sidearea-img-1

Newsletter

 

EVENT THEME:
Busting 6 Myths of Privilege Access Management – An Interactive CISO Debate

15th October 2020, Malaysia & the Philippines
REGISTER NOW

Virtual Event Series

Hosted By

Date: Thursday, 15th October 2020

Time:2PM – 3PM (MYT/PHST)

Location

Malaysia & the Philippines

Presenters

Aileen Eway

Aileen P. Eway, Regional Sales Manager – ASEAN BeyondTrust

Aileen Eway is the Regional Sales Manager for Philippines, Malaysia and Brunei and is based in Philippines. She managesthese markets and help ensure that customers will have security as their top priority.

Prior to joining BeyondTrust, Aileen was the Country Manager for Micro Focus Enterprise Security Products for Philippines. She has also served as Enterprise Account Manager under McAfee as well as Deputy Country Manager for M-Security Tech, Philippines.

Aileen has been in the cyber security field for the last 16 years and has handled and managed a wide range of security solutions.

Ajay Kumar_375x375px

Ajay Kumar, Director, Solutions Engineering – APJ BeyondTrust

Ajay Kumar has over 15 years’ experience in cyber security, and seven specializing in privileged access and identity access management. Prior to becoming the Director for Solution Engineering – APJ at BeyondTrust, Mr Kumar was the Regional Technical Sales Leader for over seven years at IBM.

A trusted cyber security advisor to enterprise customers, his experience spans across several industries such as banking, insurance, energy and utilities, in addition to state and federal government. At BeyondTrust, Mr Kumar heads the regional security engineering department, helping enterprises and government agencies improve their security posture against internal and external threats.

Moderator

Andrew Milroy

Andrew Milroy, Founder, Veqtor8

Andrew Milroy is the founder of Veqtor8, a digital risk advisory firm, based in Singapore. His work involves empowering organisations to manage risk more effectively.

He is a well-known technology thought leader and speaker in the APAC region. Since moving to Singapore in 2011, he has held regional leadership roles with Frost & Sullivan, IDC, Nelson-Hall and Ovum (now Omdia). These roles have also given him the opportunity to live and work in the United States, the United Kingdom and Australia.

He has been providing advisory services relating to cybersecurity for over 20 years. In his 10 years at Frost & Sullivan, Andrew grew the technology business into one of APAC’s leading sources of cybersecurity research and consulting services. Andrew works closely with leading buyers and vendors of cybersecurity products and services. Andrew is frequently invited to speak, chair and moderate at major technology events. He is also widely quoted in the press and often appears on broadcast media, including BBC, CNBC, Bloomberg and Channel News Asia.

Synopsis and overview of the session

In this COVID-19 Era, we’ve all witnessed firsthand the damage a spark of misleading information can cause.  The same happens in cyber security. The line between myth and fact becomes blurry – and many IT security professionals choose to believe a myth because it’s perceived as being “less disruptive”. And that in itself is also a myth.

Focus Network, in partnership with BeyondTrust, will be bringing leading IT Security executives to put six popular beliefs about Privileged Access Management (PAM) under the microscope and debate whether they are fact or fiction.

Join this interactive session to share your views and learn actionable takeaways to develop a more secure, folklore-free cyber security strategy.

Busting Six Myths of PAM:

  • Myth #1: The Zero Trust Model Is Easily Achievable
  • Myth #2: To Enable PAM You Must Move To Shared Accounts
  • Myth #3: PAM Is Only About Managing Privileged Accounts
  • Myth #4: Removing Local Admin Rights Is Too Challenging To Implement
  • Myth #5: Vendor Access Can Be Secured Using VPN
  • Myth #6: PAM Is A Hindrance To Productivity

So, what’s your take on these myths? Fact or fiction?

About BeyondTrust

BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments.

BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.

Website: www.beyondtrust.com

Agenda at a glance

3:30 pm – 4:00 pm – Registration & networking

4.00 pm – 4.05pm – Welcome address

4.05 pm – 5.15pm – 3 course lunch served4.05 pm – 4.45pm – Embracing disruption in the financial services industry: A Privacy versus Security conundrum – Amanda Chan, BlackBerry

4.45 pm – 5.15pm – Demo

5.15pm – 5.45pm – Discussion

5.45 pm – 6pm – Closing remarks

I want to learn more

[contact-form-7 id=”32996″]