Theme: Zero Trust Security: Capitalizing on the Adoption Wave
|10.00am – 11.00am||Registration with Tea/Cofee|
|11.00am – 11.45am||Inaugural Ceremony|
|12.00am – 12.30pm||Keynote Session: What is Zero Trust, and Why Does it Matter?
The initial emergence of the Zero Trust concept and model was nearly a decade ago. Today, this initiative has become a guiding principle for industry. Join us for this session to understand the framework and how organizations can leverage these concepts and strategies to move from “Zero to Hero.”
|12.30pm – 12.45pm||Sponsor Slot 1 : Zero Trust: Why Identity and Data are Critical|
|12.45pm – 1.00pm||Sponsor Slot 2 : How Next-Gen Access Powers Zero Trust|
|1.00pm – 2.00pm||Networking Lunch|
|2.00pm – 2.30pm||Spotlight Session : The Cyberwar - How Zero Trust Can Help
The Zero Trust concept is revolutionizing network security architecture because it’s 1) data-centric, 2) designed to stop data breaches, and 3) adds a layer of agility to modern networks that wasn’t possible in traditional network design. Because of this, modern, Zero Trust-based networks have been adopted by government entities and large enterprises around the world. Join us for this session to understand the original Zero Trust concept. We will discuss how Zero Trust can achieve tactical and operational goals and demonstrate how it will not only transform network security, but function as a business enabler by focusing on strategic business objectives.
|2.30pm – 3.30pm||Panel 1 : Protecting Your Company and Your Customers from Cyber Attacks
Cyber criminals continue to target organizations of all sizes, in all industries, and across the globe. Join us for this session where Tony Scott will draw from his decades of experience in the public and private sectors -- including leading the response to a historic breach of federal government data -- to share modern digital approaches for securing the future of your company and the customers you serve. Tony will discuss what businesses can learn from hackers, how to stay ahead of leading-edge cyber criminals at the enterprise level, and a view of cybersecurity’s future.
|03.30am – 03.45pm||Sponsor Slot 3: Best Practices in Leveraging Identity Governance and Administration Solutions to Extend your PAM and UEBA Solutions|
|03.45pm – 4.00pm||Sponsor Slot 4 : Using Zero Trust to Reduce Risk in Four Steps|
|4.00pm –4.30pm||Tea Break|
|4.30pm – 5.00pm||Zero Trust and the Perimeter of One:
Today’s IT security focus on the corporate perimeter and location-based access control draws on thousands-of-years-old legacies from military encampments, which look nothing like the modern enterprise. In contrast, the core of modern Zero Trust models involves building security services from user-centric perimeters — essentially the perimeter of one user — and how that user strongly authenticates to applications, not locations. Join us for this session as we explore a security approach for the digital age that combines high visibility and Zero Trust to protect important assets both individually and collectively.
|5.00pm – 6.00pm||Panel 2 : How Zero Trust Addresses the Top of Breaches: Privilege Abuse
Four out of every five breaches involve privilege access abuse. The legacy approaches to privileged access management is inadequate to secure the new threatscape of the modern enterprise including cloud, DevOps, big data, microservices and containers, that all require a new approach to privilege access. Join us for this session to learn how Zero Trust Privilege helps organizations grant least privilege access for these critical use cases to minimize the attack surface and stop the leading cause of breaches.
|6.00pm – 6.30pm||Zero Trust and the Critical Role of Cultural Adoption
For Zero Trust initiatives to succeed, they must be accompanied by an eyes-wide-open rollout that recognizes the cultural impact on the organization, and ways to lead, educate and nurture the adoption process. Join us as we discuss lessons learned.
|06.30am – 06.45pm||Sponsor Slot 5: Best Practices in Leveraging Identity Governance and Administration Solutions to Extend your PAM and UEBA Solutions|
|06.45pm – 7.00pm||InfoQuest Inauguration and Closing Remarks|
|7.00pm – 7.30 pm||Award Ceremony|
|7.30pm - 10.00pm||Musical Evening with Cocktail& Dinner|