Early-bird Discount
expires in
Register Now

Agenda

Track II: Innovate

Track II: Innovate

Track
Wednesday, November 15, 2023 11:15—13:15
Location: Sirius

Zero Trust is not a new concept, but it is now being actively pursued by many organizations because the supporting technologies are finally maturing and the core principle of “never trust, always verify” is key to addressing the security challenges of modern hybrid working. This track session goes beyond the concept of zero trust to look at practical ways of implementing the security model based on real-world experience, with a specific focus on identity and access management (IAM) technologies and the role of endpoint security.

Understanding vulnerabilities and mitigating them through proactive strategies is key to modern cybersecurity. This track session will provide a comprehensive overview of attack surface management (ASM), the role it can play in cybersecurity, how it can enable organizations to adopt a risk-based approach, key use cases, and some of the latest innovations. This session will also provide insights into the application of specific technologies that can be used to reduce exposure such as automated microsegmentation to prevent lateral movement of attackers and API protection to avoid exploitation of business logic by attackers.

 


Moderation

Senior Analyst
KuppingerCole

Sessions

November 15, 2023
11:15 - 11:35
The Next Generation of Secure Access with Zero Trust
Learn how Netskope can deliver a seamless transition for implementing the next generation of Zero Trust protection with their award-winning SSE platform.

Netskope


November 15, 2023
11:35 - 11:55
IAM: The Guardian Angel of Zero Trust
In today's digital age, traditional security models are no longer sufficient to protect against sophisticated cyber threats. That's where Zero Trust comes in – a security model that assumes that every user, device, and application is a potential threat until proven otherwise.In this session, we will go through the criticality of the IAM in a zero trust security model. How by leveraging and implementing core IAM Technologies (IGA, Identity Federation and PAM) organisations can...

Delivery Hero SE


November 15, 2023
11:55 - 12:15
Panel: It all starts with the Endpoint
The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as “beyond PC” and “beyond mobile” types of endpoints, including printers. How can efficient endpoint security become implemented, which are the obstacles, and how to overcome them? And which role does endpoint security play in the bigger picture.

KuppingerCole
Delivery Hero SE
HP Inc. Wolf Security
Netskope


November 15, 2023
12:15 - 12:35
Unleashing Automated, Agentless Microsegmentation to Isolate the Next Breach
Discover the power of full-scale microsegmentation! Join us for an exciting presentation on this cutting-edge security solution that prevents lateral movement. Automated and agentless, effortlessly fortify your network against lateral movement attacks.  Don't miss this opportunity to safeguard privileged protocols like RDP, SSH, and WinRM required by IT but loved by attackers. As a bonus, unlock the ability to MFA any port, protocol, or app.  Deploys in one hour and protects your...

Zero Networks


November 15, 2023
12:35 - 12:55
Securing the SaaS Revolution: Protecting Your Data in the Cloud
The best CISO’s are never surprised! But now that SaaS apps like Salesforce, ServiceNow, or M365 have become mission-critical for organisations and process sensitive data, it's getting harder to keep track of the security metrics. CISO’s tell us they are flying blind and hope for the best. You shouldn't have to simply trust your app teams or run periodic third-party assessments to stay on top of how your SaaS is configured. What if you could define the security guardrails, which...



November 15, 2023
12:55 - 13:15
Protect APIs Everywhere with Modern Solutions
Attackers follow the money. In a digital economy, this means targeting web apps and APIs to exploit vulnerabilities and abuse business logic, leading to data breach, account takeover, and fraud that can devastate your business. To effectively prevent these attacks, you need  comprehensive, consistent security that protects your entire digital footprint. F5 solutions reduce complexity in a hybrid and multi-cloud world so you can deliver secure digital experiences at scale—in the...



Almost Ready to Join the cyberevolution 2023?
Reach out to our team with any remaining questions
Get in touch