Loading…
Thursday, July 11 • 1:50pm - 5:00pm
Technical Deep Dives

Log in to save this to your schedule, view media, leave feedback and see who's attending!

Round 1: 1.50pm – 2.30pm
Round 2: 2.30pm – 3.10pm
Networking Tea Break: 3.10 pm – 3.40pm
Round 3: 3.40pm – 4.20pm
Round 4: 4.20pm – 5.00pm

TECHNICAL DEEP DIVES 
 
In these small working group sessions, you'll have the chance to delve deeply into a topic of interest alongside an expert facilitator and your peers. These discussions foster open and candid dialogue, allowing you to explore the challenges and opportunities presented by these innovations. You'll be engaged in four roundtable discussions throughout the post-lunch session.  
   

Navigating IAM tactics in a Zero-Trust Landscape  
  • Tackling Multifactor Authentication (MFA) Fatigue: overcoming obstacles and optimizing IAM functionality 
  • Embracing Assumed Breaches: Integrating preemptive measures into security protocols. 
  • Advancing Passwordless Authentication: Driving widespread implementation to bolster security measures. 
  • Strategic Evolution: Adapting IAM approaches to align with the demands of a zero-trust environment. 
 
Cloud Sentry: Accelerating the Efficiency of Threat Detection and Response 
  • Real-time Threat Recognition: How to detect and respond to cloud-based threats in milliseconds, mitigating risks before they escalate 
  • Zero-Day Exploit Resilience: How to fortify defenses against emerging threats, safeguarding your cloud infrastructure against unforeseen vulnerabilities 
  • Insider Threat Identification: How to proactively identify and neutralize insider threats, maintaining the integrity of sensitive data and operations 
  • Adaptive Security Enhancement: How to continuously improve cloud security protocols, staying ahead of the evolving threat landscape with agile and adaptive measures 
 
Securing APIs: Strengthening Access Control for Safe System Interactions  
  • Strategies employed by CISOs to define robust data protection measures and ensure secure API interactions 
  • Exploring innovative authentication methods to enhance API security 
  • Crafting tailored authentication and authorization setups to manage user access effectively 
  • Implementing proactive measures for detecting and mitigating API vulnerabilities 
 
The GenAI Dilemma: Balancing the Present Skepticism with Future Promise 
  • How to make AI technologies your ally: understand privacy, bias, and job displacement concerns 
  • Ethical dilemmas in AI development, including transparency, accountability, and ensuring AI systems  
  • Drawing more from your AI investment: cross-industry learning 
  • The security leaders’ scope for AI: safety, fairness, and inclusivity, while also fostering innovation and exploration of AI's potential 

Thursday July 11, 2024 1:50pm - 5:00pm HKT
Feedback form isn't open yet.