{
All times SGT
Parag Deodhar, CISO APAC, Major Global Apparel Manufacturer
What is said about secure access doesn't always line up with what is done with secure access. People, process, technology and the seamless integration of those three aspects of the enterprise must be taken into account when taking steps on the secure access journey. Parag lends his perspective.
For many organizations, more and more users, data, and services are located outside the protection of the traditional network perimeter. At the same time, employees are using dozens of applications—including on-premises and software-as-a-service (SaaS) apps—to accomplish their work. Typically, organizations have deployed an array of point products to handle different security requirements for remote workers, such as secure web gateways, application firewalls, secure virtual private network (VPN) access, cloud access security brokers (CASBs), and more. This not only increases administrative costs and complexity, but also makes for inconsistent user experiences. If an organization has not implemented single sign-on (SSO), user experiences become even more complex, and the situation starts to impact remote worker productivity.
In this session, Jefferson will discuss the network security challenges facing organizations with distributed or remote workforces and how you can address them with a centralised Identity management.
In a world where digital transformation is accelerating, with our data no longer in an environment we control, this session will explore how security programs need to transform in order to address the challenges posed by cloud adoption at pace. David will share:
Moving applications and data from on-premises infrastructure to a hybrid cloud environment can be challenging. However, deploying security does not have to be. Prisma Access provides scalability—for the short and medium term surge in remote working—along with the ability to modernize your infrastructure over the long term to SASE with a single cloud delivered service that all your users and remote locations can securely connect to. In this session, we will go through what is driving SASE growth in JAPAC region, the issues with the legacy model and how the future of network security is in the cloud:
Barry Magsanay, Global Head of Information Security, Treasury Wine Estates
Cloud evolution is usually based on industry/regulations, budget and mindset. If the industry is highly regulated- cloud evolution is based on that fact. If the industry is not- cloud evolution is more about budget and/or mindset. It is now evident that the future of cyber security is at least mostly in the cloud.