences of connectivity, intelligence, compromises?

·       How are you implementing additions of threat intelligence to prevent malicious traffic?

·       How are you assessing traffic from a multi-channel perspective and how are you looking to increase visibility cross-departmentally?

img

Abul Kalam Azad CISSP,CISA,CISM,CRISC,CEH

Head of Information Security & Compliance
Eastern Bank Ltd