CISO Track – Prioritising Integration of Governance, Risk and Compliance in Cybersecurity in the New Normal – Vijay Narayan

Vijay Narayan, Chief Information Security Officer, Environment Protection Authority

Main key takeaways from this workshop with Vijay include:

  • Re-emphasized the importance of data protection through a multitude of mandates
  • Implementation of security controls on cloud components
  • Providing leadership with timely, comprehensive risk and compliance-related reporting

 

Addressing Diversity and Digital Skills Deficiency in a Rapidly Changing Future – Jennifer Rebeiro

Jennifer Rebeiro, Chief Information Officer, Greater Western Water

In this workshop with Jennifer, participants learned about:

  • The importance of reskilling and upskilling as new roles emerge and skills requirements change.
  • Leveraging the experts they already have on staff and creating an extensive career path.
  • Adopting more inclusive hiring practices outside of traditional talent pools.

CISO Track – Adopting a pragmatic Zero Trust Strategy – Vinay Manikkam

Vinay Manikkam, Principal, Enterprise Security Architect, IAG

In this workshop Vinay shared his insights and experience on adopting a Zero Trust Strategy , touching on:

  • Introducing a Zero Trust Framework that is relatable to stakeholders
  • Integrating Zero Trust foundation and quick wins with an enterprise cyber security strategy
  • Planning Zero Trust maturity investments to address tactical and strategic cyber risk and resilience objectives

CISO Track – How Devolved Cyber Security Created a Leap Forward in Our Cyber Security Posture – Charles Sterner and David Wilde

Charles Sterner, CISO, AARNet

David Wilde, CTO, AARNet

Charles and David spoke about their recent program, at AARNet, to aggressively grow their cyber security capabilities, to meet the challenges of the modern threat landscape. Core to their strategy is the concept of “devolved cyber security.”
Their session discussed what this means for their company, how they’ve leveraged out of the both thinking to manage our risks, and where they see this going over the next 5 years.

CIO Track – Driving Your Competitive Advantage with Cloud-First Identity and Access Management – Dragan Vladicic

Dragan Vladicic, Senior Manager, Solutions Engineer, Asia Pacific, Okta

This Okta roundtable session with Dragan revolved around the subject of “hybrid state” under which many organizations are operating their IT environment these days.

And while the efficiencies of a cloud-first approach are well established, organizations and their employees find it difficult to move back-and-forth between their SaaS apps on one side of the hybrid state, and those legacy applications that need to remain within the on-premises data center.

Keypoints discussed:

  • How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications
  • How can organizations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)
  • What are the best ways for organizations to leverage newer technologies to help scale their infrastructure to meet customer needs

CISO Track – Emerging AppSec Trends in 2022 and Beyond – Randeep Chhabra

Randeep Chhabra, General Manager, AppScan, Asia Pacific & Japan, HCL Software

Randeep spoke about the need for organizations to address security earlier in the software development life cycle. If they prioritize speed without security in app development, it can lead to an uptick in critical vulnerabilities with disastrous results.

While the security technologies across networking and operations are more commonly implemented to high standards, we see unique challenges and trends faced by clients in implementing effective application security programs.

Here are the main key points discussed in the HCL Software roundtable session:

  • How are CISOs improving processes to integrate security into DevOps, and what challenges do they face?
  • What are the practices, techniques and strategies that can be used to achieve better application security?
  • What are the key trends for 2022 and beyond?

CISO Track – CISO Track – Modernising your Application Security Playbook using RASP – Reinhart Hansen

Reinhart Hansen, Director of Technology, Office of the CTO, Imperva

Here are the key topics discussed in this roundtable with Reinhart:

  • Preventing exploitation of application vulnerabilities we don’t know we have
  • How to mitigate falling victim to Software Supply chain attacks
  • Zero-day attacks require better than zero-day mitigation. Moving from reactive to proactive mitigation.
  • Prevention from the headache and cost of emergency application patching cycles.

Copyright 2024 ©Focus Network. All rights reserved