How to protect your critical applications and the networks that deliver them

Find out how to apply state-of-the-art techniques to deal with top-of-mind security threats

Join our discussion to learn about state-of-the-art techniques to deal with top-of-mind security threats today and emerging trends

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
14 September, 2022
10:00 AM - 11:00 AM SGT

As businesses become more and more digitized, the risk associated with a breach or a criminal compromising the integrity of the systems, data and other critical assets can be very damaging to the reputation of businesses resulting in churn or even regulatory sanctions.

This panel discussion with a focus on real world threats and issues, will cover how to protect these critical applications, data, assets and the networks which deliver them. The goal of this discussion is to learn from industry leaders what worries them today, what they can do about it and how to better plan for tomorrow.

Security must be applied in a layered manner and is certainly a defense in depth game today. To win that game, our panel will address how they identify critical assets as well as the people, processes and technology required to keep the critical assets of the business available and functional under attack the same way they are during peace time. Whilst it is the job of the CISO and cyber security team to plan, it is also the job of the entire organization to manifest proper cyber culture.

Join this webinar to find out:

  • How to identify critical assets by industry and how to protect them
  • What is “Cyber Culture”, and how it contributes to the proper application of people, processes and technology
  • What threats are particularly concerning and how we are planning to protect against them today and tomorrow
  • How the Cloud model, cloud native applications and the hybrid (cloud + on prem) model impacts security
  • What the relevant controls are for creating cyber culture, including DDoS, Web Application Firewall, Application Delivery Controller, BoT Management and more


Panelist

Yaron Slutzky
Chief Information Security Officer
Agoda

Yaron Slutzky is CISO at Agoda with 15+ years of experience in Cybersecurity domain . Prior to Agoda Yaron has been CISO for different companies working in multiple sectors such as Telecom, E-commerce & Manufacturing. Yaron also lecture in universities and conferences around the world, Yaron primarily focuses on emerging technologies & transforming organizations Information/Cyber Security program by bringing fresh new approach and methodology.

Wilbertus Darmadi
Chief Information Officer
Toyota Astra Motor

CIO of Toyota Astra Motor. More than 26 years experience as IT professional especially in Automotive Industry. Having broad experience in IT, have hands on experience in several technical IT skill when was an engineer before level up to become CIO. Working with multinational stakeholders, team and partners. Helping company to boost business performance using latest technology such as ioT, ‘smart data’ utilization, cybersecurity etc. Involved actively in Indonesia CIO community, regularly invited to give sharing by product principal / IT partners / IT community.

Michael Geller
Distinguished Cyber Security Architect
Radware

Michael Geller has over 30 years’ experience in advanced technology development and operations in Cyber Security with a focus on hyperscale networks, 5G and securing critical applications. Geller's work includes 4G/5G threat surface analysis, segmentation and zero trust for the 5G network as it applies to application delivery and network slicing, and route science and security.

Geller is currently a Distinguished Cyber Security Architect with Radware focusing on protecting critical workloads, their API and the networks that deliver them. He previously spent 24 years at Cisco as their Principal Engineer, most recently he was responsible for their security architecture as the leader of the Global Security Architecture Team (GSAT).

As an Adjunct Professor at University of Miami and University of Michigan, Geller is the lead Instructor for the Thrive DX Cyber Security program and holds a Master of Science from MIS University and a Bachelor of Science in Mathematics / Economics.

Geller is a fourth-degree black belt in Tae Kwon Do and most enjoys the company of his wife, Rebecca and two children, Sarah and Ben.

Sponsor


We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.