The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on July 27 a virtual cybersecurity summit for India on applying the model.
An enterprise risk management strategy must include biometric authentication to address digital transformation challenges, says Pierre Noel, managing director of ISTARI, a consortium of security experts from the financial sector in the EMEA region.
An identity and access management strategy for a hybrid cloud environment should include single sign-on as well as multifactor authentication, says Andrew Koh, deputy general manager and regional lead-Risk at Habib Bank Ltd. in Singapore.
How are emerging technologies, such as quantum computing and Secure Access Server Edge, or SASE, shaking up cybersecurity? And how are cyber adversaries adapting to the changing times? Dr. Hugh Thompson, program committee chair for the RSA Conference, offers an analysis of trends.
Business email compromise scams are becoming far more sophisticated and often now involve the use of supply chain management invoices, says Kai Roer of CLTRe, a KnowBe4 company. He'll be a featured speaker at the RSA APJ virtual conference to be held July 15-17.
As the risks to IT and OT converge, organizations must ramp up their threat intelligence information sharing mechanisms and build a more comprehensive cybersecurity policy, says Singapore-based John Lee, managing director of GRF Asia, a federation for building global resilience.
Finding the right tools to analyze evidence for fraud investigations is challenging, says Paula Januszkiewicz, CEO of CQURE, a provider of specialized services in IT infrastructure. She'll be a featured speaker at the RSA APJ virtual conference to be held July 15-17.
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust...
Covid-19 came at a time when most of us were comfortable with our security posture. Do enterprises need to conduct a reality check of their security posture to meet the new demands?
What did we miss? Were we under-prepared to tackle the new demands of the remote workforce culture? Had Covid-19 changed our security...
As organizations move to redesign their security architecture to a 'zero trust' security model, some struggle to prioritize the capabilities needed to achieve their desired Zero Trust outcomes, while not drowning in costs and complexity.
The talk will provide an overview of how new solutions can help you implement a...
Moderator: Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Anthony Bargar, Former Deputy CISO, US Department of Defense and vCISO, South East Asia
Gautam Aggarwal, Senior Vice President, Operations and Technology and APAC Regional CTO, Mastercard
The uncertainty caused by COVID-19 has heightened cybersecurity risks for enterprises who need to address the new normal and take appropriate measures to protect their organization and workforce while working remotely. This disruption in business operations has expanded the attack surface.
The key note discusses...
The "zero trust" security model emphasizes that enterprises should have a "trusted" internal network and an "untrusted" external network. The increasing adoption of mobile and cloud technologies and the COVID-19 pandemic, which has led to a shift to a remote workforce, show that we can no longer have a...