Round 1: 1.50pm – 2.30pmRound 2: 2.30pm – 3.10pmNetworking Tea Break: 3.10 pm – 3.40pmRound 3: 3.40pm – 4.20pmRound 4: 4.20pm – 5.00pmTECHNICAL DEEP DIVES
In these small working group sessions, you'll have the chance to delve deeply into a topic of interest alongside an expert facilitator and your peers. These discussions foster open and candid dialogue, allowing you to explore the challenges and opportunities presented by these innovations. You'll be engaged in four roundtable discussions throughout the post-lunch session.
Navigating IAM tactics in a Zero-Trust Landscape
- Tackling Multifactor Authentication (MFA) Fatigue: overcoming obstacles and optimizing IAM functionality
- Embracing Assumed Breaches: Integrating preemptive measures into security protocols.
- Advancing Passwordless Authentication: Driving widespread implementation to bolster security measures.
- Strategic Evolution: Adapting IAM approaches to align with the demands of a zero-trust environment.
Cloud Sentry: Accelerating the Efficiency of Threat Detection and Response
- Real-time Threat Recognition: How to detect and respond to cloud-based threats in milliseconds, mitigating risks before they escalate
- Zero-Day Exploit Resilience: How to fortify defenses against emerging threats, safeguarding your cloud infrastructure against unforeseen vulnerabilities
- Insider Threat Identification: How to proactively identify and neutralize insider threats, maintaining the integrity of sensitive data and operations
- Adaptive Security Enhancement: How to continuously improve cloud security protocols, staying ahead of the evolving threat landscape with agile and adaptive measures
Securing APIs: Strengthening Access Control for Safe System Interactions
- Strategies employed by CISOs to define robust data protection measures and ensure secure API interactions
- Exploring innovative authentication methods to enhance API security
- Crafting tailored authentication and authorization setups to manage user access effectively
- Implementing proactive measures for detecting and mitigating API vulnerabilities
The GenAI Dilemma: Balancing the Present Skepticism with Future Promise
- How to make AI technologies your ally: understand privacy, bias, and job displacement concerns
- Ethical dilemmas in AI development, including transparency, accountability, and ensuring AI systems
- Drawing more from your AI investment: cross-industry learning
- The security leaders’ scope for AI: safety, fairness, and inclusivity, while also fostering innovation and exploration of AI's potential