In the past several years, technology has become a differentiator and a disruptor to normal business. Growing industries such as fintech, biotech, healthtech, etc. introduce individual, privileged and machine identities. Yet, traditional Identity technologies and processes used today do not scale to the needs and...
Cloud adoption indeed boosts digital transformation for organizations embarking on a modernization program - the main reason why organizations often opt for a hybrid AD approach. However, the other side of the coin w.r.t hybrid AD approach is, your network perimeters disappear. To address this new challenge,...
As we push identity to be the new perimeter, we trip over legacy systems and technical debt. This session covers laying the groundwork, establishing governance, identifying key IAM and business processes. These are vital to modernize IAM ahead of initiatives such as digital-first and zero trust. We might not be able...
Identity used to be (relatively) easy. Users, networks, role-based controls, a bit of multifactor authentication. Then came digital transformation, and with it new topics - new challenges - such as Web 3, the Metaverse, NFTs. Paradigm shift? That's what Al Pascual says, and in this session he discusses:
The old...
Enterprises need a better approach to identity vetting to fully verify all user accounts in a low-friction manner. To create this better approach, CVS Health has made the decision to start leveraging decentralized digital identity technology in a working prototype that implements the Accountable Digital Identity...
Kay Turner joined FinCEN about a year ago. Her mission: to advance the use of digital identity, to create new partnerships with federal agencies and to spread awareness about the new challenges and opportunities brought by emerging technology.
In this exclusive IAM Summit session, Turner opens up on:
The...
Seven years ago, Ian Glazer recognized both the criticality of digital identity management as a business practice - and the lack of an industry group to address the profession's unique issues. He helped establish IDPro as a professional organization and today addresses the Summit to discuss:
The state of...
Customer Identity and Access Management - CIAM - emerged as a practice pre-pandemic, but took off amidst COVID-inspired digital transformation and the exponential growth of digital channels. Two years later, are CIAM solutions meeting enterprise and customer needs? John Horn of Aite-Novarica group shares some of his...
The South East Asia region is poised for digital transformation across enterprises; it has become an easy and prime target for cyberattacks.
It’s no longer a matter of if, but when you’re going to be the victim of a cyberattack. Are you prepared? It’s no longer a theory about protecting your critical...
With the dawn of the fourth industrial revolution (industry 4.0), organizations have put their digital transformation at the top of their agenda. While the digital transformation will enhance competitiveness and bring agility and optimal decision-making capabilities, it brings cybersecurity risks and innovation. It is...
We have been hearing about digital transformation for some time. Your business could be looking to reduce the cost or thinking about agility and swiftly bringing your services to market.
Many of us are on a similar journey! New terms, new architectures, confusing statements, and more security technologies are...
The daunting task for CISOs today is to turn today’s threats into tomorrow’s advantage. The tool that most security leaders are leaning on is the XDR to build resilient, dynamic, and living security. You could argue that true XDR can bring material benefit, but only if it combines different detection capabilities...
Banks in the ASEAN have seen their customers targeted by social engineering frauds. New fraudulent methods are bypassing Web application firewalls and multi-factor authentication security controls.
This session will cover:
How are fraudsters leveraging automated bots, MFA bypass toolkits, and social engineering...
VThe challenge for CISOs in their digital transformation journey is to understand the right technologies required for their business and how do you secure those endpoints that are going to expand. The question would arise on what you need to focus on endpoint security that could protect all access points which are...
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and part of technology innovation? Is the CTO function aligned with security in driving innovation? Meeting the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.