Stability, security, performance and cost are the key parameters organizations consider when choosing an application development platform. Today's microservices and cloud-native approaches bring forth new possibilities but require careful considerations while trying to deliver on customer demands and business needs....
How do Financial Services companies provide a personalized and frictionless digital experience that will allow their customers to feel in control of the information they share?
By leveraging a Customer Identity and Access Management (CIAM) platform, businesses can enable solutions to easily identify and authenticate...
Today's cloud-connected Mainframe is a vital infrastructure for crucial business applications and data - even more so for banking and financial service companies that carry the highest security and most stringent regulatory requirements. This cloud-connected, hybrid IT model can increase security risk and open...
Public cloud providers like AWS, Azure, and GCP enable financial services firms to deliver new products and capabilities at breakneck speeds, but how do you balance speed to market against compliance mandates and security issues - do you have to choose? This presentation looks at how to meet compliance mandates, gain...
Speakers:
Phoram Mehta, Senior Director, APAC CISO, PayPal, Singapore
Mario Demarillas, CISO and Head of IT Consulting and Software Engineering, Exceture, Philippines
Venkatesh Subramaniam, Global CISO & Privacy Head, Olam International, Singapore
The popular SolarWinds hack, the supply chain attack that...
The year 2021 will see an increase in organized cybercrime activities, APTs, and ransomware attacks targeted at the critical infrastructure organizations across South East Asia. Also, the remote workforce. Economic stress. Pandemic fatigue has made created a "perfect storm" for an increase in security breach risks....
Enterprises traditionally used on-premises IAM software to manage identity and access policies. With companies adopting cloud services, the process of managing identities is getting more complicated. Therefore, adopting cloud IAM solutions becomes a logical step. However, mapping single sign-on users and IAM roles can...
The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their...
Historically, cybersecurity has focused on protection, preventing threats exploiting weaknesses within an organization. This is changing as organisations accept that due to gaps in defences allied with the attack's sophistication, threats will enter your organization and often remain undetected for weeks or months,...
Asset owners and operators are experiencing a convergence of IT and OT in this era of digital transformation, which is resulting in increased cyber risk to industrial control systems. Legacy ICS components are not designed to embrace this digital transformation and the heightened liability that accompanies it. ...
Check Point’s white hat research team which has discovered the existing malware out in the wild and also the’zero-day vulnerabilities discusses use cases around how organizations with responsible disclosure can further secure networks and devices.
It is imperative for organizations to under what the threat...
The recent cyberattacks have shown increased sophistication in the breadth of tactics used to penetrate, expand across, and persist in affected infrastructure. They have posed a serious threat to every organization. While the tactics, techniques, and procedures (TTPs) that the bad actors utilized are not new to...
As organizations pursue a new generation of infrastructure with SDN and cloud, business is primed to move and shift faster than ever, but speed without security is simply a risk multiplier. It is vital to learn how global organizations have operationalized a simple, fast, and safe segmentation strategy to secure...
Throughout 2020 organizations widely adopted a zero trust architecture in response to the pandemic and it is now fast replacing traditional VPN approaches. As the zero trust approach continues to evolve, the challenge for organizations in 2021 and beyond lies in how to implement this approach across environments,...
A year ago, legal and compliance communities were focused on CCPA and other global privacy initiatives. A global pandemic later, the focus is on resiliency, visibility into a new army of endpoint devices - and new privacy expectations.
Join these seasoned cybersecurity attorneys and privacy pros as they...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.