Fortifying secure access: Building enterprise and customer trust through efficiency, security and integrity

08 February 2022 (SGT) | Free CS Hub Online Event

Agenda: 8th February 2022 SGT

9:00 - 9:45 SGT Strengthening and Improving Identity and Access Management (IAM) architecture during COVID

Gaurav Miglani - Lead Cybersecurity Analyst (Director), Visa

To REGISTER and to access live presentation click here.

The journey to secure access takes into consideration existing legacy applications and infrastructures and how to better them as the cloud environment gets more dynamic with more remote users assessing internal systems. With this is mind, Visa will talk about the systems they have put in place and their thinking around secure access and zero-trust framework, with specific reference to:

  • Roadmap and approach to IAM implementation as a central point of authentication and access management
  • How large organizations provide the right level of access from anywhere and ensure employee are connected at all times
  • The journey of providing seamless user experience with the right level of access to the right level of applications
  • Explicit rather than implicit access - what is the level of granular access do people need on certain applications
img

Gaurav Miglani

Lead Cybersecurity Analyst (Director)
Visa

10:00 - 10:45 SGT Privileged Access and Zero Trust: Lessons Learnt from the Front Lines

Scott Hesford - Director of Solutions Engineering, APJ, BeyondTrust
Mel Migriño - Vice President and Group CISO, Meralco

To REGISTER and to access live presentation click here.

The last two years have seen many examples of ransomware attacks, where privileged access and accounts were exploited to gain the initial foothold that would ultimately lead to disruption, such as the May 2021 Colonial Pipeline breach.

With such threats growing more common, many cyber security leaders are adopting a Zero Trust strategy to eliminate persistent trust, enforce continuous authentication, least privilege, and adaptive access control.

Join this session to hear from industry leaders on the threat landscape and how adopting Zero Trust and associated privileged access solutions can mitigate risks around modern cyber threats.



img

Scott Hesford

Director of Solutions Engineering, APJ
BeyondTrust

img

Mel Migriño

Vice President and Group CISO
Meralco

11:00 - 11:45 SGT Zero Trust and the Flaming sword of Justice

Dave Lewis - Global Advisory CISO, Duo

To REGISTER and to access live presentation click here.

How the Security Leader Enables Business Outcomes

  • Learn more about zero trust and secure access
  • Understand what the buzz is about passwordless
  • Security best practices around device trust


img

Dave Lewis

Global Advisory CISO
Duo

12:00 - 12:45 SGT Improving Identity and Access Management through a standardized and automated platform

Hans Iandy - Head of Compliance and Information Security - Corporate IT, Sinar Mas Land

To REGISTER and to access live presentation click here.

As the world becomes more remote and companies accelerate growth, it becomes increasingly important to reevaluate existing solutions for fluency of work and productivity. With this in mind, this session addresses ways to standardize and shorten provisioning and de-provisioning access with IAM -

  • Shortening onboarding steps to improve business processes with a standardized platform
  • Using existing applications and incorporating new applications for faster integration
  • Improving and redefining your access governance
  • Bridging IAM and Privileged Access Management (PAM) as a central tool to better manage access across the entire business
img

Hans Iandy

Head of Compliance and Information Security - Corporate IT
Sinar Mas Land

13:00 - 13:45 SGT Implementing access governance as part of your Identity Access Management (IAM) by choosing the right solutions that fit your current architecture

Fawad Bayunus - Cluster Head, Information Security Risk Officer, Standard Chartered Bank

To REGISTER and to access live presentation click here.

Losing control of who access what in an organization can cause a breach in private data and systems thus disrupting an entire organization. The role of access governance is to control these breaches and ensuring data will not be compromised as well as to minimize burden on IT administrators to control all access points. This session will address how to use access governance for efficient management which focuses on -

  • Cybersecurity risk-based approach - IAM policy and procedures
  • Key components of identity & access management and its importance.
  • Effectively managing different levels of access - using role-based approach on platforms
  • Highlights on data breaches of 21st century and its repercussions
  • Identify & selection of the right access governance solution to fit your current architecture
img

Fawad Bayunus

Cluster Head, Information Security Risk Officer
Standard Chartered Bank